3 # HostKeys for protocol version 2
4 HostKey /etc/ssh/ssh_host_rsa_key
5 HostKey /etc/ssh/ssh_host_dsa_key
6 #Privilege Separation is turned on for security
7 UsePrivilegeSeparation yes
9 # Lifetime and size of ephemeral version 1 server key
10 KeyRegenerationInterval 3600
23 PubkeyAuthentication yes
24 #AuthorizedKeysFile %h/.ssh/authorized_keys
26 # Don't read the user's ~/.rhosts and ~/.shosts files
28 # For this to work you will also need host keys in /etc/ssh_known_hosts
29 RhostsRSAAuthentication no
30 # similar for protocol version 2
31 HostbasedAuthentication no
32 # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
33 #IgnoreUserKnownHosts yes
35 # To enable empty passwords, change to yes (NOT RECOMMENDED)
36 PermitEmptyPasswords no
38 # Change to yes to enable challenge-response passwords (beware issues with
39 # some PAM modules and threads)
40 ChallengeResponseAuthentication yes
42 # Change to no to disable tunnelled clear text passwords
43 PasswordAuthentication no
46 GSSAPIAuthentication yes
47 GSSAPICleanupCredentials yes
56 # Allow client to pass locale environment variables