Annotation of src/crypto/dist/ssh/sshd_config, Revision 1.12
1.12 ! itojun 1: # $NetBSD: sshd_config,v 1.11 2002/03/11 04:57:57 itojun Exp $
! 2: # $OpenBSD: sshd_config,v 1.50 2002/04/21 16:19:27 stevesk Exp $
1.1 itojun 3:
4: # This is the sshd server system-wide configuration file. See sshd(8)
5: # for more information.
6:
1.10 itojun 7: # The strategy used for options in the default sshd_config shipped with
8: # OpenSSH is to specify options with their default value where
9: # possible, but leave them commented. Uncommented options change a
10: # default value.
11:
12: #Port 22
1.1 itojun 13: #Protocol 2,1
14: #ListenAddress 0.0.0.0
15: #ListenAddress ::
1.7 itojun 16:
17: # HostKey for protocol version 1
1.11 itojun 18: #HostKey /etc/ssh/ssh_host_key
1.7 itojun 19: # HostKeys for protocol version 2
1.11 itojun 20: #HostKey /etc/ssh/ssh_host_rsa_key
21: #HostKey /etc/ssh/ssh_host_dsa_key
1.7 itojun 22:
23: # Lifetime and size of ephemeral version 1 server key
1.10 itojun 24: #KeyRegenerationInterval 3600
25: #ServerKeyBits 768
1.1 itojun 26:
27: # Logging
28: #obsoletes QuietMode and FascistLogging
1.10 itojun 29: #SyslogFacility AUTH
30: #LogLevel INFO
1.1 itojun 31:
1.7 itojun 32: # Authentication:
33:
1.10 itojun 34: #LoginGraceTime 600
35: #PermitRootLogin no
36: #StrictModes yes
37:
38: #RSAAuthentication yes
39: #PubkeyAuthentication yes
40: #AuthorizedKeysFile .ssh/authorized_keys
1.7 itojun 41:
42: # rhosts authentication should not be used
1.10 itojun 43: #RhostsAuthentication no
1.7 itojun 44: # Don't read the user's ~/.rhosts and ~/.shosts files
1.10 itojun 45: #IgnoreRhosts yes
46: #IgnoreRootRhosts yes
1.11 itojun 47: # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
1.10 itojun 48: #RhostsRSAAuthentication no
1.5 itojun 49: # similar for protocol version 2
1.10 itojun 50: #HostbasedAuthentication no
51: # Change to yes if you don't trust ~/.ssh/known_hosts for
52: # RhostsRSAAuthentication and HostbasedAuthentication
53: #IgnoreUserKnownHosts no
1.1 itojun 54:
55: # To disable tunneled clear text passwords, change to no here!
1.10 itojun 56: #PasswordAuthentication yes
57: #PermitEmptyPasswords no
1.1 itojun 58:
1.10 itojun 59: # Change to no to disable s/key passwords
60: #ChallengeResponseAuthentication yes
1.1 itojun 61:
1.10 itojun 62: # Kerberos options
63: # KerberosAuthentication automatically enabled if keyfile exists
64: #KerberosAuthentication yes
1.1 itojun 65: #KerberosOrLocalPasswd yes
1.10 itojun 66: #KerberosTicketCleanup yes
67:
1.12 ! itojun 68: #AFSTokenPassing no
1.1 itojun 69:
1.10 itojun 70: # Kerberos TGT Passing only works with the AFS kaserver
71: #KerberosTgtPassing no
1.1 itojun 72:
1.10 itojun 73: #X11Forwarding no
74: #X11DisplayOffset 10
75: #X11UseLocalhost yes
76: #PrintMotd yes
77: #PrintLastLog yes
78: #KeepAlive yes
1.1 itojun 79: #UseLogin no
1.12 ! itojun 80: #UsePrivilegeSeparation no
1.1 itojun 81:
1.10 itojun 82: #MaxStartups 10
83: # no default banner path
84: #Banner /some/path
85: #VerifyReverseMapping no
1.1 itojun 86:
1.10 itojun 87: # override default of no subsystems
1.1 itojun 88: Subsystem sftp /usr/libexec/sftp-server
CVSweb <webmaster@jp.NetBSD.org>