![]() UsePrivilegeSeparation sandbox # Default for new installations. # WARNING: 'UsePAM no' is not supported in Red Hat Enterprise Linux and may cause several # and ChallengeResponseAuthentication to 'no'. # PAM authentication, then enable this but set PasswordAuthentication # If you just want the PAM account and session checks to run without ![]() # the setting of "PermitRootLogin without-password". # PAM authentication via ChallengeResponseAuthentication may bypass # be allowed through the ChallengeResponseAuthentication and If this is enabled, PAM authentication will # Set this to 'yes' to enable PAM authentication, account processing, # Change to no to disable s/key passwords # To disable tunneled clear text passwords, change to no here! # Don't read the user's ~/.rhosts and ~/.shosts files # RhostsRSAAuthentication and HostbasedAuthentication # Change to yes if you don't trust ~/.ssh/known_hosts for # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts # but this is overridden so installations will only check. # Lifetime and size of ephemeral version 1 server key # The default requires explicit activation of protocol 1 # semanage port -a -t ssh_port_t -p tcp #PORTNUMBER ![]() # If you want to change the port on a SELinux system, you have to tell ![]() # OpenSSH is to specify options with their default value where # The strategy used for options in the default sshd_config shipped with # This sshd was compiled with PATH=/usr/local/bin:/usr/bin # This is the sshd server system-wide configuration file. Code: Select all # $OpenBSD: sshd_config,v 1.90 6 04:09:14 dtucker Exp $ ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |