1
1
# true if IPv6 is needed
2
- network_ipv6_enable : false # sshd + ssh
2
+ network_ipv6_enable : false # sshd + ssh
3
3
4
4
# true if sshd should be started and enabled
5
- ssh_server_enabled : true # sshd
5
+ ssh_server_enabled : true # sshd
6
6
7
7
# true if DNS resolutions are needed, look up the remote host name, defaults to false from 6.8, see: http://www.openssh.com/txt/release-6.8
8
- ssh_use_dns : false # sshd
8
+ ssh_use_dns : false # sshd
9
9
10
10
# true or value if compression is needed
11
- ssh_client_compression : false # ssh
12
- ssh_compression : false # sshd
11
+ ssh_client_compression : false # ssh
12
+ ssh_compression : false # sshd
13
13
14
14
# For which components (client and server) to generate the configuration for. Can be useful when running against a client without an SSH server.
15
15
ssh_client_hardening : true # ssh
16
16
ssh_server_hardening : true # sshd
17
17
18
18
# If true, password login is allowed
19
- ssh_client_password_login : false # ssh
20
- ssh_server_password_login : false # sshd
19
+ ssh_client_password_login : false # ssh
20
+ ssh_server_password_login : false # sshd
21
21
22
22
# ports on which ssh-server should listen
23
- ssh_server_ports : ['22'] # sshd
23
+ ssh_server_ports : ['22'] # sshd
24
24
25
25
# port to which ssh-client should connect
26
- ssh_client_port : ' 22' # ssh
26
+ ssh_client_port : ' 22' # ssh
27
27
28
28
# one or more ip addresses, to which ssh-server should listen to. Default is empty, but should be configured for security reasons!
29
- ssh_listen_to : ['0.0.0.0'] # sshd
29
+ ssh_listen_to : ['0.0.0.0'] # sshd
30
30
31
31
# Host keys to look for when starting sshd.
32
- ssh_host_key_files : [] # sshd
32
+ ssh_host_key_files : [] # sshd
33
33
34
34
# Specifies the host key algorithms that the server offers
35
- ssh_host_key_algorithms : [] # sshd
35
+ ssh_host_key_algorithms : [] # sshd
36
36
37
37
# specifies the time allowed for successful authentication to the SSH server
38
38
ssh_login_grace_time : 30s
@@ -43,13 +43,13 @@ ssh_max_auth_retries: 2
43
43
# Specifies the maximum number of open sessions permitted from a given connection
44
44
ssh_max_sessions : 10
45
45
46
- ssh_client_alive_interval : 300 # sshd
47
- ssh_client_alive_count : 3 # sshd
46
+ ssh_client_alive_interval : 300 # sshd
47
+ ssh_client_alive_count : 3 # sshd
48
48
49
49
# Allow SSH Tunnels
50
50
ssh_permit_tunnel : false
51
51
52
- # Hosts with custom options. # ssh
52
+ # Hosts with custom options. # ssh
53
53
# Example:
54
54
# ssh_remote_hosts:
55
55
# - names: ['example.com', 'example2.com']
@@ -59,23 +59,23 @@ ssh_permit_tunnel: false
59
59
ssh_remote_hosts : []
60
60
61
61
# Set this to "without-password" or "yes" to allow root to login
62
- ssh_permit_root_login : ' no' # sshd
62
+ ssh_permit_root_login : ' no' # sshd
63
63
64
64
# false to disable TCP Forwarding. Set to true to allow TCP Forwarding.
65
- ssh_allow_tcp_forwarding : ' no' # sshd
65
+ ssh_allow_tcp_forwarding : ' no' # sshd
66
66
67
67
# false to disable binding forwarded ports to non-loopback addresses. Set to true to force binding on wildcard address.
68
68
# Set to 'clientspecified' to allow the client to specify which address to bind to.
69
- ssh_gateway_ports : false # sshd
69
+ ssh_gateway_ports : false # sshd
70
70
71
71
# false to disable Agent Forwarding. Set to true to allow Agent Forwarding.
72
- ssh_allow_agent_forwarding : false # sshd
72
+ ssh_allow_agent_forwarding : false # sshd
73
73
74
74
# true if SSH has PAM support
75
75
ssh_pam_support : true
76
76
77
77
# false to disable pam authentication.
78
- ssh_use_pam : true # sshd
78
+ ssh_use_pam : true # sshd
79
79
80
80
# specify AuthenticationMethods
81
81
sshd_authenticationmethods : ' publickey'
@@ -87,29 +87,29 @@ ssh_gssapi_support: false
87
87
ssh_kerberos_support : true
88
88
89
89
# if specified, login is disallowed for user names that match one of the patterns.
90
- ssh_deny_users : ' ' # sshd
90
+ ssh_deny_users : ' ' # sshd
91
91
92
92
# if specified, login is allowed only for user names that match one of the patterns.
93
- ssh_allow_users : ' ' # sshd
93
+ ssh_allow_users : ' ' # sshd
94
94
95
95
# if specified, login is disallowed for users whose primary group or supplementary group list matches one of the patterns.
96
- ssh_deny_groups : ' ' # sshd
96
+ ssh_deny_groups : ' ' # sshd
97
97
98
98
# if specified, login is allowed only for users whose primary group or supplementary group list matches one of the patterns.
99
- ssh_allow_groups : ' ' # sshd
99
+ ssh_allow_groups : ' ' # sshd
100
100
101
101
# change default file that contains the public keys that can be used for user authentication.
102
- ssh_authorized_keys_file : ' ' # sshd
102
+ ssh_authorized_keys_file : ' ' # sshd
103
103
104
104
# specifies the file containing trusted certificate authorities public keys used to sign user certificates.
105
- ssh_trusted_user_ca_keys_file : ' ' # sshd
105
+ ssh_trusted_user_ca_keys_file : ' ' # sshd
106
106
107
107
# set the trusted certificate authorities public keys used to sign user certificates.
108
108
# Example:
109
109
# ssh_trusted_user_ca_keys:
110
110
# - 'ssh-rsa ... comment1'
111
111
# - 'ssh-rsa ... comment2'
112
- ssh_trusted_user_ca_keys : [] # sshd
112
+ ssh_trusted_user_ca_keys : [] # sshd
113
113
114
114
# specifies the file containing principals that are allowed. Only used if ssh_trusted_user_ca_keys_file is set.
115
115
# Example:
@@ -119,26 +119,26 @@ ssh_trusted_user_ca_keys: [] # sshd
119
119
# replaced by the username of that user. After expansion, the path is taken to be
120
120
# an absolute path or one relative to the user's home directory.
121
121
#
122
- ssh_authorized_principals_file : ' ' # sshd
122
+ ssh_authorized_principals_file : ' ' # sshd
123
123
124
124
# list of hashes containing file paths and authorized principals. Only used if ssh_authorized_principals_file is set.
125
125
# Example:
126
126
# ssh_authorized_principals:
127
127
# - { path: '/etc/ssh/auth_principals/root', principals: [ 'root' ], owner: "{{ ssh_owner }}", group: "{{ ssh_group }}", directoryowner: "{{ ssh_owner }}", directorygroup: "{{ ssh_group}}" }
128
128
# - { path: '/etc/ssh/auth_principals/myuser', principals: [ 'masteradmin', 'webserver' ] }
129
- ssh_authorized_principals : [] # sshd
129
+ ssh_authorized_principals : [] # sshd
130
130
131
131
# false to disable printing of the MOTD
132
- ssh_print_motd : false # sshd
132
+ ssh_print_motd : false # sshd
133
133
134
134
# false to disable display of last login information
135
- ssh_print_last_log : false # sshd
135
+ ssh_print_last_log : false # sshd
136
136
137
137
# false to disable serving /etc/ssh/banner.txt before authentication is allowed
138
- ssh_banner : false # sshd
138
+ ssh_banner : false # sshd
139
139
140
140
# false to disable distribution version leakage during initial protocol handshake
141
- ssh_print_debian_banner : false # sshd (Debian OS family only)
141
+ ssh_print_debian_banner : false # sshd (Debian OS family only)
142
142
143
143
# true to enable sftp configuration
144
144
sftp_enabled : false
@@ -156,19 +156,19 @@ sftp_chroot_dir: /home/%u
156
156
ssh_client_roaming : false
157
157
158
158
# list of hashes (containing user and rules) to generate Match User blocks for.
159
- ssh_server_match_user : false # sshd
159
+ ssh_server_match_user : false # sshd
160
160
161
161
# list of hashes (containing group and rules) to generate Match Group blocks for.
162
- ssh_server_match_group : false # sshd
162
+ ssh_server_match_group : false # sshd
163
163
164
164
# list of hashes (containing addresses/subnets and rules) to generate Match Address blocks for.
165
- ssh_server_match_address : false # sshd
165
+ ssh_server_match_address : false # sshd
166
166
167
167
ssh_server_permit_environment_vars : ' no'
168
168
ssh_server_accept_env_vars : ' '
169
169
170
170
# maximum number of concurrent unauthenticated connections to the SSH daemon
171
- ssh_max_startups : ' 10:30:100' # sshd
171
+ ssh_max_startups : ' 10:30:100' # sshd
172
172
173
173
ssh_ps53 : ' yes'
174
174
ssh_ps59 : ' sandbox'
0 commit comments