Tuto


SUBMITTED BY: Albincusi

DATE: July 13, 2022, 12:30 p.m.

UPDATED: July 13, 2022, 1:35 p.m.

FORMAT: Text only

SIZE: 968 Bytes

HITS: 372

  1. ssh {
  2. authentication-order [method 1 method2...];
  3. authorized-keys-command authorized-keys-command;
  4. authorized-keys-command-user authorized-keys-command-user;
  5. ciphers [ cipher-1 cipher-2 cipher-3 ...];
  6. client-alive-count-max number;
  7. client-alive-interval seconds;
  8. connection-limit limit;
  9. fingerprint-hash (md5 | sha2-256);
  10. hostkey-algorithm (algorithm | no-algorithm);
  11. key-exchange [algorithm1 algorithm2...];
  12. log-key-changes log-key-changes;
  13. macs [algorithm1 algorithm2...];
  14. max-pre-authentication-packets number;
  15. max-sessions-per-connection number;
  16. no-challenge-response;
  17. no-password-authentication;
  18. no-passwords;
  19. no-public-keys;
  20. allow-tcp-forwarding;
  21. port port-number;
  22. protocol-version [v2];
  23. rate-limit number;
  24. rekey {
  25. data-limit bytes;
  26. time-limit minutes;
  27. }
  28. root-login (allow | deny | deny-password);
  29. sftp-server;
  30. }

comments powered by Disqus