|
20 | 20 |
|
21 | 21 | title 'SSH server config' |
22 | 22 |
|
23 | | -sshd_valid_ciphers = input('sshd_valid_ciphers', value: ssh_crypto.valid_ciphers,description: 'Expected value for sshd_config ciphers') |
24 | | -sshd_valid_kexs = input('sshd_valid_kexs', value: ssh_crypto.valid_kexs,description: 'Expected value for sshd_config kexs') |
25 | | -sshd_valid_macs = input('sshd_valid_macs', value: ssh_crypto.valid_macs,description: 'Expected value for sshd_config macs') |
26 | | -sshd_permittunnel = input('sshd_permittunnel', value: 'no',description: 'Expected value for sshd_config PermitTunnel') |
27 | | -sshd_tcpforwarding = input('sshd_tcpforwarding', value: 'no',description: 'Expected value for sshd_config TcpForwarding') |
28 | | -sshd_agentforwarding = input('sshd_agentforwarding', value: 'no',description: 'Expected value for sshd_config AgentForwarding') |
29 | | -sshd_gatewayports = input('sshd_gatewayports', value: 'no',description: 'Expected value for sshd_config GatewayPorts') |
30 | | -sshd_x11forwarding = input('sshd_x11forwarding', value: 'no',description: 'Expected value for sshd_config X11Forwarding') |
31 | | -sshd_banner = input('sshd_banner', value: 'none',description: 'Expected value for sshd_config Banner') |
32 | | -sshd_max_auth_tries = input('sshd_max_auth_tries', value: 2,description: 'Expected value for max_auth_retries') |
33 | | -sshd_custom_user = input('sshd_custom_user', value: 'root',description: 'The SSH user is not always root. It must be an unprivileged user in a container') |
34 | | -sshd_custom_path = input('sshd_custom_path', value: '/etc/ssh',description: 'Sometimes ssh configuration files are present in another location and ssh use them with the -f flag') |
35 | | -sshd_custom_port = input('sshd_custom_port', value: '22',description: 'Sometimes the ssh port is not 22. For instance, in a container as another user, 22 is forbidden') |
36 | | -sshd_custom_hostkeys_path = input('sshd_custom_hostkeys_path', value: '/etc/ssh',description: 'Sometimes ssh host keys must be in a particular path, in a clustered environment for instance') |
| 23 | +sshd_valid_ciphers = input('sshd_valid_ciphers', value: ssh_crypto.valid_ciphers) |
| 24 | +sshd_valid_kexs = input('sshd_valid_kexs', value: ssh_crypto.valid_kexs) |
| 25 | +sshd_valid_macs = input('sshd_valid_macs', value: ssh_crypto.valid_macs) |
| 26 | +sshd_permittunnel = input('sshd_permittunnel', value: 'no') |
| 27 | +sshd_tcpforwarding = input('sshd_tcpforwarding', value: 'no') |
| 28 | +sshd_agentforwarding = input('sshd_agentforwarding', value: 'no') |
| 29 | +sshd_gatewayports = input('sshd_gatewayports', value: 'no') |
| 30 | +sshd_x11forwarding = input('sshd_x11forwarding', value: 'no') |
| 31 | +sshd_banner = input('sshd_banner', value: 'none') |
| 32 | +sshd_max_auth_tries = input('sshd_max_auth_tries', value: 2) |
| 33 | +sshd_custom_user = input('sshd_custom_user', value: 'root') |
| 34 | +sshd_custom_path = input('sshd_custom_path', value: '/etc/ssh') |
| 35 | +sshd_custom_port = input('sshd_custom_port', value: '22') |
| 36 | +sshd_custom_hostkeys_path = input('sshd_custom_hostkeys_path', value: '/etc/ssh') |
37 | 37 |
|
38 | 38 | sshd_valid_privseparation = if sshd_custom_user != 'root' |
39 | 39 | 'no' |
|
0 commit comments