1# $OpenBSD: sshd_config,v 1.87 2012/07/10 02:19:15 djm Exp $ 2# $FreeBSD$ 3 4# This is the sshd server system-wide configuration file. See 5# sshd_config(5) for more information. 6 7# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin 8 9# The strategy used for options in the default sshd_config shipped with 10# OpenSSH is to specify options with their default value where 11# possible, but leave them commented. Uncommented options override the 12# default value. 13 14# Note that some of FreeBSD's defaults differ from OpenBSD's, and 15# FreeBSD has a few additional options. 16 17#Port 22 18#AddressFamily any 19#ListenAddress 0.0.0.0 20#ListenAddress :: 21 22# The default requires explicit activation of protocol 1 23#Protocol 2 24 25# HostKey for protocol version 1 26#HostKey /etc/ssh/ssh_host_key 27# HostKeys for protocol version 2 28#HostKey /etc/ssh/ssh_host_rsa_key 29#HostKey /etc/ssh/ssh_host_dsa_key 30#HostKey /etc/ssh/ssh_host_ecdsa_key 31 32# Lifetime and size of ephemeral version 1 server key 33#KeyRegenerationInterval 1h 34#ServerKeyBits 1024 35 36# Logging 37# obsoletes QuietMode and FascistLogging 38#SyslogFacility AUTH 39#LogLevel INFO 40 41# Authentication: 42 43#LoginGraceTime 2m 44#PermitRootLogin no 45#StrictModes yes 46#MaxAuthTries 6 47#MaxSessions 10 48 49#RSAAuthentication yes 50#PubkeyAuthentication yes 51 52# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 53# but this is overridden so installations will only check .ssh/authorized_keys 54AuthorizedKeysFile .ssh/authorized_keys 55 56#AuthorizedPrincipalsFile none 57 58# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts 59#RhostsRSAAuthentication no 60# similar for protocol version 2 61#HostbasedAuthentication no 62# Change to yes if you don't trust ~/.ssh/known_hosts for 63# RhostsRSAAuthentication and HostbasedAuthentication 64#IgnoreUserKnownHosts no 65# Don't read the user's ~/.rhosts and ~/.shosts files 66#IgnoreRhosts yes 67 68# Change to yes to enable built-in password authentication. 69#PasswordAuthentication no 70#PermitEmptyPasswords no 71 72# Change to no to disable PAM authentication 73#ChallengeResponseAuthentication yes 74 75# Kerberos options 76#KerberosAuthentication no 77#KerberosOrLocalPasswd yes 78#KerberosTicketCleanup yes 79#KerberosGetAFSToken no 80 81# GSSAPI options 82#GSSAPIAuthentication no 83#GSSAPICleanupCredentials yes 84 85# Set this to 'no' to disable PAM authentication, account processing, 86# and session processing. If this is enabled, PAM authentication will 87# be allowed through the ChallengeResponseAuthentication and 88# PasswordAuthentication. Depending on your PAM configuration, 89# PAM authentication via ChallengeResponseAuthentication may bypass 90# the setting of "PermitRootLogin without-password". 91# If you just want the PAM account and session checks to run without 92# PAM authentication, then enable this but set PasswordAuthentication 93# and ChallengeResponseAuthentication to 'no'. 94#UsePAM yes 95 96#AllowAgentForwarding yes 97#AllowTcpForwarding yes 98#GatewayPorts no 99#X11Forwarding yes 100#X11DisplayOffset 10 101#X11UseLocalhost yes 102#PrintMotd yes 103#PrintLastLog yes 104#TCPKeepAlive yes 105#UseLogin no 106#UsePrivilegeSeparation sandbox 107#PermitUserEnvironment no 108#Compression delayed 109#ClientAliveInterval 0 110#ClientAliveCountMax 3 111#UseDNS yes 112#PidFile /var/run/sshd.pid 113#MaxStartups 10 114#PermitTunnel no 115#ChrootDirectory none 116#VersionAddendum FreeBSD-20120901 117 118# no default banner path 119#Banner none 120 121# override default of no subsystems 122Subsystem sftp /usr/libexec/sftp-server 123 124# Disable HPN tuning improvements. 125#HPNDisabled no 126 127# Buffer size for HPN to non-HPN connections. 128#HPNBufferSize 2048 129 130# TCP receive socket buffer polling for HPN. Disable on non autotuning kernels. 131#TcpRcvBufPoll yes 132 133# Allow the use of the NONE cipher. 134#NoneEnabled no 135 136# Example of overriding settings on a per-user basis 137#Match User anoncvs 138# X11Forwarding no 139# AllowTcpForwarding no 140# ForceCommand cvs server 141