public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH 1/2] sshd_config: Do not set defaults explicitly
@ 2020-01-20 20:04 Peter Müller
  2020-01-20 20:05 ` [PATCH 2/2] ssh_config: " Peter Müller
  0 siblings, 1 reply; 5+ messages in thread
From: Peter Müller @ 2020-01-20 20:04 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 4083 bytes --]

In order to keep configurations as small as possible and to make them
easier to read/audit, this patch omits all default configuration in the
OpenSSH server configuration file.

Further, it mentions where to refer for the full documentation.

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 config/ssh/sshd_config | 62 ++++++++++++++++----------------------------------
 1 file changed, 20 insertions(+), 42 deletions(-)

diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config
index a248c4906..bea5cee53 100644
--- a/config/ssh/sshd_config
+++ b/config/ssh/sshd_config
@@ -1,81 +1,59 @@
-# ultra-secure OpenSSH server configuration
+# OpenSSH server configuration file for IPFire
+#
+# The full documentation is available at: https://man.openbsd.org/sshd_config
+#
 
-# only allow version 2 of SSH protocol
+# Only allow version 2 of SSH protocol
 Protocol 2
 
-# listen on port 22 by default
+# Listen on port 22 by default
 Port 22
 
-# listen on these interfaces and protocols
-AddressFamily any
+# Listen on every interface and IPv4 only
+AddressFamily inet
 ListenAddress 0.0.0.0
 
-# limit authentication thresholds
+# Limit authentication timeout to 30 seconds
 LoginGraceTime 30s
-MaxAuthTries 6
 
-# limit maximum instanctes to prevent DoS
+# Limit maximum instanctes to prevent DoS
 MaxStartups 5
 
-# ensure proper logging
-SyslogFacility AUTH
-LogLevel INFO
-
-# enforce permission checks before a login is accepted
-# (prevents damage because of hacked systems with world-writeable
-# home directories or similar)
-StrictModes yes
-
-# only allow safe crypto algorithms (may break some _very_ outdated clients)
-# see also: https://stribika.github.io/2015/01/04/secure-secure-shell.html
+# Only allow safe crypto algorithms (may break some _very_ outdated clients)
+# See also: https://stribika.github.io/2015/01/04/secure-secure-shell.html
 KexAlgorithms curve25519-sha256(a)libssh.org,diffie-hellman-group-exchange-sha256
 Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
 MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com
 
-# enable data compression after successful login only
-Compression delayed
-
-# only allow cryptographically safe SSH host keys (adjust paths if needed)
+# Only allow cryptographically safe SSH host keys (adjust paths if needed)
 HostKey /etc/ssh/ssh_host_ed25519_key
 HostKey /etc/ssh/ssh_host_ecdsa_key
 HostKey /etc/ssh/ssh_host_rsa_key
 
-# only allow login via public key by default
+# Only allow login via public key by default
 PubkeyAuthentication yes
 PasswordAuthentication no
 ChallengeResponseAuthentication no
-PermitEmptyPasswords no
 
-# permit root login as there is no other user in IPFire 2.x
+# Permit root login as there is no other user in IPFire 2.x
 PermitRootLogin yes
 
-# ignore user ~/.rhost* files
-IgnoreRhosts yes
-
-# ignore user known hosts file
+# Ignore user ~/.ssh/known_hosts file
 IgnoreUserKnownHosts yes
 
-# ignore user environments
-PermitUserEnvironment no
-
-# do not allow any kind of forwarding (provides only low security)
+# Do not allow any kind of forwarding (provides only low security);
 # some of them might need to be re-enabled if SSH server is a jump platform
-X11Forwarding no
 AllowTcpForwarding no
 AllowAgentForwarding no
-PermitTunnel no
-GatewayPorts no
 PermitOpen none
 
-# detect broken sessions by sending keep-alive messages to
-# clients (both via TCP and SSH)
-TCPKeepAlive yes
+# Detect broken sessions by sending keep-alive messages to clients via SSH connection
 ClientAliveInterval 10
 
-# close unresponsive SSH sessions which fail to answer keep-alive
+# Close unresponsive SSH sessions which fail to answer keep-alive
 ClientAliveCountMax 6
 
-# add support for SFTP
+# Add support for SFTP
 Subsystem	sftp	/usr/lib/openssh/sftp-server
 
 # EOF
-- 
2.16.4

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [PATCH 2/2] ssh_config: Do not set defaults explicitly
  2020-01-20 20:04 [PATCH 1/2] sshd_config: Do not set defaults explicitly Peter Müller
@ 2020-01-20 20:05 ` Peter Müller
  2020-02-03 17:44   ` Michael Tremer
  0 siblings, 1 reply; 5+ messages in thread
From: Peter Müller @ 2020-01-20 20:05 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2338 bytes --]

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 config/ssh/ssh_config | 27 +++++++++++++--------------
 1 file changed, 13 insertions(+), 14 deletions(-)

diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config
index 2abfae6d1..2e2ee60c3 100644
--- a/config/ssh/ssh_config
+++ b/config/ssh/ssh_config
@@ -1,33 +1,32 @@
-# OpenSSH client configuration
+# OpenSSH client configuration file for IPFire
 #
-# set some basic hardening options for all connections
+# The full documentation is available at: https://man.openbsd.org/ssh_config
+#
+
+# Set some basic hardening options for all connections
 Host *
-        # disable Roaming as it is known to be vulnerable
+        # Disable Roaming as it is known to be vulnerable
         UseRoaming no
 
-        # only use secure crypto algorithm
+        # Only use secure crypto algorithms
         KexAlgorithms curve25519-sha256(a)libssh.org,diffie-hellman-group-exchange-sha256
         Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
         MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com
 
-        # always visualise server host keys (has no technical
-        # effect, but helps to identify key based MITM attacks)
+        # Always visualise server host keys (but helps to identify key based MITM attacks)
         VisualHostKey yes
 
-        # use SSHFP (might work on some up-to-date networks) to look up host keys
+        # Use SSHFP (might work on some up-to-date networks) to look up host keys
         VerifyHostKeyDNS yes
 
         # send keep-alive messages to connected server to avoid broken connections
         ServerAliveInterval 10
         ServerAliveCountMax 6
 
-        # disable X11 forwarding (security risk)
-        ForwardX11 no
-
-        # always check server IP address
-        CheckHostIP yes
-
-        # ensure only allowed authentication methods are used
+        # Ensure only allowed authentication methods are used
         PreferredAuthentications publickey,keyboard-interactive,password
 
+	# Prevent information leak by hashing ~/.ssh/known_hosts
+	HashKnownHosts yes
+
 # EOF
-- 
2.16.4


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH 2/2] ssh_config: Do not set defaults explicitly
  2020-01-20 20:05 ` [PATCH 2/2] ssh_config: " Peter Müller
@ 2020-02-03 17:44   ` Michael Tremer
  0 siblings, 0 replies; 5+ messages in thread
From: Michael Tremer @ 2020-02-03 17:44 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2581 bytes --]

Reviewed-by: Michael Tremer <michael.tremer(a)ipfire.org>

> On 20 Jan 2020, at 20:05, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
> ---
> config/ssh/ssh_config | 27 +++++++++++++--------------
> 1 file changed, 13 insertions(+), 14 deletions(-)
> 
> diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config
> index 2abfae6d1..2e2ee60c3 100644
> --- a/config/ssh/ssh_config
> +++ b/config/ssh/ssh_config
> @@ -1,33 +1,32 @@
> -# OpenSSH client configuration
> +# OpenSSH client configuration file for IPFire
> #
> -# set some basic hardening options for all connections
> +# The full documentation is available at: https://man.openbsd.org/ssh_config
> +#
> +
> +# Set some basic hardening options for all connections
> Host *
> -        # disable Roaming as it is known to be vulnerable
> +        # Disable Roaming as it is known to be vulnerable
>         UseRoaming no
> 
> -        # only use secure crypto algorithm
> +        # Only use secure crypto algorithms
>         KexAlgorithms curve25519-sha256(a)libssh.org,diffie-hellman-group-exchange-sha256
>         Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
>         MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com
> 
> -        # always visualise server host keys (has no technical
> -        # effect, but helps to identify key based MITM attacks)
> +        # Always visualise server host keys (but helps to identify key based MITM attacks)
>         VisualHostKey yes
> 
> -        # use SSHFP (might work on some up-to-date networks) to look up host keys
> +        # Use SSHFP (might work on some up-to-date networks) to look up host keys
>         VerifyHostKeyDNS yes
> 
>         # send keep-alive messages to connected server to avoid broken connections
>         ServerAliveInterval 10
>         ServerAliveCountMax 6
> 
> -        # disable X11 forwarding (security risk)
> -        ForwardX11 no
> -
> -        # always check server IP address
> -        CheckHostIP yes
> -
> -        # ensure only allowed authentication methods are used
> +        # Ensure only allowed authentication methods are used
>         PreferredAuthentications publickey,keyboard-interactive,password
> 
> +	# Prevent information leak by hashing ~/.ssh/known_hosts
> +	HashKnownHosts yes
> +
> # EOF
> -- 
> 2.16.4
> 


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH 1/2] sshd_config: Do not set defaults explicitly
  2020-02-03 17:24 ` [PATCH 1/2] sshd_config: " Peter Müller
@ 2020-02-03 17:42   ` Michael Tremer
  0 siblings, 0 replies; 5+ messages in thread
From: Michael Tremer @ 2020-02-03 17:42 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 6493 bytes --]

Hi,

> On 3 Feb 2020, at 17:24, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Hello Michael,
> 
> thanks for your reply.
> 
> Since the Unbound configuration patch (https://patchwork.ipfire.org/patch/2710/)
> is based on the same motivation than this one, I am a bit surprised by your Reviewed-by
> tag on it. :-)

Yeah I could not remember if I wrote this email and waiting for a reply kind of timed out :)

> Breaking productive environment is a latter weak point to me, as keeping configuration
> statements/directives removed in the upstream may or may not cause the same effect.
> Worse, there may be good reasons for changing upstream defaults which we should track
> closely due to security considerations. On the other hands, relying on third parties
> is a bad idea when it comes to security - not to mention personal aversions against
> relying something or someone in general...
> 
> In the end, I figure it is less worse to have a shorter configuration which takes less
> disk space and is easier to review and audit. You are right, the downside of this is
> to rely on other people's opinion of security and interoperability.

Disk space? We are saying bytes. As long as we are shipping half a gigabyte of firmware for outdated SCSI controllers, this won’t really help you much.

-Michael

P.S. I suppose we should just go ahead with this then:

Reviewed-by: Michael Tremer <michael.tremer(a)ipfire.org>

> 
> Thanks, and best regards,
> Peter Müller
> 
>> Hello,
>> 
>> I am not 100% sure if I like this change.
>> 
>> Simply because of defaults changing in software. Although we generally want to follow upstream this might break installations.
>> 
>> Do we not see this as a danger?
>> 
>> I would prefer to have shorter configurations, but not breaking production is more important.
>> 
>> -Michael
>> 
>>> On 20 Jan 2020, at 20:04, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>> 
>>> In order to keep configurations as small as possible and to make them
>>> easier to read/audit, this patch omits all default configuration in the
>>> OpenSSH server configuration file.
>>> 
>>> Further, it mentions where to refer for the full documentation.
>>> 
>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>> ---
>>> config/ssh/sshd_config | 62 ++++++++++++++++----------------------------------
>>> 1 file changed, 20 insertions(+), 42 deletions(-)
>>> 
>>> diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config
>>> index a248c4906..bea5cee53 100644
>>> --- a/config/ssh/sshd_config
>>> +++ b/config/ssh/sshd_config
>>> @@ -1,81 +1,59 @@
>>> -# ultra-secure OpenSSH server configuration
>>> +# OpenSSH server configuration file for IPFire
>>> +#
>>> +# The full documentation is available at: https://man.openbsd.org/sshd_config
>>> +#
>>> 
>>> -# only allow version 2 of SSH protocol
>>> +# Only allow version 2 of SSH protocol
>>> Protocol 2
>>> 
>>> -# listen on port 22 by default
>>> +# Listen on port 22 by default
>>> Port 22
>>> 
>>> -# listen on these interfaces and protocols
>>> -AddressFamily any
>>> +# Listen on every interface and IPv4 only
>>> +AddressFamily inet
>>> ListenAddress 0.0.0.0
>>> 
>>> -# limit authentication thresholds
>>> +# Limit authentication timeout to 30 seconds
>>> LoginGraceTime 30s
>>> -MaxAuthTries 6
>>> 
>>> -# limit maximum instanctes to prevent DoS
>>> +# Limit maximum instanctes to prevent DoS
>>> MaxStartups 5
>>> 
>>> -# ensure proper logging
>>> -SyslogFacility AUTH
>>> -LogLevel INFO
>>> -
>>> -# enforce permission checks before a login is accepted
>>> -# (prevents damage because of hacked systems with world-writeable
>>> -# home directories or similar)
>>> -StrictModes yes
>>> -
>>> -# only allow safe crypto algorithms (may break some _very_ outdated clients)
>>> -# see also: https://stribika.github.io/2015/01/04/secure-secure-shell.html
>>> +# Only allow safe crypto algorithms (may break some _very_ outdated clients)
>>> +# See also: https://stribika.github.io/2015/01/04/secure-secure-shell.html
>>> KexAlgorithms curve25519-sha256(a)libssh.org,diffie-hellman-group-exchange-sha256
>>> Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
>>> MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com
>>> 
>>> -# enable data compression after successful login only
>>> -Compression delayed
>>> -
>>> -# only allow cryptographically safe SSH host keys (adjust paths if needed)
>>> +# Only allow cryptographically safe SSH host keys (adjust paths if needed)
>>> HostKey /etc/ssh/ssh_host_ed25519_key
>>> HostKey /etc/ssh/ssh_host_ecdsa_key
>>> HostKey /etc/ssh/ssh_host_rsa_key
>>> 
>>> -# only allow login via public key by default
>>> +# Only allow login via public key by default
>>> PubkeyAuthentication yes
>>> PasswordAuthentication no
>>> ChallengeResponseAuthentication no
>>> -PermitEmptyPasswords no
>>> 
>>> -# permit root login as there is no other user in IPFire 2.x
>>> +# Permit root login as there is no other user in IPFire 2.x
>>> PermitRootLogin yes
>>> 
>>> -# ignore user ~/.rhost* files
>>> -IgnoreRhosts yes
>>> -
>>> -# ignore user known hosts file
>>> +# Ignore user ~/.ssh/known_hosts file
>>> IgnoreUserKnownHosts yes
>>> 
>>> -# ignore user environments
>>> -PermitUserEnvironment no
>>> -
>>> -# do not allow any kind of forwarding (provides only low security)
>>> +# Do not allow any kind of forwarding (provides only low security);
>>> # some of them might need to be re-enabled if SSH server is a jump platform
>>> -X11Forwarding no
>>> AllowTcpForwarding no
>>> AllowAgentForwarding no
>>> -PermitTunnel no
>>> -GatewayPorts no
>>> PermitOpen none
>>> 
>>> -# detect broken sessions by sending keep-alive messages to
>>> -# clients (both via TCP and SSH)
>>> -TCPKeepAlive yes
>>> +# Detect broken sessions by sending keep-alive messages to clients via SSH connection
>>> ClientAliveInterval 10
>>> 
>>> -# close unresponsive SSH sessions which fail to answer keep-alive
>>> +# Close unresponsive SSH sessions which fail to answer keep-alive
>>> ClientAliveCountMax 6
>>> 
>>> -# add support for SFTP
>>> +# Add support for SFTP
>>> Subsystem	sftp	/usr/lib/openssh/sftp-server
>>> 
>>> # EOF
>>> -- 
>>> 2.16.4
>> 


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH 1/2] sshd_config: Do not set defaults explicitly
       [not found] <5B6C1246-8810-4DE7-B67F-2CEAE0BA2597@ipfire.org>
@ 2020-02-03 17:24 ` Peter Müller
  2020-02-03 17:42   ` Michael Tremer
  0 siblings, 1 reply; 5+ messages in thread
From: Peter Müller @ 2020-02-03 17:24 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 5821 bytes --]

Hello Michael,

thanks for your reply.

Since the Unbound configuration patch (https://patchwork.ipfire.org/patch/2710/)
is based on the same motivation than this one, I am a bit surprised by your Reviewed-by
tag on it. :-)

Breaking productive environment is a latter weak point to me, as keeping configuration
statements/directives removed in the upstream may or may not cause the same effect.
Worse, there may be good reasons for changing upstream defaults which we should track
closely due to security considerations. On the other hands, relying on third parties
is a bad idea when it comes to security - not to mention personal aversions against
relying something or someone in general...

In the end, I figure it is less worse to have a shorter configuration which takes less
disk space and is easier to review and audit. You are right, the downside of this is
to rely on other people's opinion of security and interoperability.

Thanks, and best regards,
Peter Müller

> Hello,
> 
> I am not 100% sure if I like this change.
> 
> Simply because of defaults changing in software. Although we generally want to follow upstream this might break installations.
> 
> Do we not see this as a danger?
> 
> I would prefer to have shorter configurations, but not breaking production is more important.
> 
> -Michael
> 
>> On 20 Jan 2020, at 20:04, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>
>> In order to keep configurations as small as possible and to make them
>> easier to read/audit, this patch omits all default configuration in the
>> OpenSSH server configuration file.
>>
>> Further, it mentions where to refer for the full documentation.
>>
>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>> ---
>> config/ssh/sshd_config | 62 ++++++++++++++++----------------------------------
>> 1 file changed, 20 insertions(+), 42 deletions(-)
>>
>> diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config
>> index a248c4906..bea5cee53 100644
>> --- a/config/ssh/sshd_config
>> +++ b/config/ssh/sshd_config
>> @@ -1,81 +1,59 @@
>> -# ultra-secure OpenSSH server configuration
>> +# OpenSSH server configuration file for IPFire
>> +#
>> +# The full documentation is available at: https://man.openbsd.org/sshd_config
>> +#
>>
>> -# only allow version 2 of SSH protocol
>> +# Only allow version 2 of SSH protocol
>> Protocol 2
>>
>> -# listen on port 22 by default
>> +# Listen on port 22 by default
>> Port 22
>>
>> -# listen on these interfaces and protocols
>> -AddressFamily any
>> +# Listen on every interface and IPv4 only
>> +AddressFamily inet
>> ListenAddress 0.0.0.0
>>
>> -# limit authentication thresholds
>> +# Limit authentication timeout to 30 seconds
>> LoginGraceTime 30s
>> -MaxAuthTries 6
>>
>> -# limit maximum instanctes to prevent DoS
>> +# Limit maximum instanctes to prevent DoS
>> MaxStartups 5
>>
>> -# ensure proper logging
>> -SyslogFacility AUTH
>> -LogLevel INFO
>> -
>> -# enforce permission checks before a login is accepted
>> -# (prevents damage because of hacked systems with world-writeable
>> -# home directories or similar)
>> -StrictModes yes
>> -
>> -# only allow safe crypto algorithms (may break some _very_ outdated clients)
>> -# see also: https://stribika.github.io/2015/01/04/secure-secure-shell.html
>> +# Only allow safe crypto algorithms (may break some _very_ outdated clients)
>> +# See also: https://stribika.github.io/2015/01/04/secure-secure-shell.html
>> KexAlgorithms curve25519-sha256(a)libssh.org,diffie-hellman-group-exchange-sha256
>> Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
>> MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com
>>
>> -# enable data compression after successful login only
>> -Compression delayed
>> -
>> -# only allow cryptographically safe SSH host keys (adjust paths if needed)
>> +# Only allow cryptographically safe SSH host keys (adjust paths if needed)
>> HostKey /etc/ssh/ssh_host_ed25519_key
>> HostKey /etc/ssh/ssh_host_ecdsa_key
>> HostKey /etc/ssh/ssh_host_rsa_key
>>
>> -# only allow login via public key by default
>> +# Only allow login via public key by default
>> PubkeyAuthentication yes
>> PasswordAuthentication no
>> ChallengeResponseAuthentication no
>> -PermitEmptyPasswords no
>>
>> -# permit root login as there is no other user in IPFire 2.x
>> +# Permit root login as there is no other user in IPFire 2.x
>> PermitRootLogin yes
>>
>> -# ignore user ~/.rhost* files
>> -IgnoreRhosts yes
>> -
>> -# ignore user known hosts file
>> +# Ignore user ~/.ssh/known_hosts file
>> IgnoreUserKnownHosts yes
>>
>> -# ignore user environments
>> -PermitUserEnvironment no
>> -
>> -# do not allow any kind of forwarding (provides only low security)
>> +# Do not allow any kind of forwarding (provides only low security);
>> # some of them might need to be re-enabled if SSH server is a jump platform
>> -X11Forwarding no
>> AllowTcpForwarding no
>> AllowAgentForwarding no
>> -PermitTunnel no
>> -GatewayPorts no
>> PermitOpen none
>>
>> -# detect broken sessions by sending keep-alive messages to
>> -# clients (both via TCP and SSH)
>> -TCPKeepAlive yes
>> +# Detect broken sessions by sending keep-alive messages to clients via SSH connection
>> ClientAliveInterval 10
>>
>> -# close unresponsive SSH sessions which fail to answer keep-alive
>> +# Close unresponsive SSH sessions which fail to answer keep-alive
>> ClientAliveCountMax 6
>>
>> -# add support for SFTP
>> +# Add support for SFTP
>> Subsystem	sftp	/usr/lib/openssh/sftp-server
>>
>> # EOF
>> -- 
>> 2.16.4
> 

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2020-02-03 17:44 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-01-20 20:04 [PATCH 1/2] sshd_config: Do not set defaults explicitly Peter Müller
2020-01-20 20:05 ` [PATCH 2/2] ssh_config: " Peter Müller
2020-02-03 17:44   ` Michael Tremer
     [not found] <5B6C1246-8810-4DE7-B67F-2CEAE0BA2597@ipfire.org>
2020-02-03 17:24 ` [PATCH 1/2] sshd_config: " Peter Müller
2020-02-03 17:42   ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox