5.10. Summary
As you can see, SSH servers have a tremendous number of configuration
options, and in some cases, multiple ways to achieve the same
results. All this power comes at a price, however. When setting up a
secure system, it is vital to consider each option carefully and
select appropriate values. Don't skimp on understanding: the
security of your systems may depend on it.
Chapter 10, "A Recommended Setup" lists configurations for SSH1, SSH2, and
OpenSSH. In addition, all the keywords and options in this chapter
appear in
Appendix B, "SSH Quick Reference".
Remember that serverwide configuration is only one avenue for
affecting server behavior. We discuss compile-time configuration in
Chapter 4, "Installation and Compile-Time Configuration" and per-account configuration in
Chapter 8, "Per-Account Server Configuration".
| | |
5.9. Compatibility Between SSH-1 and SSH-2 Servers | | 6. Key Management and Agents |