|
Include /etc/ssh/sshd_config.d/*.conf |
|
|
|
#Port 22 |
|
#AddressFamily any |
|
#ListenAddress 0.0.0.0 |
|
#ListenAddress :: |
|
|
|
#HostKey /etc/ssh/ssh_host_rsa_key |
|
#HostKey /etc/ssh/ssh_host_ecdsa_key |
|
#HostKey /etc/ssh/ssh_host_ed25519_key |
|
|
|
# Ciphers and keying |
|
#RekeyLimit default none |
|
|
|
# Logging |
|
#SyslogFacility AUTH |
|
#LogLevel INFO |
|
|
|
# Authentication: |
|
LoginGraceTime 60m |
|
#PermitRootLogin yes |
|
#StrictModes yes |
|
#MaxAuthTries 6 |
|
#MaxSessions 10 |
|
|
|
PubkeyAuthentication yes |
|
|
|
# Expect .ssh/authorized_keys2 to be disregarded by default in future. |
|
#AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2 |
|
|
|
#AuthorizedPrincipalsFile none |
|
|
|
#AuthorizedKeysCommand none |
|
#AuthorizedKeysCommandUser nobody |
|
|
|
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts |
|
#HostbasedAuthentication no |
|
# Change to yes if you don't trust ~/.ssh/known_hosts for |
|
# HostbasedAuthentication |
|
#IgnoreUserKnownHosts no |
|
# Don't read the user's ~/.rhosts and ~/.shosts files |
|
#IgnoreRhosts yes |
|
|
|
# To disable tunneled clear text passwords, change to no here! |
|
#PasswordAuthentication yes |
|
#PermitEmptyPasswords no |
|
|
|
# Change to yes to enable challenge-response passwords (beware issues with |
|
# some PAM modules and threads) |
|
ChallengeResponseAuthentication no |
|
|
|
# Kerberos options |
|
#KerberosAuthentication no |
|
#KerberosOrLocalPasswd yes |
|
#KerberosTicketCleanup yes |
|
#KerberosGetAFSToken no |
|
|
|
# GSSAPI options |
|
#GSSAPIAuthentication no |
|
#GSSAPICleanupCredentials yes |
|
#GSSAPIStrictAcceptorCheck yes |
|
#GSSAPIKeyExchange no |
|
|
|
# Set this to 'yes' to enable PAM authentication, account processing, |
|
# and session processing. If this is enabled, PAM authentication will |
|
# be allowed through the ChallengeResponseAuthentication and |
|
# PasswordAuthentication. Depending on your PAM configuration, |
|
# PAM authentication via ChallengeResponseAuthentication may bypass |
|
# the setting of "PermitRootLogin without-password". |
|
# If you just want the PAM account and session checks to run without |
|
# PAM authentication, then enable this but set PasswordAuthentication |
|
# and ChallengeResponseAuthentication to 'no'. |
|
UsePAM yes |
|
|
|
AllowAgentForwarding yes |
|
#AllowTcpForwarding yes |
|
#GatewayPorts no |
|
X11Forwarding yes |
|
#X11DisplayOffset 10 |
|
X11UseLocalhost no |
|
PermitTTY yes |
|
PrintMotd yes |
|
#PrintLastLog yes |
|
TCPKeepAlive yes |
|
#PermitUserEnvironment no |
|
#Compression delayed |
|
#ClientAliveInterval 0 |
|
#ClientAliveCountMax 3 |
|
#UseDNS no |
|
#PidFile /var/run/sshd.pid |
|
#MaxStartups 10:30:100 |
|
#PermitTunnel no |
|
#ChrootDirectory none |
|
#VersionAddendum none |
|
|
|
# Banner /etc/ssh/banner |
|
|
|
# Allow client to pass locale environment variables |
|
AcceptEnv LANG LC_* |
|
|
|
# override default of no subsystems |
|
Subsystem sftp /usr/lib/openssh/sftp-server |
|
|
|
# Example of overriding settings on a per-user basis |
|
#Match User anoncvs |
|
X11Forwarding yes |
|
AllowTcpForwarding yes |
|
PermitTTY yes |
|
# ForceCommand cvs server |