117 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			117 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
#	$OpenBSD: sshd_config,v 1.103 2018/04/09 20:41:22 tj Exp $
 | 
						|
 | 
						|
# This is the sshd server system-wide configuration file.  See
 | 
						|
# sshd_config(5) for more information.
 | 
						|
 | 
						|
# This sshd was compiled with PATH=/usr/local/sbin:/usr/local/bin:/usr/bin
 | 
						|
 | 
						|
# The strategy used for options in the default sshd_config shipped with
 | 
						|
# OpenSSH is to specify options with their default value where
 | 
						|
# possible, but leave them commented.  Uncommented options override the
 | 
						|
# default value.
 | 
						|
 | 
						|
Port 8889
 | 
						|
#AddressFamily any
 | 
						|
#ListenAddress 0.0.0.0
 | 
						|
#ListenAddress ::
 | 
						|
 | 
						|
#HostKey /etc/ssh/ssh_host_rsa_key
 | 
						|
#HostKey /etc/ssh/ssh_host_ecdsa_key
 | 
						|
#HostKey /etc/ssh/ssh_host_ed25519_key
 | 
						|
 | 
						|
# Ciphers and keying
 | 
						|
#RekeyLimit default none
 | 
						|
 | 
						|
# Logging
 | 
						|
#SyslogFacility AUTH
 | 
						|
#LogLevel INFO
 | 
						|
 | 
						|
# Authentication:
 | 
						|
 | 
						|
#LoginGraceTime 2m
 | 
						|
#PermitRootLogin prohibit-password
 | 
						|
#StrictModes yes
 | 
						|
#MaxAuthTries 6
 | 
						|
#MaxSessions 10
 | 
						|
 | 
						|
#PubkeyAuthentication yes
 | 
						|
 | 
						|
# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
 | 
						|
# but this is overridden so installations will only check .ssh/authorized_keys
 | 
						|
AuthorizedKeysFile	.ssh/authorized_keys
 | 
						|
 | 
						|
#AuthorizedPrincipalsFile none
 | 
						|
 | 
						|
#AuthorizedKeysCommand none
 | 
						|
#AuthorizedKeysCommandUser nobody
 | 
						|
 | 
						|
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
 | 
						|
#HostbasedAuthentication no
 | 
						|
# Change to yes if you don't trust ~/.ssh/known_hosts for
 | 
						|
# HostbasedAuthentication
 | 
						|
#IgnoreUserKnownHosts no
 | 
						|
# Don't read the user's ~/.rhosts and ~/.shosts files
 | 
						|
#IgnoreRhosts yes
 | 
						|
 | 
						|
# To disable tunneled clear text passwords, change to no here!
 | 
						|
PasswordAuthentication no
 | 
						|
PermitEmptyPasswords no
 | 
						|
 | 
						|
# Enable X11 forwarding
 | 
						|
# X11Forwarding yes
 | 
						|
# X11UseLocalhost yes
 | 
						|
# AllowTcpForwarding yes
 | 
						|
# X11DisplayOffset 10
 | 
						|
 | 
						|
# Change to no to disable s/key passwords
 | 
						|
ChallengeResponseAuthentication no
 | 
						|
 | 
						|
# Kerberos options
 | 
						|
#KerberosAuthentication no
 | 
						|
#KerberosOrLocalPasswd yes
 | 
						|
#KerberosTicketCleanup yes
 | 
						|
#KerberosGetAFSToken no
 | 
						|
 | 
						|
# GSSAPI options
 | 
						|
#GSSAPIAuthentication no
 | 
						|
#GSSAPICleanupCredentials yes
 | 
						|
 | 
						|
# Set this to 'yes' to enable PAM authentication, account processing,
 | 
						|
# and session processing. If this is enabled, PAM authentication will
 | 
						|
# be allowed through the ChallengeResponseAuthentication and
 | 
						|
# PasswordAuthentication.  Depending on your PAM configuration,
 | 
						|
# PAM authentication via ChallengeResponseAuthentication may bypass
 | 
						|
# the setting of "PermitRootLogin without-password".
 | 
						|
# If you just want the PAM account and session checks to run without
 | 
						|
# PAM authentication, then enable this but set PasswordAuthentication
 | 
						|
# and ChallengeResponseAuthentication to 'no'.
 | 
						|
UsePAM yes
 | 
						|
 | 
						|
#GatewayPorts no
 | 
						|
#PermitTTY yes
 | 
						|
PrintMotd no # pam does that
 | 
						|
#PrintLastLog yes
 | 
						|
#TCPKeepAlive yes
 | 
						|
#PermitUserEnvironment no
 | 
						|
#Compression delayed
 | 
						|
#ClientAliveInterval 0
 | 
						|
#ClientAliveCountMax 3
 | 
						|
#UseDNS no
 | 
						|
#PidFile /run/sshd.pid
 | 
						|
#MaxStartups 10:30:100
 | 
						|
#PermitTunnel no
 | 
						|
#ChrootDirectory none
 | 
						|
#VersionAddendum none
 | 
						|
 | 
						|
# Ciphers and keying
 | 
						|
# Restrict key exchange, cipher, and MAC algorithms, as per sshaudit.com
 | 
						|
# hardening guide
 | 
						|
KexAlgorithms curve25519-sha256,curve25519-sha256@libssh.org,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha256
 | 
						|
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
 | 
						|
MACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,umac-128-etm@openssh.com
 | 
						|
HostKeyAlgorithms ssh-ed25519,ssh-ed25519-cert-v01@openssh.com
 | 
						|
#RekeyLimit default none
 | 
						|
 | 
						|
# override default of no subsystems
 | 
						|
Subsystem	sftp	/usr/lib/ssh/sftp-server
 |