{"id":355,"date":"2019-10-21T19:57:01","date_gmt":"2019-10-21T17:57:01","guid":{"rendered":"http:\/\/linuxboxen2.dk\/?p=355"},"modified":"2019-10-21T19:57:01","modified_gmt":"2019-10-21T17:57:01","slug":"sshd_config","status":"publish","type":"post","link":"https:\/\/www.linuxboxen.dk\/?p=355","title":{"rendered":"SSHD_CONFIG"},"content":{"rendered":"<p>SSHD_CONFIG(5)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 BSD File Formats Manual\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SSHD_CONFIG(5)<\/p>\n<p>NAME<\/p>\n<p>sshd_config \u2014 OpenSSH SSH daemon configuration file<\/p>\n<p>SYNOPSIS<\/p>\n<p>\/etc\/ssh\/sshd_config<\/p>\n<p>DESCRIPTION<\/p>\n<p>sshd(8) reads configuration data from \/etc\/ssh\/sshd_config (or the file<br \/>\nspecified with -f on the command line).\u00a0 The file contains keyword-<br \/>\nargument pairs, one per line.\u00a0 Lines starting with \u2018#\u2019 and empty lines<br \/>\nare interpreted as comments.\u00a0 Arguments may optionally be enclosed in<br \/>\ndouble quotes (&#8220;) in order to represent arguments containing spaces.<\/p>\n<p>The possible keywords and their meanings are as follows (note that key\u2010<br \/>\nwords are case-insensitive and arguments are case-sensitive):<\/p>\n<p>AcceptEnv<br \/>\nSpecifies what environment variables sent by the client will be<br \/>\ncopied into the session&#8217;s environ(7).\u00a0 See SendEnv in<br \/>\nssh_config(5) for how to configure the client.\u00a0 Note that envi\u2010<br \/>\nronment passing is only supported for protocol 2.\u00a0 Variables<br \/>\nare specified by name, which may contain the wildcard charac\u2010<br \/>\nters \u2018*\u2019 and \u2018?\u2019.\u00a0 Multiple environment variables may be sepa\u2010<br \/>\nrated by whitespace or spread across multiple AcceptEnv direc\u2010<br \/>\ntives.\u00a0 Be warned that some environment variables could be used<br \/>\nto bypass restricted user environments.\u00a0 For this reason, care<br \/>\nshould be taken in the use of this directive.\u00a0 The default is<br \/>\nnot to accept any environment variables.<\/p>\n<p>AddressFamily<br \/>\nSpecifies which address family should be used by sshd(8).<br \/>\nValid arguments are \u201cany\u201d, \u201cinet\u201d (use IPv4 only), or \u201cinet6\u201d<br \/>\n(use IPv6 only).\u00a0 The default is \u201cany\u201d.<\/p>\n<p>AllowAgentForwarding<br \/>\nSpecifies whether ssh-agent(1) forwarding is permitted.\u00a0 The<br \/>\ndefault is \u201cyes\u201d.\u00a0 Note that disabling agent forwarding does<br \/>\nnot improve security unless users are also denied shell access,<br \/>\nas they can always install their own forwarders.<\/p>\n<p>AllowGroups<br \/>\nThis keyword can be followed by a list of group name patterns,<br \/>\nseparated by spaces.\u00a0 If specified, login is allowed only for<br \/>\nusers whose primary group or supplementary group list matches<br \/>\none of the patterns.\u00a0 Only group names are valid; a numerical<br \/>\ngroup ID is not recognized.\u00a0 By default, login is allowed for<br \/>\nall groups.\u00a0 The allow\/deny directives are processed in the<br \/>\nfollowing order: DenyUsers, AllowUsers, DenyGroups, and finally<br \/>\nAllowGroups.<\/p>\n<p>See PATTERNS in ssh_config(5) for more information on patterns.<\/p>\n<p>AllowTcpForwarding<br \/>\nSpecifies whether TCP forwarding is permitted.\u00a0 The available<br \/>\noptions are \u201cyes\u201d or \u201call\u201d to allow TCP forwarding, \u201cno\u201d to<br \/>\nprevent all TCP forwarding, \u201clocal\u201d to allow local (from the<br \/>\nperspective of ssh(1)) forwarding only or \u201cremote\u201d to allow<br \/>\nremote forwarding only.\u00a0 The default is \u201cyes\u201d.\u00a0 Note that dis\u2010<br \/>\nabling TCP forwarding does not improve security unless users<br \/>\nare also denied shell access, as they can always install their<br \/>\nown forwarders.<\/p>\n<p>AllowStreamLocalForwarding<br \/>\nSpecifies whether StreamLocal (Unix-domain socket) forwarding<br \/>\nis permitted.\u00a0 The available options are \u201cyes\u201d or \u201call\u201d to<br \/>\nallow StreamLocal forwarding, \u201cno\u201d to prevent all StreamLocal<br \/>\nforwarding, \u201clocal\u201d to allow local (from the perspective of<br \/>\nssh(1)) forwarding only or \u201cremote\u201d to allow remote forwarding<br \/>\nonly.\u00a0 The default is \u201cyes\u201d.\u00a0 Note that disabling StreamLocal<br \/>\nforwarding does not improve security unless users are also<br \/>\ndenied shell access, as they can always install their own for\u2010<br \/>\nwarders.<\/p>\n<p>AllowUsers<br \/>\nThis keyword can be followed by a list of user name patterns,<br \/>\nseparated by spaces.\u00a0 If specified, login is allowed only for<br \/>\nuser names that match one of the patterns.\u00a0 Only user names are<br \/>\nvalid; a numerical user ID is not recognized.\u00a0 By default,<br \/>\nlogin is allowed for all users.\u00a0 If the pattern takes the form<br \/>\nUSER@HOST\u00a0then USER and HOST are separately checked, restrict\u2010<br \/>\ning logins to particular users from particular hosts.\u00a0 The<br \/>\nallow\/deny directives are processed in the following order:<br \/>\nDenyUsers, AllowUsers, DenyGroups, and finally AllowGroups.<\/p>\n<p>See PATTERNS in ssh_config(5) for more information on patterns.<\/p>\n<p>AuthenticationMethods<br \/>\nSpecifies the authentication methods that must be successfully<br \/>\ncompleted for a user to be granted access.\u00a0 This option must be<br \/>\nfollowed by one or more comma-separated lists of authentication<br \/>\nmethod names.\u00a0 Successful authentication requires completion of<br \/>\nevery method in at least one of these lists.<\/p>\n<p>For example, an argument of \u201cpublickey,password<br \/>\npublickey,keyboard-interactive\u201d would require the user to com\u2010<br \/>\nplete public key authentication, followed by either password or<br \/>\nkeyboard interactive authentication.\u00a0 Only methods that are<br \/>\nnext in one or more lists are offered at each stage, so for<br \/>\nthis example, it would not be possible to attempt password or<br \/>\nkeyboard-interactive authentication before public key.<\/p>\n<p>For keyboard interactive authentication it is also possible to<br \/>\nrestrict authentication to a specific device by appending a<br \/>\ncolon followed by the device identifier \u201cbsdauth\u201d, \u201cpam\u201d, or<br \/>\n\u201cskey\u201d, depending on the server configuration.\u00a0 For example,<br \/>\n\u201ckeyboard-interactive:bsdauth\u201d would restrict keyboard interac\u2010<br \/>\ntive authentication to the \u201cbsdauth\u201d device.<\/p>\n<p>This option is only available for SSH protocol 2 and will yield<br \/>\na fatal error if enabled if protocol 1 is also enabled.\u00a0 Note<br \/>\nthat each authentication method listed should also be explic\u2010<br \/>\nitly enabled in the configuration.\u00a0 The default is not to<br \/>\nrequire multiple authentication; successful completion of a<br \/>\nsingle authentication method is sufficient.<\/p>\n<p>AuthorizedKeysCommand<br \/>\nSpecifies a program to be used to look up the user&#8217;s public<br \/>\nkeys.\u00a0 The program must be owned by root and not writable by<br \/>\ngroup or others.\u00a0 It will be invoked with a single argument of<br \/>\nthe username being authenticated, and should produce on stan\u2010<br \/>\ndard output zero or more lines of authorized_keys output (see<br \/>\nAUTHORIZED_KEYS in sshd(8)).\u00a0 If a key supplied by Authorized\u2010<br \/>\nKeysCommand does not successfully authenticate and authorize<br \/>\nthe user then public key authentication continues using the<br \/>\nusual AuthorizedKeysFile files.\u00a0 By default, no Authorized\u2010<br \/>\nKeysCommand is run.<\/p>\n<p>AuthorizedKeysCommandUser<br \/>\nSpecifies the user under whose account the AuthorizedKeysCom\u2010<br \/>\nmand is run.\u00a0 It is recommended to use a dedicated user that<br \/>\nhas no other role on the host than running authorized keys com\u2010<br \/>\nmands.<\/p>\n<p>AuthorizedKeysFile<br \/>\nSpecifies the file that contains the public keys that can be<br \/>\nused for user authentication.\u00a0 The format is described in the<br \/>\nAUTHORIZED_KEYS FILE FORMAT section of sshd(8).<br \/>\nAuthorizedKeysFile may contain tokens of the form %T which are<br \/>\nsubstituted during connection setup.\u00a0 The following tokens are<br \/>\ndefined: %% is replaced by a literal &#8216;%&#8217;, %h is replaced by the<br \/>\nhome directory of the user being authenticated, and %u is<br \/>\nreplaced by the username of that user.\u00a0 After expansion,<br \/>\nAuthorizedKeysFile is taken to be an absolute path or one rela\u2010<br \/>\ntive to the user&#8217;s home directory.\u00a0 Multiple files may be<br \/>\nlisted, separated by whitespace.\u00a0 The default is<br \/>\n\u201c.ssh\/authorized_keys .ssh\/authorized_keys2\u201d.<\/p>\n<p>AuthorizedPrincipalsFile<br \/>\nSpecifies a file that lists principal names that are accepted<br \/>\nfor certificate authentication.\u00a0 When using certificates signed<br \/>\nby a key listed in TrustedUserCAKeys, this file lists names,<br \/>\none of which must appear in the certificate for it to be<br \/>\naccepted for authentication.\u00a0 Names are listed one per line<br \/>\npreceded by key options (as described in AUTHORIZED_KEYS FILE<br \/>\nFORMAT in sshd(8)).\u00a0 Empty lines and comments starting with \u2018#\u2019<br \/>\nare ignored.<\/p>\n<p>AuthorizedPrincipalsFile may contain tokens of the form %T<br \/>\nwhich are substituted during connection setup.\u00a0 The following<br \/>\ntokens are defined: %% is replaced by a literal &#8216;%&#8217;, %h is<br \/>\nreplaced by the home directory of the user being authenticated,<br \/>\nand %u is replaced by the username of that user.\u00a0 After expan\u2010<br \/>\nsion, AuthorizedPrincipalsFile is taken to be an absolute path<br \/>\nor one relative to the user&#8217;s home directory.<\/p>\n<p>The default is \u201cnone\u201d, i.e. not to use a principals file \u2013 in<br \/>\nthis case, the username of the user must appear in a certifi\u2010<br \/>\ncate&#8217;s principals list for it to be accepted.\u00a0 Note that<br \/>\nAuthorizedPrincipalsFile is only used when authentication pro\u2010<br \/>\nceeds using a CA listed in TrustedUserCAKeys and is not con\u2010<br \/>\nsulted for certification authorities trusted via<br \/>\n~\/.ssh\/authorized_keys, though the principals= key option<br \/>\noffers a similar facility (see sshd(8) for details).<\/p>\n<p>Banner\u00a0 The contents of the specified file are sent to the remote user<br \/>\nbefore authentication is allowed.\u00a0 If the argument is \u201cnone\u201d<br \/>\nthen no banner is displayed.\u00a0 This option is only available for<br \/>\nprotocol version 2.\u00a0 By default, no banner is displayed.<\/p>\n<p>ChallengeResponseAuthentication<br \/>\nSpecifies whether challenge-response authentication is allowed<br \/>\n(e.g. via PAM or through authentication styles supported in<br \/>\nlogin.conf(5)) The default is \u201cyes\u201d.<\/p>\n<p>ChrootDirectory<br \/>\nSpecifies the pathname of a directory to chroot(2) to after<br \/>\nauthentication.\u00a0 All components of the pathname must be root-<br \/>\nowned directories that are not writable by any other user or<br \/>\ngroup.\u00a0 After the chroot, sshd(8) changes the working directory<br \/>\nto the user&#8217;s home directory.<\/p>\n<p>The pathname may contain the following tokens that are expanded<br \/>\nat runtime once the connecting user has been authenticated: %%<br \/>\nis replaced by a literal &#8216;%&#8217;, %h is replaced by the home direc\u2010<br \/>\ntory of the user being authenticated, and %u is replaced by the<br \/>\nusername of that user.<\/p>\n<p>The ChrootDirectory must contain the necessary files and direc\u2010<br \/>\ntories to support the user&#8217;s session.\u00a0 For an interactive ses\u2010<br \/>\nsion this requires at least a shell, typically sh(1), and basic<br \/>\n\/dev nodes such as null(4), zero(4), stdin(4), stdout(4),<br \/>\nstderr(4), arandom(4) and tty(4) devices.\u00a0 For file transfer<br \/>\nsessions using \u201csftp\u201d, no additional configuration of the envi\u2010<br \/>\nronment is necessary if the in-process sftp server is used,<br \/>\nthough sessions which use logging may require \/dev\/log inside<br \/>\nthe chroot directory on some operating systems (see<br \/>\nsftp-server(8) for details).<\/p>\n<p>The default is not to chroot(2).<\/p>\n<p>Ciphers<br \/>\nSpecifies the ciphers allowed for protocol version 2.\u00a0 Multiple<br \/>\nciphers must be comma-separated.\u00a0 The supported ciphers are:<\/p>\n<p>3des-cbc<br \/>\naes128-cbc<br \/>\naes192-cbc<br \/>\naes256-cbc<br \/>\naes128-ctr<br \/>\naes192-ctr<br \/>\naes256-ctr<br \/>\naes128-gcm@openssh.com<br \/>\naes256-gcm@openssh.com<br \/>\narcfour<br \/>\narcfour128<br \/>\narcfour256<br \/>\nblowfish-cbc<br \/>\ncast128-cbc<br \/>\nchacha20-poly1305@openssh.com<\/p>\n<p>The default is:<\/p>\n<p>aes128-ctr,aes192-ctr,aes256-ctr,<br \/>\naes128-gcm@openssh.com,aes256-gcm@openssh.com,<br \/>\nchacha20-poly1305@openssh.com<\/p>\n<p>The list of available ciphers may also be obtained using the -Q<br \/>\noption of ssh(1).<\/p>\n<p>ClientAliveCountMax<br \/>\nSets the number of client alive messages (see below) which may<br \/>\nbe sent without sshd(8) receiving any messages back from the<br \/>\nclient.\u00a0 If this threshold is reached while client alive mes\u2010<br \/>\nsages are being sent, sshd will disconnect the client, termi\u2010<br \/>\nnating the session.\u00a0 It is important to note that the use of<br \/>\nclient alive messages is very different from TCPKeepAlive<br \/>\n(below).\u00a0 The client alive messages are sent through the<br \/>\nencrypted channel and therefore will not be spoofable.\u00a0 The TCP<br \/>\nkeepalive option enabled by TCPKeepAlive is spoofable.\u00a0 The<br \/>\nclient alive mechanism is valuable when the client or server<br \/>\ndepend on knowing when a connection has become inactive.<\/p>\n<p>The default value is 3.\u00a0 If ClientAliveInterval (see below) is<br \/>\nset to 15, and ClientAliveCountMax is left at the default,<br \/>\nunresponsive SSH clients will be disconnected after approxi\u2010<br \/>\nmately 45 seconds.\u00a0 This option applies to protocol version 2<br \/>\nonly.<\/p>\n<p>ClientAliveInterval<br \/>\nSets a timeout interval in seconds after which if no data has<br \/>\nbeen received from the client, sshd(8) will send a message<br \/>\nthrough the encrypted channel to request a response from the<br \/>\nclient.\u00a0 The default is 0, indicating that these messages will<br \/>\nnot be sent to the client.\u00a0 This option applies to protocol<br \/>\nversion 2 only.<\/p>\n<p>Compression<br \/>\nSpecifies whether compression is allowed, or delayed until the<br \/>\nuser has authenticated successfully.\u00a0 The argument must be<br \/>\n\u201cyes\u201d, \u201cdelayed\u201d, or \u201cno\u201d.\u00a0 The default is \u201cdelayed\u201d.<\/p>\n<p>DenyGroups<br \/>\nThis keyword can be followed by a list of group name patterns,<br \/>\nseparated by spaces.\u00a0 Login is disallowed for users whose pri\u2010<br \/>\nmary group or supplementary group list matches one of the pat\u2010<br \/>\nterns.\u00a0 Only group names are valid; a numerical group ID is not<br \/>\nrecognized.\u00a0 By default, login is allowed for all groups.\u00a0 The<br \/>\nallow\/deny directives are processed in the following order:<br \/>\nDenyUsers, AllowUsers, DenyGroups, and finally AllowGroups.<\/p>\n<p>See PATTERNS in ssh_config(5) for more information on patterns.<\/p>\n<p>DenyUsers<br \/>\nThis keyword can be followed by a list of user name patterns,<br \/>\nseparated by spaces.\u00a0 Login is disallowed for user names that<br \/>\nmatch one of the patterns.\u00a0 Only user names are valid; a numer\u2010<br \/>\nical user ID is not recognized.\u00a0 By default, login is allowed<br \/>\nfor all users.\u00a0 If the pattern takes the form\u00a0USER@HOST\u00a0then<br \/>\nUSER and HOST are separately checked, restricting logins to<br \/>\nparticular users from particular hosts.\u00a0 The allow\/deny direc\u2010<br \/>\ntives are processed in the following order: DenyUsers,<br \/>\nAllowUsers, DenyGroups, and finally AllowGroups.<\/p>\n<p>See PATTERNS in ssh_config(5) for more information on patterns.<\/p>\n<p>ForceCommand<br \/>\nForces the execution of the command specified by ForceCommand,<br \/>\nignoring any command supplied by the client and ~\/.ssh\/rc if<br \/>\npresent.\u00a0 The command is invoked by using the user&#8217;s login<br \/>\nshell with the -c option.\u00a0 This applies to shell, command, or<br \/>\nsubsystem execution.\u00a0 It is most useful inside a Match block.<br \/>\nThe command originally supplied by the client is available in<br \/>\nthe SSH_ORIGINAL_COMMAND environment variable.\u00a0 Specifying a<br \/>\ncommand of \u201cinternal-sftp\u201d will force the use of an in-process<br \/>\nsftp server that requires no support files when used with<br \/>\nChrootDirectory.<\/p>\n<p>GatewayPorts<br \/>\nSpecifies whether remote hosts are allowed to connect to ports<br \/>\nforwarded for the client.\u00a0 By default, sshd(8) binds remote<br \/>\nport forwardings to the loopback address.\u00a0 This prevents other<br \/>\nremote hosts from connecting to forwarded ports.\u00a0 GatewayPorts<br \/>\ncan be used to specify that sshd should allow remote port for\u2010<br \/>\nwardings to bind to non-loopback addresses, thus allowing other<br \/>\nhosts to connect.\u00a0 The argument may be \u201cno\u201d to force remote<br \/>\nport forwardings to be available to the local host only, \u201cyes\u201d<br \/>\nto force remote port forwardings to bind to the wildcard<br \/>\naddress, or \u201cclientspecified\u201d to allow the client to select the<br \/>\naddress to which the forwarding is bound.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>GSSAPIAuthentication<br \/>\nSpecifies whether user authentication based on GSSAPI is<br \/>\nallowed.\u00a0 The default is \u201cno\u201d.\u00a0 Note that this option applies<br \/>\nto protocol version 2 only.<\/p>\n<p>GSSAPICleanupCredentials<br \/>\nSpecifies whether to automatically destroy the user&#8217;s creden\u2010<br \/>\ntials cache on logout.\u00a0 The default is \u201cyes\u201d.\u00a0 Note that this<br \/>\noption applies to protocol version 2 only.<\/p>\n<p>HostbasedAuthentication<br \/>\nSpecifies whether rhosts or \/etc\/hosts.equiv authentication<br \/>\ntogether with successful public key client host authentication<br \/>\nis allowed (host-based authentication).\u00a0 This option is similar<br \/>\nto RhostsRSAAuthentication and applies to protocol version 2<br \/>\nonly.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>HostbasedUsesNameFromPacketOnly<br \/>\nSpecifies whether or not the server will attempt to perform a<br \/>\nreverse name lookup when matching the name in the ~\/.shosts,<br \/>\n~\/.rhosts, and \/etc\/hosts.equiv files during<br \/>\nHostbasedAuthentication.\u00a0 A setting of \u201cyes\u201d means that sshd(8)<br \/>\nuses the name supplied by the client rather than attempting to<br \/>\nresolve the name from the TCP connection itself.\u00a0 The default<br \/>\nis \u201cno\u201d.<\/p>\n<p>HostCertificate<br \/>\nSpecifies a file containing a public host certificate.\u00a0 The<br \/>\ncertificate&#8217;s public key must match a private host key already<br \/>\nspecified by HostKey.\u00a0 The default behaviour of sshd(8) is not<br \/>\nto load any certificates.<\/p>\n<p>HostKey<br \/>\nSpecifies a file containing a private host key used by SSH.<br \/>\nThe default is \/etc\/ssh\/ssh_host_key for protocol version 1,<br \/>\nand \/etc\/ssh\/ssh_host_dsa_key, \/etc\/ssh\/ssh_host_ecdsa_key,<br \/>\n\/etc\/ssh\/ssh_host_ed25519_key and \/etc\/ssh\/ssh_host_rsa_key for<br \/>\nprotocol version 2.\u00a0 Note that sshd(8) will refuse to use a<br \/>\nfile if it is group\/world-accessible.\u00a0 It is possible to have<br \/>\nmultiple host key files.\u00a0 \u201crsa1\u201d keys are used for version 1<br \/>\nand \u201cdsa\u201d, \u201cecdsa\u201d, \u201ced25519\u201d or \u201crsa\u201d are used for version 2<br \/>\nof the SSH protocol.\u00a0 It is also possible to specify public<br \/>\nhost key files instead.\u00a0 In this case operations on the private<br \/>\nkey will be delegated to an ssh-agent(1).<\/p>\n<p>HostKeyAgent<br \/>\nIdentifies the UNIX-domain socket used to communicate with an<br \/>\nagent that has access to the private host keys.\u00a0 If<br \/>\n\u201cSSH_AUTH_SOCK\u201d is specified, the location of the socket will<br \/>\nbe read from the SSH_AUTH_SOCK environment variable.<\/p>\n<p>IgnoreRhosts<br \/>\nSpecifies that .rhosts and .shosts files will not be used in<br \/>\nRhostsRSAAuthentication or HostbasedAuthentication.<\/p>\n<p>\/etc\/hosts.equiv and \/etc\/shosts.equiv are still used.\u00a0 The<br \/>\ndefault is \u201cyes\u201d.<\/p>\n<p>IgnoreUserKnownHosts<br \/>\nSpecifies whether sshd(8) should ignore the user&#8217;s<br \/>\n~\/.ssh\/known_hosts during RhostsRSAAuthentication or<br \/>\nHostbasedAuthentication.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>IPQoS\u00a0\u00a0 Specifies the IPv4 type-of-service or DSCP class for the con\u2010<br \/>\nnection.\u00a0 Accepted values are \u201caf11\u201d, \u201caf12\u201d, \u201caf13\u201d, \u201caf21\u201d,<br \/>\n\u201caf22\u201d, \u201caf23\u201d, \u201caf31\u201d, \u201caf32\u201d, \u201caf33\u201d, \u201caf41\u201d, \u201caf42\u201d, \u201caf43\u201d,<br \/>\n\u201ccs0\u201d, \u201ccs1\u201d, \u201ccs2\u201d, \u201ccs3\u201d, \u201ccs4\u201d, \u201ccs5\u201d, \u201ccs6\u201d, \u201ccs7\u201d, \u201cef\u201d,<br \/>\n\u201clowdelay\u201d, \u201cthroughput\u201d, \u201creliability\u201d, or a numeric value.<br \/>\nThis option may take one or two arguments, separated by white\u2010<br \/>\nspace.\u00a0 If one argument is specified, it is used as the packet<br \/>\nclass unconditionally.\u00a0 If two values are specified, the first<br \/>\nis automatically selected for interactive sessions and the sec\u2010<br \/>\nond for non-interactive sessions.\u00a0 The default is \u201clowdelay\u201d<br \/>\nfor interactive sessions and \u201cthroughput\u201d for non-interactive<br \/>\nsessions.<\/p>\n<p>KbdInteractiveAuthentication<br \/>\nSpecifies whether to allow keyboard-interactive authentication.<br \/>\nThe argument to this keyword must be \u201cyes\u201d or \u201cno\u201d.\u00a0 The<br \/>\ndefault is to use whatever value<br \/>\nChallengeResponseAuthentication is set to (by default \u201cyes\u201d).<\/p>\n<p>KerberosAuthentication<br \/>\nSpecifies whether the password provided by the user for<br \/>\nPasswordAuthentication will be validated through the Kerberos<br \/>\nKDC.\u00a0 To use this option, the server needs a Kerberos servtab<br \/>\nwhich allows the verification of the KDC&#8217;s identity.\u00a0 The<br \/>\ndefault is \u201cno\u201d.<\/p>\n<p>KerberosGetAFSToken<br \/>\nIf AFS is active and the user has a Kerberos 5 TGT, attempt to<br \/>\nacquire an AFS token before accessing the user&#8217;s home direc\u2010<br \/>\ntory.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>KerberosOrLocalPasswd<br \/>\nIf password authentication through Kerberos fails then the<br \/>\npassword will be validated via any additional local mechanism<br \/>\nsuch as \/etc\/passwd.\u00a0 The default is \u201cyes\u201d.<\/p>\n<p>KerberosTicketCleanup<br \/>\nSpecifies whether to automatically destroy the user&#8217;s ticket<br \/>\ncache file on logout.\u00a0 The default is \u201cyes\u201d.<\/p>\n<p>KexAlgorithms<br \/>\nSpecifies the available KEX (Key Exchange) algorithms.\u00a0 Multi\u2010<br \/>\nple algorithms must be comma-separated.\u00a0 The supported algo\u2010<br \/>\nrithms are:<\/p>\n<p>curve25519-sha256@libssh.org<br \/>\ndiffie-hellman-group1-sha1<br \/>\ndiffie-hellman-group14-sha1<br \/>\ndiffie-hellman-group-exchange-sha1<br \/>\ndiffie-hellman-group-exchange-sha256<br \/>\necdh-sha2-nistp256<br \/>\necdh-sha2-nistp384<br \/>\necdh-sha2-nistp521<\/p>\n<p>The default is:<\/p>\n<p>curve25519-sha256@libssh.org,<br \/>\necdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,<br \/>\ndiffie-hellman-group-exchange-sha256,<br \/>\ndiffie-hellman-group14-sha1<\/p>\n<p>KeyRegenerationInterval<br \/>\nIn protocol version 1, the ephemeral server key is automati\u2010<br \/>\ncally regenerated after this many seconds (if it has been<br \/>\nused).\u00a0 The purpose of regeneration is to prevent decrypting<br \/>\ncaptured sessions by later breaking into the machine and steal\u2010<br \/>\ning the keys.\u00a0 The key is never stored anywhere.\u00a0 If the value<br \/>\nis 0, the key is never regenerated.\u00a0 The default is 3600 (sec\u2010<br \/>\nonds).<\/p>\n<p>ListenAddress<br \/>\nSpecifies the local addresses sshd(8) should listen on.\u00a0 The<br \/>\nfollowing forms may be used:<\/p>\n<p>ListenAddress host|IPv4_addr|IPv6_addr<br \/>\nListenAddress host|IPv4_addr:port<br \/>\nListenAddress [host|IPv6_addr]:port<\/p>\n<p>If port is not specified, sshd will listen on the address and<br \/>\nall prior Port options specified.\u00a0 The default is to listen on<br \/>\nall local addresses.\u00a0 Multiple ListenAddress options are per\u2010<br \/>\nmitted.\u00a0 Additionally, any Port options must precede this<br \/>\noption for non-port qualified addresses.<\/p>\n<p>LoginGraceTime<br \/>\nThe server disconnects after this time if the user has not suc\u2010<br \/>\ncessfully logged in.\u00a0 If the value is 0, there is no time<br \/>\nlimit.\u00a0 The default is 120 seconds.<\/p>\n<p>LogLevel<br \/>\nGives the verbosity level that is used when logging messages<br \/>\nfrom sshd(8).\u00a0 The possible values are: QUIET, FATAL, ERROR,<br \/>\nINFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3.\u00a0 The default<br \/>\nis INFO.\u00a0 DEBUG and DEBUG1 are equivalent.\u00a0 DEBUG2 and DEBUG3<br \/>\neach specify higher levels of debugging output.\u00a0 Logging with a<br \/>\nDEBUG level violates the privacy of users and is not recom\u2010<br \/>\nmended.<\/p>\n<p>MACs\u00a0\u00a0\u00a0 Specifies the available MAC (message authentication code) algo\u2010<br \/>\nrithms.\u00a0 The MAC algorithm is used in protocol version 2 for<br \/>\ndata integrity protection.\u00a0 Multiple algorithms must be comma-<br \/>\nseparated.\u00a0 The algorithms that contain \u201c-etm\u201d calculate the<br \/>\nMAC after encryption (encrypt-then-mac).\u00a0 These are considered<br \/>\nsafer and their use recommended.\u00a0 The supported MACs are:<\/p>\n<p>hmac-md5<br \/>\nhmac-md5-96<br \/>\nhmac-ripemd160<br \/>\nhmac-sha1<br \/>\nhmac-sha1-96<br \/>\nhmac-sha2-256<br \/>\nhmac-sha2-512<br \/>\numac-64@openssh.com<br \/>\numac-128@openssh.com<br \/>\nhmac-md5-etm@openssh.com<br \/>\nhmac-md5-96-etm@openssh.com<br \/>\nhmac-ripemd160-etm@openssh.com<br \/>\nhmac-sha1-etm@openssh.com<br \/>\nhmac-sha1-96-etm@openssh.com<br \/>\nhmac-sha2-256-etm@openssh.com<br \/>\nhmac-sha2-512-etm@openssh.com<br \/>\numac-64-etm@openssh.com<br \/>\numac-128-etm@openssh.com<\/p>\n<p>The default is:<\/p>\n<p>umac-64-etm@openssh.com,umac-128-etm@openssh.com,<br \/>\nhmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,<br \/>\numac-64@openssh.com,umac-128@openssh.com,<br \/>\nhmac-sha2-256,hmac-sha2-512<\/p>\n<p>Match\u00a0\u00a0 Introduces a conditional block.\u00a0 If all of the criteria on the<br \/>\nMatch line are satisfied, the keywords on the following lines<br \/>\noverride those set in the global section of the config file,<br \/>\nuntil either another Match line or the end of the file.\u00a0 If a<br \/>\nkeyword appears in multiple Match blocks that are satisified,<br \/>\nonly the first instance of the keyword is applied.<\/p>\n<p>The arguments to Match are one or more criteria-pattern pairs<br \/>\nor the single token All which matches all criteria.\u00a0 The avail\u2010<br \/>\nable criteria are User, Group, Host, LocalAddress, LocalPort,<br \/>\nand Address.\u00a0 The match patterns may consist of single entries<br \/>\nor comma-separated lists and may use the wildcard and negation<br \/>\noperators described in the PATTERNS section of ssh_config(5).<\/p>\n<p>The patterns in an Address criteria may additionally contain<br \/>\naddresses to match in CIDR address\/masklen format, e.g.<br \/>\n\u201c192.0.2.0\/24\u201d or \u201c3ffe:ffff::\/32\u201d.\u00a0 Note that the mask length<br \/>\nprovided must be consistent with the address &#8211; it is an error<br \/>\nto specify a mask length that is too long for the address or<br \/>\none with bits set in this host portion of the address.\u00a0 For<br \/>\nexample, \u201c192.0.2.0\/33\u201d and \u201c192.0.2.0\/8\u201d respectively.<\/p>\n<p>Only a subset of keywords may be used on the lines following a<br \/>\nMatch keyword.\u00a0 Available keywords are AcceptEnv,<br \/>\nAllowAgentForwarding, AllowGroups, AllowTcpForwarding,<br \/>\nAllowUsers, AuthenticationMethods, AuthorizedKeysCommand,<br \/>\nAuthorizedKeysCommandUser, AuthorizedKeysFile,<br \/>\nAuthorizedPrincipalsFile, Banner, ChrootDirectory, DenyGroups,<br \/>\nDenyUsers, ForceCommand, GatewayPorts, GSSAPIAuthentication,<br \/>\nHostbasedAuthentication, HostbasedUsesNameFromPacketOnly,<br \/>\nKbdInteractiveAuthentication, KerberosAuthentication,<br \/>\nMaxAuthTries, MaxSessions, PasswordAuthentication,<br \/>\nPermitEmptyPasswords, PermitOpen, PermitRootLogin, PermitTTY,<br \/>\nPermitTunnel, PermitUserRC, PubkeyAuthentication, RekeyLimit,<br \/>\nRhostsRSAAuthentication, RSAAuthentication, X11DisplayOffset,<br \/>\nX11Forwarding and X11UseLocalHost.<\/p>\n<p>MaxAuthTries<br \/>\nSpecifies the maximum number of authentication attempts permit\u2010<br \/>\nted per connection.\u00a0 Once the number of failures reaches half<br \/>\nthis value, additional failures are logged.\u00a0 The default is 6.<\/p>\n<p>MaxSessions<br \/>\nSpecifies the maximum number of open sessions permitted per<br \/>\nnetwork connection.\u00a0 The default is 10.<\/p>\n<p>MaxStartups<br \/>\nSpecifies the maximum number of concurrent unauthenticated con\u2010<br \/>\nnections to the SSH daemon.\u00a0 Additional connections will be<br \/>\ndropped until authentication succeeds or the LoginGraceTime<br \/>\nexpires for a connection.\u00a0 The default is 10:30:100.<\/p>\n<p>Alternatively, random early drop can be enabled by specifying<br \/>\nthe three colon separated values \u201cstart:rate:full\u201d (e.g.<br \/>\n&#8220;10:30:60&#8221;).\u00a0 sshd(8) will refuse connection attempts with a<br \/>\nprobability of \u201crate\/100\u201d (30%) if there are currently \u201cstart\u201d<br \/>\n(10) unauthenticated connections.\u00a0 The probability increases<br \/>\nlinearly and all connection attempts are refused if the number<br \/>\nof unauthenticated connections reaches \u201cfull\u201d (60).<\/p>\n<p>PasswordAuthentication<br \/>\nSpecifies whether password authentication is allowed.\u00a0 The<br \/>\ndefault is \u201cyes\u201d.<\/p>\n<p>PermitEmptyPasswords<br \/>\nWhen password authentication is allowed, it specifies whether<br \/>\nthe server allows login to accounts with empty password<br \/>\nstrings.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>PermitOpen<br \/>\nSpecifies the destinations to which TCP port forwarding is per\u2010<br \/>\nmitted.\u00a0 The forwarding specification must be one of the fol\u2010<br \/>\nlowing forms:<\/p>\n<p>PermitOpen host:port<br \/>\nPermitOpen IPv4_addr:port<br \/>\nPermitOpen [IPv6_addr]:port<\/p>\n<p>Multiple forwards may be specified by separating them with<br \/>\nwhitespace.\u00a0 An argument of \u201cany\u201d can be used to remove all<br \/>\nrestrictions and permit any forwarding requests.\u00a0 An argument<br \/>\nof \u201cnone\u201d can be used to prohibit all forwarding requests.\u00a0 By<br \/>\ndefault all port forwarding requests are permitted.<\/p>\n<p>PermitRootLogin<br \/>\nSpecifies whether root can log in using ssh(1).\u00a0 The argument<br \/>\nmust be \u201cyes\u201d, \u201cwithout-password\u201d, \u201cforced-commands-only\u201d, or<br \/>\n\u201cno\u201d.\u00a0 The default is \u201cyes\u201d.<\/p>\n<p>If this option is set to \u201cwithout-password\u201d, password authenti\u2010<br \/>\ncation is disabled for root.<\/p>\n<p>If this option is set to \u201cforced-commands-only\u201d, root login<br \/>\nwith public key authentication will be allowed, but only if the<br \/>\ncommand option has been specified (which may be useful for tak\u2010<br \/>\ning remote backups even if root login is normally not allowed).<br \/>\nAll other authentication methods are disabled for root.<\/p>\n<p>If this option is set to \u201cno\u201d, root is not allowed to log in.<\/p>\n<p>PermitTunnel<br \/>\nSpecifies whether tun(4) device forwarding is allowed.\u00a0 The<br \/>\nargument must be \u201cyes\u201d, \u201cpoint-to-point\u201d (layer 3), \u201cethernet\u201d<br \/>\n(layer 2), or \u201cno\u201d.\u00a0 Specifying \u201cyes\u201d permits both<br \/>\n\u201cpoint-to-point\u201d and \u201cethernet\u201d.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>PermitTTY<br \/>\nSpecifies whether pty(4) allocation is permitted.\u00a0 The default<br \/>\nis \u201cyes\u201d.<\/p>\n<p>PermitUserEnvironment<br \/>\nSpecifies whether ~\/.ssh\/environment and environment= options<br \/>\nin ~\/.ssh\/authorized_keys are processed by sshd(8).\u00a0 The<br \/>\ndefault is \u201cno\u201d.\u00a0 Enabling environment processing may enable<br \/>\nusers to bypass access restrictions in some configurations<br \/>\nusing mechanisms such as LD_PRELOAD.<\/p>\n<p>PermitUserRC<br \/>\nSpecifies whether any ~\/.ssh\/rc file is executed.\u00a0 The default<br \/>\nis \u201cyes\u201d.<\/p>\n<p>PidFile<br \/>\nSpecifies the file that contains the process ID of the SSH dae\u2010<br \/>\nmon.\u00a0 The default is \/var\/run\/sshd.pid.<\/p>\n<p>Port\u00a0\u00a0\u00a0 Specifies the port number that sshd(8) listens on.\u00a0 The default<br \/>\nis 22.\u00a0 Multiple options of this type are permitted.\u00a0 See also<br \/>\nListenAddress.<\/p>\n<p>PrintLastLog<br \/>\nSpecifies whether sshd(8) should print the date and time of the<br \/>\nlast user login when a user logs in interactively.\u00a0 The default<br \/>\nis \u201cyes\u201d.<\/p>\n<p>PrintMotd<br \/>\nSpecifies whether sshd(8) should print \/etc\/motd when a user<br \/>\nlogs in interactively.\u00a0 (On some systems it is also printed by<br \/>\nthe shell, \/etc\/profile, or equivalent.)\u00a0 The default is \u201cyes\u201d.<\/p>\n<p>Protocol<br \/>\nSpecifies the protocol versions sshd(8) supports.\u00a0 The possible<br \/>\nvalues are \u20181\u2019 and \u20182\u2019.\u00a0 Multiple versions must be comma-sepa\u2010<br \/>\nrated.\u00a0 The default is \u20182\u2019.\u00a0 Note that the order of the proto\u2010<br \/>\ncol list does not indicate preference, because the client<br \/>\nselects among multiple protocol versions offered by the server.<br \/>\nSpecifying \u201c2,1\u201d is identical to \u201c1,2\u201d.<\/p>\n<p>PubkeyAuthentication<br \/>\nSpecifies whether public key authentication is allowed.\u00a0 The<br \/>\ndefault is \u201cyes\u201d.\u00a0 Note that this option applies to protocol<br \/>\nversion 2 only.<\/p>\n<p>RekeyLimit<br \/>\nSpecifies the maximum amount of data that may be transmitted<br \/>\nbefore the session key is renegotiated, optionally followed a<br \/>\nmaximum amount of time that may pass before the session key is<br \/>\nrenegotiated.\u00a0 The first argument is specified in bytes and may<br \/>\nhave a suffix of \u2018K\u2019, \u2018M\u2019, or \u2018G\u2019 to indicate Kilobytes,<br \/>\nMegabytes, or Gigabytes, respectively.\u00a0 The default is between<br \/>\n\u20181G\u2019 and \u20184G\u2019, depending on the cipher.\u00a0 The optional second<br \/>\nvalue is specified in seconds and may use any of the units doc\u2010<br \/>\numented in the TIME FORMATS section.\u00a0 The default value for<br \/>\nRekeyLimit is \u201cdefault none\u201d, which means that rekeying is per\u2010<br \/>\nformed after the cipher&#8217;s default amount of data has been sent<br \/>\nor received and no time based rekeying is done.\u00a0 This option<br \/>\napplies to protocol version 2 only.<\/p>\n<p>RevokedKeys<br \/>\nSpecifies revoked public keys.\u00a0 Keys listed in this file will<br \/>\nbe refused for public key authentication.\u00a0 Note that if this<br \/>\nfile is not readable, then public key authentication will be<br \/>\nrefused for all users.\u00a0 Keys may be specified as a text file,<br \/>\nlisting one public key per line, or as an OpenSSH Key Revoca\u2010<br \/>\ntion List (KRL) as generated by ssh-keygen(1).\u00a0 For more infor\u2010<br \/>\nmation on KRLs, see the KEY REVOCATION LISTS section in<br \/>\nssh-keygen(1).<\/p>\n<p>RhostsRSAAuthentication<br \/>\nSpecifies whether rhosts or \/etc\/hosts.equiv authentication<br \/>\ntogether with successful RSA host authentication is allowed.<br \/>\nThe default is \u201cno\u201d.\u00a0 This option applies to protocol version 1<br \/>\nonly.<\/p>\n<p>RSAAuthentication<br \/>\nSpecifies whether pure RSA authentication is allowed.\u00a0 The<br \/>\ndefault is \u201cyes\u201d.\u00a0 This option applies to protocol version 1<br \/>\nonly.<\/p>\n<p>ServerKeyBits<br \/>\nDefines the number of bits in the ephemeral protocol version 1<br \/>\nserver key.\u00a0 The minimum value is 512, and the default is 1024.<\/p>\n<p>StreamLocalBindMask<br \/>\nSets the octal file creation mode mask (umask) used when creat\u2010<br \/>\ning a Unix-domain socket file for local or remote port forward\u2010<br \/>\ning.\u00a0 This option is only used for port forwarding to a Unix-<br \/>\ndomain socket file.<\/p>\n<p>The default value is 0177, which creates a Unix-domain socket<br \/>\nfile that is readable and writable only by the owner.\u00a0 Note<br \/>\nthat not all operating systems honor the file mode on Unix-<br \/>\ndomain socket files.<\/p>\n<p>StreamLocalBindUnlink<br \/>\nSpecifies whether to remove an existing Unix-domain socket file<br \/>\nfor local or remote port forwarding before creating a new one.<br \/>\nIf the socket file already exists and StreamLocalBindUnlink is<br \/>\nnot enabled, sshd will be unable to forward the port to the<br \/>\nUnix-domain socket file.\u00a0 This option is only used for port<br \/>\nforwarding to a Unix-domain socket file.<\/p>\n<p>The argument must be \u201cyes\u201d or \u201cno\u201d.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>StrictModes<br \/>\nSpecifies whether sshd(8) should check file modes and ownership<br \/>\nof the user&#8217;s files and home directory before accepting login.<br \/>\nThis is normally desirable because novices sometimes acciden\u2010<br \/>\ntally leave their directory or files world-writable.\u00a0 The<br \/>\ndefault is \u201cyes\u201d.\u00a0 Note that this does not apply to<br \/>\nChrootDirectory, whose permissions and ownership are checked<br \/>\nunconditionally.<\/p>\n<p>Subsystem<br \/>\nConfigures an external subsystem (e.g. file transfer daemon).<br \/>\nArguments should be a subsystem name and a command (with<br \/>\noptional arguments) to execute upon subsystem request.<\/p>\n<p>The command sftp-server(8) implements the \u201csftp\u201d file transfer<br \/>\nsubsystem.<\/p>\n<p>Alternately the name \u201cinternal-sftp\u201d implements an in-process<br \/>\n\u201csftp\u201d server.\u00a0 This may simplify configurations using<br \/>\nChrootDirectory to force a different filesystem root on<br \/>\nclients.<\/p>\n<p>By default no subsystems are defined.\u00a0 Note that this option<br \/>\napplies to protocol version 2 only.<\/p>\n<p>SyslogFacility<br \/>\nGives the facility code that is used when logging messages from<br \/>\nsshd(8).\u00a0 The possible values are: DAEMON, USER, AUTH, LOCAL0,<br \/>\nLOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.\u00a0 The<br \/>\ndefault is AUTH.<\/p>\n<p>TCPKeepAlive<br \/>\nSpecifies whether the system should send TCP keepalive messages<br \/>\nto the other side.\u00a0 If they are sent, death of the connection<br \/>\nor crash of one of the machines will be properly noticed.\u00a0 How\u2010<br \/>\never, this means that connections will die if the route is down<br \/>\ntemporarily, and some people find it annoying.\u00a0 On the other<br \/>\nhand, if TCP keepalives are not sent, sessions may hang indefi\u2010<br \/>\nnitely on the server, leaving \u201cghost\u201d users and consuming<br \/>\nserver resources.<\/p>\n<p>The default is \u201cyes\u201d (to send TCP keepalive messages), and the<br \/>\nserver will notice if the network goes down or the client host<br \/>\ncrashes.\u00a0 This avoids infinitely hanging sessions.<\/p>\n<p>To disable TCP keepalive messages, the value should be set to<br \/>\n\u201cno\u201d.<\/p>\n<p>TrustedUserCAKeys<br \/>\nSpecifies a file containing public keys of certificate authori\u2010<br \/>\nties that are trusted to sign user certificates for authentica\u2010<br \/>\ntion.\u00a0 Keys are listed one per line; empty lines and comments<br \/>\nstarting with \u2018#\u2019 are allowed.\u00a0 If a certificate is presented<br \/>\nfor authentication and has its signing CA key listed in this<br \/>\nfile, then it may be used for authentication for any user<br \/>\nlisted in the certificate&#8217;s principals list.\u00a0 Note that cer\u2010<br \/>\ntificates that lack a list of principals will not be permitted<br \/>\nfor authentication using TrustedUserCAKeys.\u00a0 For more details<br \/>\non certificates, see the CERTIFICATES section in ssh-keygen(1).<\/p>\n<p>UseDNS\u00a0 Specifies whether sshd(8) should look up the remote host name<br \/>\nand check that the resolved host name for the remote IP address<br \/>\nmaps back to the very same IP address.\u00a0 The default is \u201cyes\u201d.<\/p>\n<p>UseLogin<br \/>\nSpecifies whether login(1) is used for interactive login ses\u2010<br \/>\nsions.\u00a0 The default is \u201cno\u201d.\u00a0 Note that login(1) is never used<br \/>\nfor remote command execution.\u00a0 Note also, that if this is<br \/>\nenabled, X11Forwarding will be disabled because login(1) does<br \/>\nnot know how to handle xauth(1) cookies.\u00a0 If<br \/>\nUsePrivilegeSeparation is specified, it will be disabled after<br \/>\nauthentication.<\/p>\n<p>UsePAM\u00a0 Enables the Pluggable Authentication Module interface.\u00a0 If set<br \/>\nto \u201cyes\u201d this will enable PAM authentication using<br \/>\nChallengeResponseAuthentication and PasswordAuthentication in<br \/>\naddition to PAM account and session module processing for all<br \/>\nauthentication types.<\/p>\n<p>Because PAM challenge-response authentication usually serves an<br \/>\nequivalent role to password authentication, you should disable<br \/>\neither PasswordAuthentication or<br \/>\nChallengeResponseAuthentication.<\/p>\n<p>If UsePAM is enabled, you will not be able to run sshd(8) as a<br \/>\nnon-root user.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>UsePrivilegeSeparation<br \/>\nSpecifies whether sshd(8) separates privileges by creating an<br \/>\nunprivileged child process to deal with incoming network traf\u2010<br \/>\nfic.\u00a0 After successful authentication, another process will be<br \/>\ncreated that has the privilege of the authenticated user.\u00a0 The<br \/>\ngoal of privilege separation is to prevent privilege escalation<br \/>\nby containing any corruption within the unprivileged processes.<br \/>\nThe default is \u201cyes\u201d.\u00a0 If UsePrivilegeSeparation is set to<br \/>\n\u201csandbox\u201d then the pre-authentication unprivileged process is<br \/>\nsubject to additional restrictions.<\/p>\n<p>VersionAddendum<br \/>\nOptionally specifies additional text to append to the SSH pro\u2010<br \/>\ntocol banner sent by the server upon connection.\u00a0 The default<br \/>\nis \u201cnone\u201d.<\/p>\n<p>X11DisplayOffset<br \/>\nSpecifies the first display number available for sshd(8)&#8217;s X11<br \/>\nforwarding.\u00a0 This prevents sshd from interfering with real X11<br \/>\nservers.\u00a0 The default is 10.<\/p>\n<p>X11Forwarding<br \/>\nSpecifies whether X11 forwarding is permitted.\u00a0 The argument<br \/>\nmust be \u201cyes\u201d or \u201cno\u201d.\u00a0 The default is \u201cno\u201d.<\/p>\n<p>When X11 forwarding is enabled, there may be additional expo\u2010<br \/>\nsure to the server and to client displays if the sshd(8) proxy<br \/>\ndisplay is configured to listen on the wildcard address (see<br \/>\nX11UseLocalhost below), though this is not the default.\u00a0 Addi\u2010<br \/>\ntionally, the authentication spoofing and authentication data<br \/>\nverification and substitution occur on the client side.\u00a0 The<br \/>\nsecurity risk of using X11 forwarding is that the client&#8217;s X11<br \/>\ndisplay server may be exposed to attack when the SSH client<br \/>\nrequests forwarding (see the warnings for ForwardX11 in<br \/>\nssh_config(5)).\u00a0 A system administrator may have a stance in<br \/>\nwhich they want to protect clients that may expose themselves<br \/>\nto attack by unwittingly requesting X11 forwarding, which can<br \/>\nwarrant a \u201cno\u201d setting.<\/p>\n<p>Note that disabling X11 forwarding does not prevent users from<br \/>\nforwarding X11 traffic, as users can always install their own<br \/>\nforwarders.\u00a0 X11 forwarding is automatically disabled if<br \/>\nUseLogin is enabled.<\/p>\n<p>X11UseLocalhost<br \/>\nSpecifies whether sshd(8) should bind the X11 forwarding server<br \/>\nto the loopback address or to the wildcard address.\u00a0 By<br \/>\ndefault, sshd binds the forwarding server to the loopback<br \/>\naddress and sets the hostname part of the DISPLAY environment<br \/>\nvariable to \u201clocalhost\u201d.\u00a0 This prevents remote hosts from con\u2010<br \/>\nnecting to the proxy display.\u00a0 However, some older X11 clients<br \/>\nmay not function with this configuration.\u00a0 X11UseLocalhost may<br \/>\nbe set to \u201cno\u201d to specify that the forwarding server should be<br \/>\nbound to the wildcard address.\u00a0 The argument must be \u201cyes\u201d or<br \/>\n\u201cno\u201d.\u00a0 The default is \u201cyes\u201d.<\/p>\n<p>XAuthLocation<br \/>\nSpecifies the full pathname of the xauth(1) program.\u00a0 The<br \/>\ndefault is \/usr\/X11R6\/bin\/xauth.<\/p>\n<p>TIME FORMATS<\/p>\n<p>sshd(8) command-line arguments and configuration file options that<br \/>\nspecify time may be expressed using a sequence of the form:<br \/>\ntime[qualifier], where time is a positive integer value and qualifier<br \/>\nis one of the following:<\/p>\n<p>\u27e8none\u27e9\u00a0 seconds<br \/>\ns | S\u00a0\u00a0 seconds<br \/>\nm | M\u00a0\u00a0 minutes<br \/>\nh | H\u00a0\u00a0 hours<br \/>\nd | D\u00a0\u00a0 days<br \/>\nw | W\u00a0\u00a0 weeks<\/p>\n<p>Each member of the sequence is added together to calculate the total<br \/>\ntime value.<\/p>\n<p>Time format examples:<\/p>\n<p>600\u00a0\u00a0\u00a0\u00a0 600 seconds (10 minutes)<br \/>\n10m\u00a0\u00a0\u00a0\u00a0 10 minutes<br \/>\n1h30m\u00a0\u00a0 1 hour 30 minutes (90 minutes)<\/p>\n<p>FILES<\/p>\n<p>\/etc\/ssh\/sshd_config<br \/>\nContains configuration data for sshd(8).\u00a0 This file should be<br \/>\nwritable by root only, but it is recommended (though not neces\u2010<br \/>\nsary) that it be world-readable.<\/p>\n<p>SEE ALSO<\/p>\n<p>sshd(8)<\/p>\n<p>AUTHORS<\/p>\n<p>OpenSSH is a derivative of the original and free ssh 1.2.12 release by<br \/>\nTatu Ylonen.\u00a0 Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,<br \/>\nTheo de Raadt and Dug Song removed many bugs, re-added newer features<br \/>\nand created OpenSSH.\u00a0 Markus Friedl contributed the support for SSH<br \/>\nprotocol versions 1.5 and 2.0.\u00a0 Niels Provos and Markus Friedl<br \/>\ncontributed support for privilege separation.<\/p>\n<p>COLOPHON<\/p>\n<p>This page is part of the openssh (Portable OpenSSH) project.\u00a0 Informa\u2010<br \/>\ntion about the project can be found at<br \/>\nhttp:\/\/www.openssh.com\/portable.html.\u00a0 If you have a bug report for<br \/>\nthis manual page, see http:\/\/www.openssh.com\/report.html.\u00a0 This page<br \/>\nwas obtained from the tarball openssh-6.7p1.tar.gz fetched from<br \/>\nhttp:\/\/ftp.eu.openbsd.org\/pub\/OpenBSD\/OpenSSH\/portable\/ on 2014-12-30.<br \/>\nIf you discover any rendering problems in this HTML version of the<br \/>\npage, or you believe there is a better or more up-to-date source for<br \/>\nthe page, or you have corrections or improvements to the information in<br \/>\nthis COLOPHON (which is not part of the original manual page), send a<br \/>\nmail to\u00a0man-pages@man7.org<\/p>\n<p>BSD\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 December 31, 2014\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 BSD<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SSHD_CONFIG(5)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 BSD File Formats Manual\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SSHD_CONFIG(5) NAME sshd_config \u2014 OpenSSH SSH daemon configuration file SYNOPSIS \/etc\/ssh\/sshd_config DESCRIPTION sshd(8) reads configuration data from \/etc\/ssh\/sshd_config (or the file specified with -f on the command line).\u00a0 The file contains keyword- argument pairs, one per line.\u00a0 Lines starting with \u2018#\u2019 and empty lines are interpreted as comments.\u00a0 Arguments may [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[8],"tags":[],"class_list":["post-355","post","type-post","status-publish","format-standard","hentry","category-shell"],"a3_pvc":{"activated":false,"total_views":0,"today_views":0},"_links":{"self":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/posts\/355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=355"}],"version-history":[{"count":0,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/posts\/355\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}