1 # Package generated configuration file
2 # See the sshd(8) manpage for details
4 # What ports, IPs and protocols we listen for
6 <%- extraports = case fqdn
7 when "ravel.debian.org" then "Port 443"
8 when "gluck.debian.org" then "Port 443"
9 when "agnesi.debian.org" then "Port 2260"
13 # Use these options to restrict which interfaces/protocols sshd will bind to
15 #ListenAddress 0.0.0.0
17 # HostKeys for protocol version 2
18 HostKey /etc/ssh/ssh_host_rsa_key
19 #Privilege Separation is turned on for security
20 UsePrivilegeSeparation yes
22 # Lifetime and size of ephemeral version 1 server key
23 KeyRegenerationInterval 3600
32 PermitRootLogin without-password
36 PubkeyAuthentication yes
38 # Don't read the user's ~/.rhosts and ~/.shosts files
40 # For this to work you will also need host keys in /etc/ssh_known_hosts
41 RhostsRSAAuthentication no
42 # similar for protocol version 2
43 HostbasedAuthentication no
44 # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
45 #IgnoreUserKnownHosts yes
47 # To enable empty passwords, change to yes (NOT RECOMMENDED)
48 PermitEmptyPasswords no
50 # Change to yes to enable challenge-response passwords (beware issues with
51 # some PAM modules and threads)
52 ChallengeResponseAuthentication no
55 #KerberosAuthentication no
56 #KerberosGetAFSToken no
57 #KerberosOrLocalPasswd yes
58 #KerberosTicketCleanup yes
61 #GSSAPIAuthentication no
62 #GSSAPICleanupCredentials yes
72 #Banner /etc/issue.net
74 # Allow client to pass locale environment variables
77 Subsystem sftp /usr/lib/openssh/sftp-server
80 AuthorizedKeysFile /etc/ssh/userkeys/%u
81 AuthorizedKeysFile2 /var/lib/misc/userkeys/%u
82 PasswordAuthentication no