Hallo, dies ist ein Test.
PWD: /www/data-lst1/unixsoft/unixsoft/kaempfer/.public_html
Running in File Mode
Relative path: ./../.././../../../../etc/ssh/sshd_config.new
Real path: /etc/ssh/sshd_config.new
Zurück
# $OpenBSD: sshd_config,v 1.104 2021/07/02 05:11:21 dtucker Exp $ # This is the sshd server system-wide configuration file. See # sshd_config(5) for more information. # Listen port (the IANA registered port number for ssh is 22) #Port 22 # The default listen address is all interfaces, this may need to be changed # if you wish to restrict the interfaces sshd listens on for a multi homed host. # Multiple ListenAddress entries are allowed. #AddressFamily any #ListenAddress 0.0.0.0 #ListenAddress :: # If port forwarding is enabled (default), specify if the server can bind to # INADDR_ANY. # This allows the local port forwarding to work when connections are received # from any remote host. #GatewayPorts no # X11 tunneling options #X11DisplayOffset 10 #X11UseLocalhost yes X11Forwarding yes # The maximum number of concurrent unauthenticated connections to sshd. # start:rate:full see sshd(1) for more information. #MaxStartups 10:30:100 # Banner to be printed before authentication starts. Banner /etc/issue # Should sshd print the /etc/motd file and check for mail. # On Solaris it is assumed that the login shell will do these (eg /etc/profile). PrintMotd no # KeepAlive specifies whether keep alive messages are sent to the client. # See sshd(1) for detailed description of what this means. # Note that the client may also be sending keep alive messages to the server. #KeepAlive yes # Syslog facility and level #SyslogFacility auth #LogLevel info # # Authentication configuration # # sshd regenerates the key every KeyRegenerationInterval seconds. # The key is never stored anywhere except the memory of sshd. # The default is 1 hour (3600 seconds). #KeyRegenerationInterval 3600 # Ensure secure permissions on users .ssh directory. #StrictModes yes # Length of time in seconds before a client that hasn't completed # authentication is disconnected. # Default is 120 seconds. 0 means no time limit. #LoginGraceTime 120 # Maximum number of retries for authentication # Default is 6. #MaxAuthTries 6 # Are logins to accounts with empty passwords allowed. # If PermitEmptyPasswords is no, pass PAM_DISALLOW_NULL_AUTHTOK # to pam_authenticate(3PAM). #PermitEmptyPasswords no # To disable tunneled clear text passwords, change PasswordAuthentication to no. #PasswordAuthentication yes # Are root logins permitted using sshd. # Note that sshd uses pam_authenticate(3PAM) so the root (or any other) user # maybe denied access by a PAM module regardless of this setting. # Valid options are yes, without-password, no. PermitRootLogin no # sftp subsystem Subsystem sftp internal-sftp # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication. #IgnoreUserKnownHosts yes # Accept the LANG and LC_* environment variables sent by the client. AcceptEnv LANG AcceptEnv LC_*