Getting Started Guide
ChallRespAuthAllowUsers...................................................................................................64
ChallRespAuthDenyUsers ...................................................................................................65
ChrootDirectory.................................................................................................................65
Ciphers............................................................................................................................65
ClientAliveCountMax..........................................................................................................65
ClientAliveInterval..............................................................................................................66
Compression.....................................................................................................................66
CountKeyAuthBadLogins.....................................................................................................66
DenyGroups......................................................................................................................66
DenyUsers........................................................................................................................67
DisIStrip............................................................................................................................67
DoubleMaxDisps...............................................................................................................67
EnforceSecureTTY...............................................................................................................67
ForceCommand.................................................................................................................68
GatewayPorts....................................................................................................................68
GSSAPIAuthentication.........................................................................................................68
GSSAPICleanupCredentials.................................................................................................68
GSSAPIEnableMitmAttack...................................................................................................68
HostbasedAuthAllowUsers ..................................................................................................69
HostbasedAuthDenyUsers...................................................................................................69
HostbasedAuthentication.....................................................................................................69
HostKey............................................................................................................................69
IgnoreRhosts......................................................................................................................69
IgnoreUserKnownHosts.......................................................................................................70
IPQoS..............................................................................................................................70
KerberosAuthAllowUsers.....................................................................................................71
KerberosAuthDenyUsers......................................................................................................71
KerberosAuthentication.......................................................................................................71
KerberosOrLocalPasswd......................................................................................................71
KerberosTicketCleanup........................................................................................................71
KexAlgorithms...................................................................................................................71
KeyRegenerationInterval......................................................................................................72
ListenAddress....................................................................................................................72
LoginGraceTime.................................................................................................................72
LogLevel............................................................................................................................72
MACs .............................................................................................................................72
Match..............................................................................................................................72
MaxAuthTries....................................................................................................................73
MaxSessions.....................................................................................................................73
MaxStartups......................................................................................................................74
PasswordAuthAllowUsers.....................................................................................................74
PasswordAuthDenyUsers.....................................................................................................74
PasswordAuthentication......................................................................................................74
PermitEmptyPasswords........................................................................................................74
PermitOpen.......................................................................................................................74
PermitRootLogin.................................................................................................................75
PermitTunnel......................................................................................................................75
PermitUserEnvironment........................................................................................................75
PidFile..............................................................................................................................76
Port..................................................................................................................................76
PrintLastLog.......................................................................................................................76
PrintMotd..........................................................................................................................76
Protocol............................................................................................................................76
PubkeyAuthAllowUsers........................................................................................................77
PubkeyAuthDenyUsers.........................................................................................................77
Contents 5