gianlucavarenni
Contributor
Contributor

I think there is already a timeout set. this is the output of sshd -T

/etc/ssh/sshd_config line 7: Deprecated option UsePrivilegeSeparation

/etc/ssh/sshd_config line 15: Unsupported option PrintLastLog

port 22

addressfamily any

listenaddress 0.0.0.0:22

listenaddress [::]:22

usepam yes

logingracetime 120

x11displayoffset 10

maxauthtries 6

maxsessions 10

clientaliveinterval 200

clientalivecountmax 3

streamlocalbindmask 0177

permitrootlogin yes

ignorerhosts yes

ignoreuserknownhosts no

hostbasedauthentication no

hostbasedusesnamefrompacketonly no

pubkeyauthentication yes

passwordauthentication no

kbdinteractiveauthentication yes

challengeresponseauthentication yes

printmotd yes

x11forwarding no

x11uselocalhost yes

permittty yes

permituserrc yes

strictmodes yes

tcpkeepalive yes

permitemptypasswords no

permituserenvironment no

compression yes

gatewayports no

usedns no

allowtcpforwarding yes

allowagentforwarding yes

disableforwarding no

allowstreamlocalforwarding yes

streamlocalbindunlink no

fingerprinthash SHA256

fipsmode no

pidfile /var/run/sshd.pid

xauthlocation /usr/X11R6/bin/xauth

ciphers aes128-ctr,aes192-ctr,aes256-ctr,3des-cbc

macs hmac-sha2-256,hmac-sha2-512,hmac-sha1

banner /etc/issue

forcecommand none

chrootdirectory none

trustedusercakeys none

revokedkeys none

authorizedprincipalsfile none

versionaddendum none

authorizedkeyscommand none

authorizedkeyscommanduser none

authorizedprincipalscommand none

authorizedprincipalscommanduser none

hostkeyagent none

kexalgorithms diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1

hostbasedacceptedkeytypes ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistcom,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa

hostkeyalgorithms ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cera-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa

pubkeyacceptedkeytypes ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp52,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa

loglevel INFO

syslogfacility AUTH

authorizedkeysfile /etc/ssh/keys-%u/authorized_keys

hostkey /etc/ssh/ssh_host_rsa_key

hostkey /etc/ssh/ssh_host_dsa_key

authenticationmethods any

subsystem sftp /usr/lib/vmware/openssh/bin/sftp-server -f LOCAL5 -l INFO

maxstartups 10:30:100

permittunnel no

ipqos lowdelay throughput

rekeylimit 0 0

permitopen any

Reply
0 Kudos