[sshd_config]
     The stategy now used for options in the default sshd_config shipped
     with OpenSSH is to specify options with their default value where
     possible, but leave them commented.  Uncommented options change a
     default value.  Subsystem is currently the only default option
     changed.  ok markus@
This commit is contained in:
Damien Miller 2002-01-22 23:32:07 +11:00
parent b16461ce45
commit 2bec5c1543
2 changed files with 62 additions and 46 deletions

View File

@ -185,6 +185,13 @@
- markus@cvs.openbsd.org 2002/01/16 13:17:51 - markus@cvs.openbsd.org 2002/01/16 13:17:51
[channels.c channels.h serverloop.c ssh.c] [channels.c channels.h serverloop.c ssh.c]
wrapper for channel_setup_fwd_listener wrapper for channel_setup_fwd_listener
- stevesk@cvs.openbsd.org 2002/01/16 17:40:23
[sshd_config]
The stategy now used for options in the default sshd_config shipped
with OpenSSH is to specify options with their default value where
possible, but leave them commented. Uncommented options change a
default value. Subsystem is currently the only default option
changed. ok markus@
20020121 20020121
- (djm) Rework ssh-rand-helper: - (djm) Rework ssh-rand-helper:
@ -7332,4 +7339,4 @@
- Wrote replacements for strlcpy and mkdtemp - Wrote replacements for strlcpy and mkdtemp
- Released 1.0pre1 - Released 1.0pre1
$Id: ChangeLog,v 1.1775 2002/01/22 12:29:22 djm Exp $ $Id: ChangeLog,v 1.1776 2002/01/22 12:32:07 djm Exp $

View File

@ -1,80 +1,89 @@
# $OpenBSD: sshd_config,v 1.43 2001/12/19 07:18:56 deraadt Exp $ # $OpenBSD: sshd_config,v 1.44 2002/01/16 17:40:23 stevesk Exp $
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
# This is the sshd server system-wide configuration file. See sshd(8) # This is the sshd server system-wide configuration file. See sshd(8)
# for more information. # for more information.
Port 22 # The stategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.
#Port 22
#Protocol 2,1 #Protocol 2,1
#ListenAddress 0.0.0.0 #ListenAddress 0.0.0.0
#ListenAddress :: #ListenAddress ::
# HostKey for protocol version 1 # HostKey for protocol version 1
HostKey /etc/ssh_host_key #HostKey /etc/ssh_host_key
# HostKeys for protocol version 2 # HostKeys for protocol version 2
HostKey /etc/ssh_host_rsa_key #HostKey /etc/ssh_host_rsa_key
HostKey /etc/ssh_host_dsa_key #HostKey /etc/ssh_host_dsa_key
# Lifetime and size of ephemeral version 1 server key # Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600 #KeyRegenerationInterval 3600
ServerKeyBits 768 #ServerKeyBits 768
# Logging # Logging
SyslogFacility AUTH
LogLevel INFO
#obsoletes QuietMode and FascistLogging #obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
#LogLevel INFO
# Authentication: # Authentication:
LoginGraceTime 600 #LoginGraceTime 600
PermitRootLogin yes #PermitRootLogin yes
StrictModes yes #StrictModes yes
RSAAuthentication yes #RSAAuthentication yes
PubkeyAuthentication yes #PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys #AuthorizedKeysFile .ssh/authorized_keys
# rhosts authentication should not be used # rhosts authentication should not be used
RhostsAuthentication no #RhostsAuthentication no
# Don't read the user's ~/.rhosts and ~/.shosts files # Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes #IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts # For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no #RhostsRSAAuthentication no
# similar for protocol version 2 # similar for protocol version 2
HostbasedAuthentication no #HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication # Change to yes if you don't trust ~/.ssh/known_hosts for
#IgnoreUserKnownHosts yes # RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
# To disable tunneled clear text passwords, change to no here! # To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes #PasswordAuthentication yes
PermitEmptyPasswords no #PermitEmptyPasswords no
# Uncomment to disable s/key passwords # Change to no to disable s/key passwords
#ChallengeResponseAuthentication no #ChallengeResponseAuthentication yes
# Uncomment to enable PAM keyboard-interactive authentication # Kerberos options
# KerberosAuthentication automatically enabled if keyfile exists
#KerberosAuthentication yes
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
# AFSTokenPassing automatically enabled if k_hasafs() is true
#AFSTokenPassing yes
# Kerberos TGT Passing only works with the AFS kaserver
#KerberosTgtPassing no
# Set this to 'yes' to enable PAM keyboard-interactive authentication
# Warning: enabling this may bypass the setting of 'PasswordAuthentication' # Warning: enabling this may bypass the setting of 'PasswordAuthentication'
#PAMAuthenticationViaKbdInt yes #PAMAuthenticationViaKbdInt yes
# To change Kerberos options #X11Forwarding no
#KerberosAuthentication no #X11DisplayOffset 10
#KerberosOrLocalPasswd yes #PrintMotd yes
#AFSTokenPassing no #PrintLastLog yes
#KerberosTicketCleanup no #KeepAlive yes
# Kerberos TGT Passing does only work with the AFS kaserver
#KerberosTgtPassing yes
X11Forwarding no
X11DisplayOffset 10
PrintMotd yes
#PrintLastLog no
KeepAlive yes
#UseLogin no #UseLogin no
#MaxStartups 10:30:60 #MaxStartups 10
#Banner /etc/issue.net # no default banner path
#ReverseMappingCheck yes #Banner /some/path
#ReverseMappingCheck no
# override default of no subsystems
Subsystem sftp /usr/libexec/sftp-server Subsystem sftp /usr/libexec/sftp-server