diff options
Diffstat (limited to 'debian/openssh-server.templates')
-rw-r--r-- | debian/openssh-server.templates | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/debian/openssh-server.templates b/debian/openssh-server.templates index b2d94fabe..581d71956 100644 --- a/debian/openssh-server.templates +++ b/debian/openssh-server.templates | |||
@@ -7,22 +7,6 @@ | |||
7 | # Even minor modifications require translation updates and such | 7 | # Even minor modifications require translation updates and such |
8 | # changes should be coordinated with translators and reviewers. | 8 | # changes should be coordinated with translators and reviewers. |
9 | # | 9 | # |
10 | Template: ssh/disable_cr_auth | ||
11 | Type: boolean | ||
12 | Default: false | ||
13 | _Description: Disable challenge-response authentication? | ||
14 | Password authentication appears to be disabled in the current OpenSSH | ||
15 | server configuration. In order to prevent users from logging in using | ||
16 | passwords (perhaps using only public key authentication instead) with | ||
17 | recent versions of OpenSSH, you must disable challenge-response | ||
18 | authentication, or else ensure that your PAM configuration does not allow | ||
19 | Unix password file authentication. | ||
20 | . | ||
21 | If you disable challenge-response authentication, then users will not be | ||
22 | able to log in using passwords. If you leave it enabled (the default | ||
23 | answer), then the 'PasswordAuthentication no' option will have no useful | ||
24 | effect unless you also adjust your PAM configuration in /etc/pam.d/ssh. | ||
25 | |||
26 | Template: ssh/vulnerable_host_keys | 10 | Template: ssh/vulnerable_host_keys |
27 | Type: note | 11 | Type: note |
28 | #flag:translate!:5 | 12 | #flag:translate!:5 |