blob: 15f061b570a41f6708178c7cdd8eda9c555d5e3c [file] [log] [blame]
Brad Bishop1a4b7ee2018-12-16 17:11:34 -08001# $OpenBSD: sshd_config,v 1.102 2018/02/16 02:32:40 djm Exp $
Patrick Williamsc124f4f2015-09-15 14:41:29 -05002
3# This is the sshd server system-wide configuration file. See
4# sshd_config(5) for more information.
5
6# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
7
8# The strategy used for options in the default sshd_config shipped with
9# OpenSSH is to specify options with their default value where
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080010# possible, but leave them commented. Uncommented options override the
Patrick Williamsc124f4f2015-09-15 14:41:29 -050011# default value.
12
13#Port 22
14#AddressFamily any
15#ListenAddress 0.0.0.0
16#ListenAddress ::
17
Patrick Williamsc124f4f2015-09-15 14:41:29 -050018#HostKey /etc/ssh/ssh_host_rsa_key
Patrick Williamsc124f4f2015-09-15 14:41:29 -050019#HostKey /etc/ssh/ssh_host_ecdsa_key
20#HostKey /etc/ssh/ssh_host_ed25519_key
21
Patrick Williamsc124f4f2015-09-15 14:41:29 -050022# Ciphers and keying
23#RekeyLimit default none
24
25# Logging
Patrick Williamsc124f4f2015-09-15 14:41:29 -050026#SyslogFacility AUTH
27#LogLevel INFO
28
29# Authentication:
30
31#LoginGraceTime 2m
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080032#PermitRootLogin prohibit-password
Patrick Williamsc124f4f2015-09-15 14:41:29 -050033#StrictModes yes
34#MaxAuthTries 6
35#MaxSessions 10
36
Patrick Williamsc124f4f2015-09-15 14:41:29 -050037#PubkeyAuthentication yes
38
39# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
40# but this is overridden so installations will only check .ssh/authorized_keys
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080041AuthorizedKeysFile .ssh/authorized_keys
Patrick Williamsc124f4f2015-09-15 14:41:29 -050042
43#AuthorizedPrincipalsFile none
44
45#AuthorizedKeysCommand none
46#AuthorizedKeysCommandUser nobody
47
48# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
Patrick Williamsc124f4f2015-09-15 14:41:29 -050049#HostbasedAuthentication no
50# Change to yes if you don't trust ~/.ssh/known_hosts for
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080051# HostbasedAuthentication
Patrick Williamsc124f4f2015-09-15 14:41:29 -050052#IgnoreUserKnownHosts no
53# Don't read the user's ~/.rhosts and ~/.shosts files
54#IgnoreRhosts yes
55
56# To disable tunneled clear text passwords, change to no here!
57#PasswordAuthentication yes
58#PermitEmptyPasswords no
59
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080060# Change to yes to enable challenge-response passwords (beware issues with
61# some PAM modules and threads)
Patrick Williamsc124f4f2015-09-15 14:41:29 -050062ChallengeResponseAuthentication no
63
64# Kerberos options
65#KerberosAuthentication no
66#KerberosOrLocalPasswd yes
67#KerberosTicketCleanup yes
68#KerberosGetAFSToken no
69
70# GSSAPI options
71#GSSAPIAuthentication no
72#GSSAPICleanupCredentials yes
73
74# Set this to 'yes' to enable PAM authentication, account processing,
75# and session processing. If this is enabled, PAM authentication will
76# be allowed through the ChallengeResponseAuthentication and
77# PasswordAuthentication. Depending on your PAM configuration,
78# PAM authentication via ChallengeResponseAuthentication may bypass
79# the setting of "PermitRootLogin without-password".
80# If you just want the PAM account and session checks to run without
81# PAM authentication, then enable this but set PasswordAuthentication
82# and ChallengeResponseAuthentication to 'no'.
83#UsePAM no
84
85#AllowAgentForwarding yes
86#AllowTcpForwarding yes
87#GatewayPorts no
88#X11Forwarding no
89#X11DisplayOffset 10
90#X11UseLocalhost yes
91#PermitTTY yes
92#PrintMotd yes
93#PrintLastLog yes
94#TCPKeepAlive yes
95#UseLogin no
Patrick Williamsc124f4f2015-09-15 14:41:29 -050096#PermitUserEnvironment no
97Compression no
98ClientAliveInterval 15
99ClientAliveCountMax 4
Brad Bishop1a4b7ee2018-12-16 17:11:34 -0800100#UseDNS no
Patrick Williamsc124f4f2015-09-15 14:41:29 -0500101#PidFile /var/run/sshd.pid
102#MaxStartups 10:30:100
103#PermitTunnel no
104#ChrootDirectory none
105#VersionAddendum none
106
107# no default banner path
108#Banner none
109
110# override default of no subsystems
111Subsystem sftp /usr/libexec/sftp-server
112
113# Example of overriding settings on a per-user basis
114#Match User anoncvs
115# X11Forwarding no
116# AllowTcpForwarding no
117# PermitTTY no
118# ForceCommand cvs server