Created
September 26, 2014 02:22
-
-
Save inetbiz/a6a04d4afaf53491ce04 to your computer and use it in GitHub Desktop.
SSHD Config
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # $OpenBSD: sshd_config,v xxxx 2014/09/25 23:59:53 dprophit Exp $ | |
| # This is the sshd server system-wide configuration file. See | |
| # sshd_config(5) for more information. | |
| # This sshd was compiled with PATH=/usr/local/bin:/bin:/usr/bin | |
| # The strategy used for options in the default sshd_config shipped with | |
| # OpenSSH is to specify options with their default value where | |
| # possible, but leave them commented. Uncommented options change a | |
| # default value. | |
| # Don't use Standard SSH Ports! | |
| Port xxxxx | |
| Protocol 2 | |
| #ListenAddress 0.0.0.0 | |
| #ListenAddress :: | |
| DenyUsers test admin guest nobody | |
| # HostKey for protocol version 1 | |
| # HostKey /etc/ssh/ssh_host_key | |
| # HostKeys for protocol version 2 | |
| # HostKey /etc/ssh/ssh_host_rsa_key | |
| # HostKey /etc/ssh/ssh_host_dsa_key | |
| # Lifetime and size of ephemeral version 1 server key | |
| #KeyRegenerationInterval 1h | |
| #ServerKeyBits 768 | |
| # Logging | |
| #obsoletes QuietMode and FascistLogging | |
| #SyslogFacility AUTH | |
| SyslogFacility AUTHPRIV | |
| LogLevel INFO | |
| # Authentication: | |
| LoginGraceTime 1m | |
| PermitRootLogin yes | |
| MaxAuthTries 4 | |
| #RSAAuthentication yes | |
| #PubkeyAuthentication yes | |
| AuthorizedKeysFile .ssh/authorized_keys | |
| # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts | |
| # RhostsRSAAuthentication no | |
| # similar for protocol version 2 | |
| # HostbasedAuthentication no | |
| # Change to yes if you don't trust ~/.ssh/known_hosts for | |
| # RhostsRSAAuthentication and HostbasedAuthentication | |
| # IgnoreUserKnownHosts no | |
| # Don't read the user's ~/.rhosts and ~/.shosts files | |
| # IgnoreRhosts yes | |
| # To disable tunneled clear text passwords, change to no here! | |
| PasswordAuthentication yes | |
| #PermitEmptyPasswords no | |
| # Change to no to disable s/key passwords | |
| #ChallengeResponseAuthentication yes | |
| ChallengeResponseAuthentication no | |
| # Kerberos options | |
| #KerberosAuthentication no | |
| #KerberosOrLocalPasswd yes | |
| #KerberosTicketCleanup yes | |
| #KerberosGetAFSToken no | |
| # GSSAPI options | |
| #GSSAPIAuthentication no | |
| #GSSAPIAuthentication no | |
| #GSSAPICleanupCredentials yes | |
| #GSSAPICleanupCredentials yes | |
| # Set this to 'yes' to enable PAM authentication, account processing, | |
| # and session processing. If this is enabled, PAM authentication will | |
| # be allowed through the ChallengeResponseAuthentication mechanism. | |
| # Depending on your PAM configuration, this may bypass the setting of | |
| # "PermitRootLogin without-password". If you just want the PAM account and | |
| # session checks to run without PAM authentication, then enable this but set | |
| # ChallengeResponseAuthentication=no | |
| #UsePAM no | |
| UsePAM yes | |
| #AllowTcpForwarding yes | |
| #GatewayPorts no | |
| #X11Forwarding no | |
| #X11DisplayOffset 10 | |
| #X11UseLocalhost yes | |
| PrintMotd yes | |
| PrintLastLog yes | |
| #TCPKeepAlive yes | |
| #UseLogin no | |
| # Security Enhanced - http://www.linuxsecurity.com/content/view/124601/177/ | |
| UsePrivilegeSeparation yes | |
| #PermitUserEnvironment no | |
| Compression yes | |
| ClientAliveInterval 120 | |
| ClientAliveCountMax 3 | |
| UseDNS no | |
| PidFile /var/run/sshd.pid | |
| #MaxStartups 10 | |
| ShowPatchLevel no | |
| # no default banner path | |
| Banner /etc/issue.net | |
| # override default of no subsystems | |
| Subsystem sftp /usr/libexec/openssh/sftp-server |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment