1 # SSH configuration file.
3 # Some options are set even if they are default to prevent /etc/ssh/ssh_config
4 # from overwriting them.
6 # Copyright (C) 2011-2013 Simon Ruderich
8 # This file is free software: you can redistribute it and/or modify
9 # it under the terms of the GNU General Public License as published by
10 # the Free Software Foundation, either version 3 of the License, or
11 # (at your option) any later version.
13 # This file is distributed in the hope that it will be useful,
14 # but WITHOUT ANY WARRANTY; without even the implied warranty of
15 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 # GNU General Public License for more details.
18 # You should have received a copy of the GNU General Public License
19 # along with this file. If not, see <http://www.gnu.org/licenses/>.
21 # Undocumented (and not very well tested) feature. This drops the connection
22 # after 5 seconds of inactivity. Thanks to shad0VV in #openssh on Freenode
23 # (2012-11-04 18:40 CET) for telling me about this undocumented feature.
25 # ServerAliveCountMax 0
26 # ServerAliveInterval 5
29 # Rules for all hosts.
32 # Force protocol version 2 which is more secure.
35 # Disable X11 and agent forwarding for security reasons.
38 # Don't trust remote X11 clients. If enabled allows bad admins complete access
42 # Abort if not all requested port forwardings can be set up.
43 ExitOnForwardFailure yes
45 # Allow using -M (ControlMaster) to create a master SSH session which
46 # "tunnels" other connections to the same host, thus reducing the number of
47 # authentications (which are relatively slow) and TCP connections. The master
48 # sockets are stored in ~/.ssh (by default ControlPath is not set).
49 ControlPath ~/.ssh/master-%l-%h-%p-%r
51 # Don't permit running local commands.
54 # Don't send any environment variables.
57 # Check host IP in known_hosts when connecting to detect DNS spoofing.
59 # Ask before adding any host keys to ~/.ssh/known_hosts.
60 StrictHostKeyChecking ask