Tectia

Default sshd2_config Configuration File

The default sshd2_config configuration file is shown below. For descriptions of the configuration options, see sshd2_config

## SSH CONFIGURATION FILE FORMAT VERSION 1.1
## REGEX-SYNTAX egrep
## end of metaconfig
## (leave above lines intact!)
##
## sshd2_config
##
## SSH Tectia Server 6.2 for IBM z/OS - SSHD2 Server Configuration File
##

## General

# Server Authentication: server keys in files
#       HostKeyFile                     hostkey
#       PublicHostKeyFile               hostkey.pub
#       HostCertificateFile             hostkey.crt # Comment out the pubkey
                                                    # if cert is specified
# Server Authentication: server key and certificate in SAF
#       HostKeyEkProvider               "zos-saf"
#       HostKeyEkInitString             "KEYS(ID(SSHD2) RING(HOSTKEY) LABEL('Host key \
                                         label'))"
#       HostKey.Cert.Required           yes
#
#       RandomSeedFile                  random_seed
#       BannerMessageFile               /opt/tectia/etc/ssh_banner_message
#       BannerMessageFile               /etc/issue.net
#
#       VerboseMode                     no # For debugging only. See man page.
#       QuietMode                       no
#       SyslogFacility                  AUTH
#       SyslogFacility                  LOCAL7
#       SftpSyslogFacility              DAEMON
#       SftpSmfType                     none
#       SftpSmfType                     TYPE119

## Communication with ssh-certd

#       CertdListenerPath               /opt/tectia/var/run/ssh-certd-listener

## Network

# Port is not commented out, as it is needed by the example startup
# scripts. Well, the default will not likely change.
        Port                            22
#       PidFile                         default
#       PidFile                         /opt/tectia/var/run/sshd2_22.pid
#       PidFile                         /opt/tectia/var/run/sshd2.pid
#       ListenAddress                   any
#       ListenerRetryInterval           0
#       ListenerRetryInterval           60
#       ResolveClientHostName           yes
#       RequireReverseMapping           no
#       MaxBroadcastsPerSecond          0
#       MaxBroadcastsPerSecond          1
#       NoDelay                         no
#       KeepAlive                       yes
#       MaxConnections                  50
#       MaxConnections                  0
# 0 == number of connections not limited

## Crypto

#       Ciphers                         aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
# Specifies the accepted encryption algorithms for connection security. It is
# a list of cipher names or one of the names Any, AnyCipher, AnyStd or AnyStdCipher.
# Any and AnyCipher include all the ciphers supported by Tectia.
# AnyStd and AnyStdCipher include ciphers listed in the SSH standards.
# Any and AnyStd also include "none", which means no encryption.
#

#       MACs                            hmac-sha1,hmac-sha1-96,hmac-sha256-2@ssh.com,\
                                        hmac-sha224@ssh.com,hmac-sha256@ssh.com, \
                                        hmac-sha384@ssh.com,hmac-sha512@ssh.com
# Specifies the accepted Message Authentication Codes for connection security. It is
# a list of MAC names or one of the names Any, AnyMAC, AnyStd or AnyStdMAC.
# Any and AnyMAC include all the MACs supported by Tectia.
# AnyStd and AnyStdMAC include the MACs listed in the SSH standards.
# Any and AnyStd also include "none", which means no message authentication.
#

#       KEXs                            diffie-hellman-group14-sha1, \
                                        diffie-hellman-group1-sha1, \
                                        diffie-hellman-group14-sha256@ssh.com
# A list of key exchange names or Any, AnyKEX, AnyStd or AnyStdKEX.
#

#       HostKeyAlgorithms               ssh-dss,ssh-rsa,ssh-dss-sha256@ssh.com, \
                                        ssh-rsa-sha256@ssh.com,x509v3-sign-dss, \
                                        x509v3-sign-rsa,x509v3-sign-dss-sha256@ssh.com, \
                                        x509v3-sign-rsa-sha256@ssh.com
# A list of host key algorithm names or Any, AnyKEX, AnyStd or AnyStdKEX.
#

#       RekeyIntervalSeconds            3600

## Crypto Hardware 

#       UseCryptoHardware               yes
# Specifies whether hardware support is wanted for certain
# algorithms. The support levels are
#   no          do not use crypto hardware
#   yes         use crypto hardware if available
#   must        use crypto hardware, fail if not available
# 
# The level may be given alone as a default for all algorithms or 
# together with an algorithm. The algorithm names that may 
# be used are:
#   rng         random number generator
#   sha         SHA1 and SHA2 digest algorithms (sha1 is equivalent)
#   aes         AES algorithms
#   3des        Triple DES
#
# UseCryptoHardware is a comma-delimited list of algorithm:support level
# pairs. It may start with a sole support level
#
# E.g. To use all available hardware support and fail if support for 3DES 
#      or SHA is not available, specify "yes,aes:must,sha:must"
#
# On most IBM mainframe systems the following algorithms have hardware support:
# the ciphers "aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc" and the MACs
# "hmac-sha1,hmac-sha224@ssh.com,hmac-sha256@ssh.com,hmac-sha256-2@ssh.com,
# hmac-sha384@ssh.com,hmac-sha512@ssh.com". The support is provided by
# the CPACF facility and ICSF.
# 

## User

#       PrintMotd                       yes
#       CheckMail                       yes
#       StrictModes                     no
# Specifies 1 hour (you can also use 'w' for week, 'd' for day, 'm' for
#                   minute, 's' for seconds)
#       IdleTimeOut                     1h
# without specifier, the default number is in seconds
#       IdleTimeOut                     3600
#
#       UserConfigDirectory             "%D/.ssh2"
#       UserConfigDirectory             "/opt/tectia/etc/auth/%U"
#       AuthorizationFile               authorization
#
# Authorized keys file directive can be used in enabling public-key
# authentication against legacy authorized_keys file that contains
# several keys in single file.
#       AuthorizedKeysFile             "authorized_keys"
#       AuthorizedKeysFile             "%D/.ssh/authorized_keys"
#
# This variable is set here, because by default it is empty, and so no
# variables can be set. Because of that, we set a few common ones here.
        SettableEnvironmentVars         LANG,LC_(ALL|COLLATE|CTYPE|MONETARY| \
                                        NUMERIC|TIME),PATH,TERM,TZ,SSH.*

## Conversion on terminal session

#       ShellTransferCodeset            ISO8859-1
#       ShellTransferLineDelimiter      UNIX
#       ShellAccountCodeset             IBM-1047
#       ShellAccountLineDelimiter       MVS
#       ShellTranslateTable             ""
#       ShellConvert                     yes

## Tunneling

#       AllowTcpForwarding              yes
#       AllowTcpForwardingForUsers      sjl, ra-user@remote\.example
#       DenyTcpForwardingForUsers       2[[:digit:]]*4,peelo
#       AllowTcpForwardingForGroups     privileged_tcp_forwarders
#       DenyTcpForwardingForGroups      coming_from_outside
#
#       AllowLocalForwarding            no
        AllowLocalForwarding            yes

# Local port forwardings to host 10.1.0.25 ports 143 and 25 are
# allowed for all users in group users.
# Note that forwardings using the name of this host will be allowed (if
# it can be resolved from the DNS).
#
#      ForwardACL allow local .*%users \i10\.1\.0\.25%(143|25)
#
# Local port forwardings requested exactly to host proxy.example.com
# port 8080 are allowed for users that have 's' as first character
# and belong to the group with group ID (GID) 10:
#
#      ForwardACL allow local s.*%10 proxy\.example\.com%8080
#
# Remote port forwarding is denied for all users to all hosts:
#      ForwardACL deny remote .* .*


## Authentication

## publickey and password allowed by default
#      AllowedAuthentications          publickey,password
#      AllowedAuthentications          hostbased,publickey,password
#      AllowedAuthentications          hostbased,publickey,keyboard-interactive
#      RequiredAuthentications         publickey,password
#      LoginGraceTime                  600
#      AuthInteractiveFailureTimeout   2
#
#      HostbasedAuthForceClientHostnameDNSMatch no
#      UserKnownHosts                  yes
#
#      AuthPublicKey.MaxSize           0
#      AuthPublicKey.MinSize           0
#      AuthPublicKey.Algorithms        AnyStdPublicKeyAlgorithm
#
#      AllowAgentForwarding            yes

#      AuthKbdInt.NumOptional          0
#      AuthKbdInt.Optional             password,plugin
#      AuthKbdInt.Required             password
#      AuthKbdInt.Retries              3
#
#      PermitEmptyPasswords            no
#      PasswordGuesses                 3
#
## publickey authentication with certificates in SAF
# Users logging in with name "-" need SAF certificate
#       IdentityDispatchUsers                  -          
#
# All users logging in need SAF certificate
#       IdentityDispatchUsers                  .*         
#
#       AuthPublicKey.Cert.ValidationMethods   saf
#
# Certificate is also validated in ssh-certd
#       AuthPublicKey.Cert.ValidationMethods   saf,tectia
#
# Client must send user certificate
#       AuthPublicKey.Cert.Required            yes        
#
#       AuthorizationEkProvider         "zos-saf:KEYS(ID(%U) RING(%U))"
#       AuthorizationEkProvider         "zos-saf:[USERNAME=%U UID=%IU GID=%IG]"
#       AuthorizationEkInitStringMapper /home/SSHD2/mapper.sh
#       AuthorizationEkInitStringMapperTimeout 0   # 0 = Timeout disabled
#
## hostbased authentication with certificates in SAF
#       AuthHostbased.Cert.ValidationMethods   saf
#
# Certificate is also validated in ssh-certd
#       AuthHostbased.Cert.ValidationMethods   saf,tectia 
#
# Client must send host certificate
#       AuthHostbased.Cert.Required  yes        
#       KnownhostsEkProvider        "zos-saf:KEYS(ID(SSHD2) RING(KNOWNHOSTS))"
#

# Ignoring certain restrictions during user login: password expiration
# on AIX, HP-UX in trusted mode and Windows.

#       IgnoreLoginRestrictions.PasswordExpiration no

# To enable authentication time password changing (instead of the old
# forced command style), uncomment the following line: 

#       AuthPassword.ChangePlugin       ssh-passwd-plugin

# (this will also be used by the "password" submethod in
#  keyboard-interactive).

## Host restrictions

#       AllowHosts               localhost, example\.com, friendly\.example
#
## Next one matches with, for example, taulu.foobar.com, tuoli.com, but
## not tuoli1.com. Note that you have to input string "\." when you want it
## to match only a literal dot. You also have to escape "," when you
## want to use it in the pattern, because otherwise it is considered a list
## separator.
##
##     AllowHosts               t..l.\..*
##
## The following matches any numerical IP address (yes, it is cumbersome)
##
##     AllowHosts               ([[:digit:]]{1\,3}\.){3}[[:digit:]]{1\,3}
##
## Same thing is achieved with the special prefix "\i" in a pattern.
## This means that the pattern is only used to match IP addresses.
##
## Using the above example:
##
##     AllowHosts               \i.*
##
## You can probably see the difference between the two.
##
## Also, you can use subnet masks, by using prefix "\m"
##
##     AllowHosts               \m127.0/8
## and
##     AllowHosts               \m127.0.0.0/24
##
## would match localhost ("127.0.0.1").
##
#       DenyHosts                       evil\.example, aol\.example
#       AllowSHosts                     trusted\.host\.example
#       DenySHosts                      not\.quite\.trusted\.example
#       IgnoreRhosts                    no
#       IgnoreRootRHosts                no
# (the above, if not set, is defaulted to the value of IgnoreRHosts)

## User restrictions
# User and group names must be in uppercase.

#       AllowUsers                      SJ.*,S[[:digit:]]*,S(JL|AMZA)
#       DenyUsers                       SKUUPPA,WAREZDUDE,31373
#       DenyUsers                       DON@example\.org
#       AllowGroups                     STAFF,USERS
#       DenyGroups                      GUEST,ANONYMOUS
#       PermitRootLogin                 yes
#       PermitRootLogin                 nopwd

## Chrooted environment
# User and group names must be in uppercase.

#       ChRootUsers                     ANONYMOUS,FTP,GUEST
#       ChRootGroups                    SFTP,GUEST

## Subsystem definitions

# Subsystems do not have defaults, so this is needed here (uncommented).
#       subsystem-sftp                  sftp-server
        subsystem-sftp                  /opt/tectia/libexec/sft-server-g3
# Also internal SFTP subsystem can be used.
#       subsystem-sftp                  internal://sftp-server

## Subconfiguration
# There are no default subconfiguration files. When specified the last
# obtained keyword value will prevail. Note that the host-specific files
# are read before the user-specific files.
# User and group names must be in uppercase.

# Following matches (from) any host:
#
#      HostSpecificConfig .* /opt/tectia/etc/subconfig/host_ext.example
#
# Following matches to subnet mask:
#
#      HostSpecificConfig \m192.168.0.0/16 /opt/tectia/etc/subconfig/host_int.example
#
# Following matches to users from ssh.com that have two character
# username or username is SJL and belong to group WHEEL or WHEEL[0-9]:
#
#      UserSpecificConfig (..|SJL)%WHEEL[[:digit:]]?@ssh\.com /opt/tectia/etc/  \
                           subconfig/user.example
#
# Following matches to the user ANONYMOUS from any host:
#
#      UserSpecificConfig ANONYMOUS@.* /opt/tectia/etc/subconfig/anonymous.example