From de1d7e4ab51b45fe3746bfb281fe73b90f394a21 Mon Sep 17 00:00:00 2001 From: Manoj Ampalam Date: Thu, 31 May 2018 10:10:31 -0700 Subject: [PATCH] Updated sshd_config (markdown) --- sshd_config.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sshd_config.md b/sshd_config.md index 199db74..108a96b 100644 --- a/sshd_config.md +++ b/sshd_config.md @@ -24,10 +24,10 @@ From v7.7.0.0 on wards, work group users/groups and internet-connected accounts **Note that user names are in lower case** ______ -#### AuthenticationMethods +#### [AuthenticationMethods](https://man.openbsd.org/sshd_config#AuthenticationMethods) Available authentication methods are "password" and "publickey". ______ -#### ChrootDirectory +#### [ChrootDirectory](https://man.openbsd.org/sshd_config#ChrootDirectory) Support added in v7.7.0.0 To setup a sftp-only chroot server, set ForceCommand to `internal-sftp`. You may also set up scp with chroot, by implementing a custom shell that would only allow scp and sftp.