SSH1, SSH2, and OpenSSH are complex and have many options. It is
vitally important to understand all options when installing and
running SSH servers and clients, so their behavior will conform to
your local security policy.
We have presented our recommended options for a high security
setting. Your needs may vary. For instance, you might want the
flexibility of other authentication methods that we have forbidden in