[BACK]Return to sshd_config.in CVS log [TXT][DIR] Up to [cvs.NetBSD.org] / src / tests / fs / psshfs

File: [cvs.NetBSD.org] / src / tests / fs / psshfs / sshd_config.in (download)

Revision 1.3, Mon May 22 21:22:30 2017 UTC (4 years, 6 months ago) by christos
Branch: MAIN
CVS Tags: phil-wifi-base, phil-wifi-20200421, phil-wifi-20200411, phil-wifi-20200406, phil-wifi-20191119, phil-wifi-20190609, phil-wifi, pgoyette-compat-merge-20190127, pgoyette-compat-base, pgoyette-compat-20190127, pgoyette-compat-20190118, pgoyette-compat-1226, pgoyette-compat-1126, pgoyette-compat-1020, pgoyette-compat-0930, pgoyette-compat-0906, pgoyette-compat-0728, pgoyette-compat-0625, pgoyette-compat-0521, pgoyette-compat-0502, pgoyette-compat-0422, pgoyette-compat-0415, pgoyette-compat-0407, pgoyette-compat-0330, pgoyette-compat-0322, pgoyette-compat-0315, pgoyette-compat, perseant-stdc-iso10646-base, perseant-stdc-iso10646, netbsd-9-base, netbsd-9-2-RELEASE, netbsd-9-1-RELEASE, netbsd-9-0-RELEASE, netbsd-9-0-RC2, netbsd-9-0-RC1, netbsd-9, netbsd-8-base, netbsd-8-2-RELEASE, netbsd-8-1-RELEASE, netbsd-8-1-RC1, netbsd-8-0-RELEASE, netbsd-8-0-RC2, netbsd-8-0-RC1, netbsd-8, matt-nb8-mediatek-base, matt-nb8-mediatek, is-mlppp-base, is-mlppp, cjep_sun2x-base1, cjep_sun2x-base, cjep_sun2x, cjep_staticlib_x-base1, cjep_staticlib_x-base, cjep_staticlib_x, HEAD
Changes since 1.2: +1 -2 lines

there is no more UsePrivilegeSeparation

# $NetBSD: sshd_config.in,v 1.3 2017/05/22 21:22:30 christos Exp $

# Basic settings.
Port 10000
Protocol 2

# Provide information to the user in case something goes wrong.
LogLevel DEBUG1

# The host key.  It lives in the work directory because we need to set
# very strict permissions on it and cannot modify the copy on the source
# directory.
HostKey @WORKDIR@/ssh_host_key

# The authorized keys file we set up during the test to allow the client
# to safely log in.  We need to disable strict modes because ATF_WORKDIR
# usually lives in /tmp, which has 1777 permissions and are not liked by
# sshd.
AuthorizedKeysFile @WORKDIR@/authorized_keys
StrictModes no

# Some settings to allow user runs of sshd.
PidFile @WORKDIR@/sshd.pid
Subsystem sftp @WORKDIR@/sftp-server
UsePam no

# The root user should also be able to run the tests.
PermitRootLogin yes

# Be restrictive about access to the temporary server.  Only allow key-based
# authentication.
ChallengeResponseAuthentication no
GSSAPIAuthentication no
HostbasedAuthentication no
KerberosAuthentication no
MaxAuthTries 1
MaxStartups 1
PasswordAuthentication no
PubkeyAuthentication yes