You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 26, 2020. It is now read-only.
|`network_ipv6_enable`| false |true if IPv6 is needed|
21
-
|`ssh_client_cbc_required`| false |true if CBC for ciphers is required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure ciphers enabled. CBC is a weak alternative. Anything weaker should be avoided and is thus not available.|
22
-
|`ssh_server_cbc_required`| false |true if CBC for ciphers is required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure ciphers enabled. CBC is a weak alternative. Anything weaker should be avoided and is thus not available.|
23
-
|`ssh_client_weak_hmac`| false |true if weaker HMAC mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure HMACs enabled.|
24
-
|`ssh_server_weak_hmac`| false |true if weaker HMAC mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure HMACs enabled.|
25
-
|`ssh_client_weak_kex`| false |true if weaker Key-Exchange (KEX) mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure KEXs enabled.|
26
-
|`ssh_server_weak_kex`| false |true if weaker Key-Exchange (KEX) mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure KEXs enabled.|
27
21
|`ssh_server_ports`|['22']|ports on which ssh-server should listen|
28
22
|`ssh_client_port`| '22' |port to which ssh-client should connect|
29
23
|`ssh_listen_to`|['0.0.0.0']|one or more ip addresses, to which ssh-server should listen to. Default is all adresseses, but should be configured to specific addresses for security reasons!|
@@ -76,6 +70,9 @@ Warning: This role disables root-login on the target server! Please make sure yo
76
70
|`ssh_use_dns`|`false`| Specifies whether sshd should look up the remote host name, and to check that the resolved host name for the remote IP address maps back to the very same IP address. |
77
71
|`ssh_server_revoked_keys`|[]| a list of revoked public keys that the ssh server will always reject, useful to revoke known weak or compromised keys.|
78
72
|`ssh_max_startups`| '10:30:100' | Specifies the maximum number of concurrent unauthenticated connections to the SSH daemon.|
73
+
|`ssh_macs`|[]| Change this list to overwrite macs. Defaults found in `defaults/main.yml`|
74
+
|`ssh_kex`|[]| Change this list to overwrite kexs. Defaults found in `defaults/main.yml`|
75
+
|`ssh_ciphers`|[]| Change this list to overwrite ciphers. Defaults found in `defaults/main.yml`|
79
76
80
77
## Example Playbook
81
78
@@ -149,8 +146,6 @@ Always look into log files first and if possible look at the negotation between
149
146
150
147
We have seen some issues in applications (based on python and ruby) that are due to their use of an outdated crypto set. This collides with this hardening module, which reduced the list of ciphers, message authentication codes (MACs) and key exchange (KEX) algorithms to a more secure selection.
151
148
152
-
If you find this isn't enough, feel free to activate the attributes `cbc_requires` for ciphers, `weak_hmac` for MACs and `weak_kex`for KEX in the variables `ssh_client` or `ssh_server` based on where you want to support them.
153
-
154
149
**After using the role Ansibles template/copy/file module does not work anymore!**
155
150
156
151
This role by default deactivates SFTP. Ansible uses by default SFTP to transfer files to the remote hosts. You have to set `scp_if_ssh = True` in your ansible.cfg. This way Ansible uses SCP to copy files. Alternatively you can enable SFTP again by setting `sftp_enabled` to `true`.
Copy file name to clipboardExpand all lines: defaults/main.yml
-24Lines changed: 0 additions & 24 deletions
Original file line number
Diff line number
Diff line change
@@ -14,18 +14,6 @@ ssh_compression: false # sshd
14
14
ssh_client_hardening: true # ssh
15
15
ssh_server_hardening: true # sshd
16
16
17
-
# true if CBC for ciphers is required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure ciphers enabled. CBC is a weak alternative. Anything weaker should be avoided and is thus not available.
18
-
ssh_client_cbc_required: false # ssh
19
-
ssh_server_cbc_required: false # sshd
20
-
21
-
# true if weaker HMAC mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure HMACs enabled.
22
-
ssh_client_weak_hmac: false # ssh
23
-
ssh_server_weak_hmac: false # sshd
24
-
25
-
# true if weaker Key-Exchange (KEX) mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure KEXs enabled.
0 commit comments