Sshd config
From FreeBSDwiki
Revision as of 15:30, 24 May 2011 by 83.248.177.186 (Talk)
Whenever you edit sshd_config, you'll want to restart sshd: /etc/rc.d/sshd restart
Example sshd_config file, from a newly installed 8.2-RELEASE system:
- $OpenBSD: sshd_config,v 1.81 2009/10/08 14:03:41 markus Exp $
- $FreeBSD: src/crypto/openssh/sshd_config,v 1.49.2.2.4.1 2010/12/21 17:09:25 kensmith Exp $
- This is the sshd server system-wide configuration file. See
- sshd_config(5) for more information.
- This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
- The strategy used for options in the default sshd_config shipped with
- OpenSSH is to specify options with their default value where
- possible, but leave them commented. Uncommented options change a
- default value.
- Note that some of FreeBSD's defaults differ from OpenBSD's, and
- FreeBSD has a few additional options.
- VersionAddendum FreeBSD-20100308
- Port 22
- AddressFamily any
- ListenAddress 0.0.0.0
- ListenAddress ::
- The default requires explicit activation of protocol 1
- Protocol 2
- HostKey for protocol version 1
- HostKey /etc/ssh/ssh_host_key
- HostKeys for protocol version 2
- HostKey /etc/ssh/ssh_host_rsa_key
- HostKey /etc/ssh/ssh_host_dsa_key
- Lifetime and size of ephemeral version 1 server key
- KeyRegenerationInterval 1h
- ServerKeyBits 1024
- Logging
- obsoletes QuietMode and FascistLogging
- SyslogFacility AUTH
- LogLevel INFO
- Authentication:
- LoginGraceTime 2m
- PermitRootLogin no
- StrictModes yes
- MaxAuthTries 6
- MaxSessions 10
- RSAAuthentication yes
- PubkeyAuthentication yes
- AuthorizedKeysFile .ssh/authorized_keys
- For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
- RhostsRSAAuthentication no
- similar for protocol version 2
- HostbasedAuthentication no
- Change to yes if you don't trust ~/.ssh/known_hosts for
- RhostsRSAAuthentication and HostbasedAuthentication
- IgnoreUserKnownHosts no
- Don't read the user's ~/.rhosts and ~/.shosts files
- IgnoreRhosts yes
- Change to yes to enable built-in password authentication.
- PasswordAuthentication no
- PermitEmptyPasswords no
- Change to no to disable PAM authentication
- ChallengeResponseAuthentication yes
- Kerberos options
- KerberosAuthentication no
- KerberosOrLocalPasswd yes
- KerberosTicketCleanup yes
- KerberosGetAFSToken no
- GSSAPI options
- GSSAPIAuthentication no
- GSSAPICleanupCredentials yes
- Set this to 'no' to disable PAM authentication, account processing,
- and session processing. If this is enabled, PAM authentication will
- be allowed through the ChallengeResponseAuthentication and
- PasswordAuthentication. Depending on your PAM configuration,
- PAM authentication via ChallengeResponseAuthentication may bypass
- the setting of "PermitRootLogin without-password".
- If you just want the PAM account and session checks to run without
- PAM authentication, then enable this but set PasswordAuthentication
- and ChallengeResponseAuthentication to 'no'.
- UsePAM yes
- AllowAgentForwarding yes
- AllowTcpForwarding yes
- GatewayPorts no
- X11Forwarding yes
- X11DisplayOffset 10
- X11UseLocalhost yes
- PrintMotd yes
- PrintLastLog yes
- TCPKeepAlive yes
- UseLogin no
- UsePrivilegeSeparation yes
- PermitUserEnvironment no
- Compression delayed
- ClientAliveInterval 0
- ClientAliveCountMax 3
- UseDNS yes
- PidFile /var/run/sshd.pid
- MaxStartups 10
- PermitTunnel no
- ChrootDirectory none
- no default banner path
- Banner none
- override default of no subsystems
Subsystem sftp /usr/libexec/sftp-server
- Example of overriding settings on a per-user basis
- Match User anoncvs
- X11Forwarding no
- AllowTcpForwarding no
- ForceCommand cvs server