Skip to content
Extraits de code Groupes Projets
Sélectionner une révision Git
  • a353629074573ab87b8e4920563952a8f9e81910
  • master par défaut protégée
  • v1.1.19
  • v1.1.18
  • v1.1.17
  • v1.1.16
  • v1.1.15
  • v1.1.14
  • v1.1.13
  • v1.1.12
  • v1.1.11
  • v1.1.10
  • v1.1.9
  • v1.1.8
  • v1.1.7
  • v1.1.6
  • v1.1.5
  • v1.1.4
  • v1.1.3
  • v1.1.2
  • v1.1.1
  • v1.1.0
22 résultats

sshd_config.j2

Blame
  • sshd_config.j2 1,38 Kio
    AcceptEnv LANG LC_*
    AllowAgentForwarding no
    AllowTcpForwarding no
    AuthenticationMethods publickey
    Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
    HostKey /etc/ssh/ssh_host_ed25519_key
    KbdInteractiveAuthentication no
    KexAlgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256
    LogLevel VERBOSE
    MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
    PasswordAuthentication no
    PermitRootLogin no
    {% if inventory_hostname in groups.gitlab %}
    Port 22
    {% endif %}
    Port {{ default_sshd_port }}
    PrintMotd no
    Subsystem sftp /usr/lib/openssh/sftp-server -f AUTHPRIV -l INFO
    UsePAM yes
    X11Forwarding no
    {% if inventory_hostname in groups.backup_server %}
    AllowUsers {{ host_user }}{% if host_user2 is defined %} {{ host_user2 }}{% endif %} {{ (groups.all | difference(groups.backup_server)) | map('extract', hostvars, ['backup_sftp_user']) | sort | join(" ") }}
    AllowGroups {{ host_user }} sftpgroup
    Match Group sftpgroup
          ChrootDirectory /backup/sftp
          ForceCommand internal-sftp
          AllowTcpForwarding no
          GatewayPorts no
          X11Forwarding no
    {% else %}
    AllowUsers {{ host_user }}{% if host_user2 is defined %} {{ host_user2 }}{% endif %}{% if inventory_hostname in groups.gitlab %} git{% endif %}
    {% endif %}