skip book previous and next navigation links
go up to top of book: HP TCP/IP Services for OpenVMS Guide to SSH HP TCP/IP Services for OpenVMS Guide to SSH
go to beginning of appendix: SSH Client and Server Configuration Files SSH Client and Server Configuration Files
go to previous page: Client Configuration File Client Configuration File
 
end of book navigation links

Server Configuration File 



## File name:      SSHD2_CONFIG.# Product:        HP TCP/IP Services for OpenVMS# Version:        V5.4-00## © Copyright 1976, 2003 Hewlett-Packard Development Company, L.P. ### ssh2 server configuration information# ## General     AllowCshrcSourcingWithSubsystems							no    ForcePTTYAllocation							no    SyslogFacility						AUTH#   SyslogFacility						LOCAL7#   QuietMode						yes    VerboseMode						no ## Network     Port					22    ListenAddress					0.0.0.0    RequireReverseMapping						no    MaxBroadcastsPerSecond						0#   MaxBroadcastsPerSecond						1#   NoDelay					yes#   KeepAlive						yes#   MaxConnections						50#   MaxConnections						0# 0 == number of connections not limited   ## Crypto     Ciphers					AnyCipher#   Ciphers					AnyStd#   Ciphers					AnyStdCipher#   Ciphers					3des    MACs					AnyMAC#   MACs					AnyStd#   MACs					AnyStdMAC#   RekeyIntervalSeconds						3600  ## User     CheckMail						yes    PrintMotd						yes#   LoginGraceTime						600#   PermitEmptyPasswords						no#   StrictModes						yes    UserConfigDirectory							"%Dssh2"#   UserConfigDirectory							"/etc/ssh2/auth/%U"    UserKnownHosts						yes ## User public key authentication     AllowAgentForwarding						yes    AuthorizationFile						authorization    HostKeyFile						hostkey    IdentityFile					identification    PublicHostKeyFile						hostkey.pub    RandomSeedFile						random_seed  ## Tunneling     AllowTcpForwarding						yes#   AllowTcpForwardingForGroups							priviliged_tcp_forwarders#   AllowTcpForwardingForUsers							sjl, cowboyneal@slashdot.org    AllowX11Forwarding						yes#   DenyTcpForwardingForGroups							coming_from_outside#   DenyTcpForwardingForUsers							"2[:isdigit:]*4, peelo"  ## Authentication## Hostbased and PAM are not enabled by default. #   AllowedAuthentications						publickey#   AllowedAuthentications						publickey,pam-1@ssh.com#   AllowedAuthentications					        hostbased,publickey,password#   BannerMessageFile					        /etc/ssh2/ssh_banner_message#   BannerMessageFile						/etc/issue.net    PasswordGuesses						3#   RequiredAuthentications						publickey,password#   SshPAMClientPath						ssh-pam-client ## Host restrictions     AllowHosts						localhost, *#   AllowSHosts						trusted.host.org#   DenyHosts						evil.org, aol.com#   DenySHosts						not.quite.trusted.org#   IgnoreRhosts					no#   IgnoreRootRHosts						no#   (the above, if not set, is defaulted to the value of IgnoreRHosts)  ## User restrictions #   AllowGroups						staff,users#   AllowUsers						"sj*,s[:isdigit:]##,s(jl|amza)"#   DenyUsers						skuuppa,warezdude,31373#   DenyUsers						don@untrusted.org#   DenyGroups						guest#   PermitRootLogin						nopwd    PermitRootLogin						yes ## SSH1 compatibility #   Ssh1Compatibility					#   Sshd1Path					  ## Chrooted environment #   ChRootGroups					guest#   ChRootUsers						ftp, guest  ## subsystem definitions     subsystem-sftp 						/sys$system/tcpip$ssh_sftp-server2## OpenVMS auditing and access control#   AllowVmsLoginWithExpiredPw          yes#   AllowNonvmsLoginWithExpiredPw       no#   UserLoginLimit                      -1#   AccountingAuthentications           pubkey,password,hostbased#   IntrusionAuthentications            password#   IntrusionIdentMethod                pubkey,password,hostbased#   IntrusionIdentSsh                   pubkey,password,hostbased#   LogfailAuthentications              password#   PubkeyPassphraseGuesses             3

go to previous page: Client Configuration File Client Configuration File