1 # Package generated configuration file
2 # See the sshd_config(5) manpage for details
4 # What ports, IPs and protocols we listen for
6 # Use these options to restrict which interfaces/protocols sshd will bind to
10 # HostKeys for protocol version 2
11 HostKey /etc/ssh/ssh_host_rsa_key
12 #HostKey /etc/ssh/ssh_host_dsa_key
13 #HostKey /etc/ssh/ssh_host_ecdsa_key
14 #Privilege Separation is turned on for security
15 UsePrivilegeSeparation yes
17 # Lifetime and size of ephemeral version 1 server key
18 KeyRegenerationInterval 3600
27 PermitRootLogin no # or 'without-password' to allow SSH key based login
31 PubkeyAuthentication yes
32 #AuthorizedKeysFile %h/.ssh/authorized_keys
34 # Don't read the user's ~/.rhosts and ~/.shosts files
36 # For this to work you will also need host keys in /etc/ssh_known_hosts
37 RhostsRSAAuthentication no
38 # similar for protocol version 2
39 HostbasedAuthentication no
40 # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
41 #IgnoreUserKnownHosts yes
43 # To enable empty passwords, change to yes (NOT RECOMMENDED)
44 PermitEmptyPasswords no
46 # Change to yes to enable challenge-response passwords (beware issues with
47 # some PAM modules and threads)
48 ChallengeResponseAuthentication no
50 # Change to no to disable tunnelled clear text passwords
51 #PasswordAuthentication yes
54 #KerberosAuthentication no
55 #KerberosGetAFSToken no
56 #KerberosOrLocalPasswd yes
57 #KerberosTicketCleanup yes
60 #GSSAPIAuthentication no
61 #GSSAPICleanupCredentials yes
64 Ciphers aes256-ctr,aes128-ctr
65 MACs hmac-sha2-512,hmac-sha2-256,hmac-ripemd160
66 KexAlgorithms diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
76 #Banner /etc/issue.net
78 # Allow client to pass locale environment variables
81 Subsystem sftp /usr/lib/openssh/sftp-server
83 # Set this to 'yes' to enable PAM authentication, account processing,
84 # and session processing. If this is enabled, PAM authentication will
85 # be allowed through the ChallengeResponseAuthentication and
86 # PasswordAuthentication. Depending on your PAM configuration,
87 # PAM authentication via ChallengeResponseAuthentication may bypass
88 # the setting of "PermitRootLogin without-password".
89 # If you just want the PAM account and session checks to run without
90 # PAM authentication, then enable this but set PasswordAuthentication
91 # and ChallengeResponseAuthentication to 'no'.