Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Package generated configuration file
- # See the sshd_config(5) manpage for details
- # What ports, IPs and protocols we listen for
- Port 9090
- # Use these options to restrict which interfaces/protocols sshd will bind to
- #ListenAddress ::
- #ListenAddress 0.0.0.0
- Protocol 2
- # HostKeys for protocol version 2
- #HostKey /etc/ssh/ssh_host_rsa_key
- #HostKey /etc/ssh/ssh_host_dsa_key
- #HostKey /etc/ssh/ssh_host_ecdsa_key
- #HostKey /etc/ssh/ssh_host_ed25519_key
- #Privilege Separation is turned on for security
- UsePrivilegeSeparation yes
- # Lifetime and size of ephemeral version 1 server key
- KeyRegenerationInterval 3600
- ServerKeyBits 4096
- # Logging
- SyslogFacility AUTH
- LogLevel INFO
- # Authentication:
- #LoginGraceTime 120
- PermitRootLogin yes
- StrictModes yes
- RSAAuthentication yes
- PubkeyAuthentication yes
- AuthorizedKeysFile %h/.ssh/authorized_keys
- # Don't read the user's ~/.rhosts and ~/.shosts files
- #IgnoreRhosts yes
- # For this to work you will also need host keys in /etc/ssh_known_hosts
- RhostsRSAAuthentication yes
- # similar for protocol version 2
- HostbasedAuthentication yes
- # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
- IgnoreUserKnownHosts no
- # To enable empty passwords, change to yes (NOT RECOMMENDED)
- PermitEmptyPasswords no
- # Change to yes to enable challenge-response passwords (beware issues with
- # some PAM modules and threads)
- ChallengeResponseAuthentication no
- # Change to no to disable tunnelled clear text passwords
- PasswordAuthentication no
- # Kerberos options
- #KerberosAuthentication no
- #KerberosGetAFSToken no
- #KerberosOrLocalPasswd yes
- #KerberosTicketCleanup yes
- # GSSAPI options
- # GSSAPIAuthentication no
- # GSSAPICleanupCredentials yes
- GatewayPorts yes
- X11Forwarding yes
- #X11DisplayOffset 10
- PrintMotd no
- PrintLastLog yes
- TCPKeepAlive yes
- #UseLogin no
- #MaxStartups 10:30:60
- Banner none #/etc/issue.net
- # Allow client to pass locale environment variables
- AcceptEnv LANG LC_*
- #Subsystem sftp /usr/lib/openssh/sftp-server
- # Set this to 'yes' to enable PAM authentication, account processing,
- # and session processing. If this is enabled, PAM authentication will
- # be allowed through the ChallengeResponseAuthentication and
- # PasswordAuthentication. Depending on your PAM configuration,
- # PAM authentication via ChallengeResponseAuthentication may bypass
- # the setting of "PermitRootLogin without-password".
- # If you just want the PAM account and session checks to run without
- # PAM authentication, then enable this but set PasswordAuthentication
- # and ChallengeResponseAuthentication to 'no'.
- UsePAM yes
- KexAlgorithms=diffie-hellman-group1-sha1
- DESCRIPTION
- ssh-copy-id is a script that uses ssh to log into a remote machine and
- append the indicated identity file to that machine's
- ~/.ssh/authorized_keys file.
- If the -i option is given then the identity file (defaults to
- ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in
- your ssh-agent. Otherwise, if this:
- ssh-add -L
- provides any output, it uses that in preference to the identity file.
- If the -i option is used, or the ssh-add produced no output, then it
- uses the contents of the identity file. Once it has one or more
- fingerprints (by whatever means) it uses ssh to append them to
- ~/.ssh/authorized_keys on the remote machine (creating the file, and
- directory, if necessary.)
- NOTES
- This program does not modify the permissions of any pre-existing files
- or directories. Therefore, if the remote sshd has StrictModes set in
- its configuration, then the user's home, ~/.ssh folder, and
- ~/.ssh/authorized_keys file may need to have group writability disabled
- manually, e.g. via
- chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
- on the remote machine.
- ~/.ssh 700
- -rw------- 1 serv serv 11K Aug 20 08:01 authorized_keys 600
- -r-------- 1 serv serv 3.2K Aug 20 06:59 id_rsa 400
- -rw-r--r-- 1 serv serv 738 Aug 20 06:59 id_rsa.pub 644
- -rw-r--r-- 1 serv serv 0 Aug 20 06:46 known_hosts 644
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement