Skip to content
This repository was archived by the owner on Dec 26, 2020. It is now read-only.

Commit 2f8acab

Browse files
committed
Merge pull request #12 from hardening-io/readme_update_var_docs
Update variable-documentation
2 parents e2fed6b + 2028017 commit 2f8acab

File tree

1 file changed

+24
-25
lines changed

1 file changed

+24
-25
lines changed

README.md

Lines changed: 24 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -9,31 +9,30 @@ This role provides secure ssh-client and ssh-server configurations.
99
* Ansible
1010

1111
## Role Variables
12-
* network_ipv6_enable: false - true if IPv6 is needed
13-
* ssh_client_cbc_required: false - true if CBC for ciphers is required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure ciphers enabled. CBC is a weak alternative. Anything weaker should be avoided and is thus not available.
14-
* ssh_server_cbc_required: false
15-
* ssh_client_weak_hmac: false - true if weaker HMAC mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure HMACs enabled.
16-
* ssh_server_weak_hmac: false
17-
* ssh_client_weak_kex: false - true if weaker Key-Exchange (KEX) mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure KEXs enabled.
18-
* ssh_server_weak_kex: false
19-
* ssh_ports: ['22'] - ports to which ssh-server should listen to and ssh-client should connect to
20-
* ssh_listen_to: ['0.0.0.0'] - one or more ip addresses, to which ssh-server should listen to. Default is empty, but should be configured for security reasons!
21-
* ssh_host_key_files: ['/etc/ssh/ssh_host_rsa_key', '/etc/ssh/ssh_host_dsa_key', '/etc/ssh/ssh_host_ecdsa_key'] # sshd
22-
* ssh_client_alive_interval: 600 # sshd
23-
* ssh_client_alive_count: 3 # sshd
24-
* ssh_remote_hosts: [] - one or more hosts, to which ssh-client can connect to. Default is empty, but should be configured for security reasons!
25-
* ssh_allow_root_with_key: false - `false` to disable root login altogether. Set to `true` to allow root to login via key-based mechanism.
26-
* ssh_allow_tcp_forwarding: false- `false` to disable TCP Forwarding. Set to `true` to allow TCP Forwarding
27-
* ssh_allow_agent_forwarding: false- `false` to disable Agent Forwarding. Set to `true` to allow Agent Forwarding
28-
* ssh_use_pam: false - `false` to disable pam authentication
29-
* ssh_deny_users: '' # sshd
30-
* ssh_allow_users: '' # sshd
31-
* ssh_deny_groups: '' # sshd
32-
* ssh_allow_groups: '' # sshd
33-
* ssh_print_motd: false - `false` to disable printing of the MOTD
34-
* ssh_print_last_log: false - `false` to disable display of last login information
35-
* ssh_ps53: 'yes'
36-
* ssh_ps59: 'sandbox'
12+
* ``network_ipv6_enable`` - true if IPv6 is needed
13+
* ``ssh_client_cbc_required`` - true if CBC for ciphers is required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure ciphers enabled. CBC is a weak alternative. Anything weaker should be avoided and is thus not available.
14+
* ``ssh_server_cbc_required`` - true if CBC for ciphers is required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure ciphers enabled. CBC is a weak alternative. Anything weaker should be avoided and is thus not available.
15+
* ``ssh_client_weak_hmac`` - true if weaker HMAC mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure HMACs enabled.
16+
* ``ssh_server_weak_hmac`` - true if weaker HMAC mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure HMACs enabled.
17+
* ``ssh_client_weak_kex`` - true if weaker Key-Exchange (KEX) mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure KEXs enabled.
18+
* ``ssh_server_weak_kex`` - true if weaker Key-Exchange (KEX) mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure KEXs enabled.
19+
* ``ssh_ports: ['22']`` - ports to which ssh-server should listen to and ssh-client should connect to
20+
* ``ssh_listen_to: ['0.0.0.0']`` - one or more ip addresses, to which ssh-server should listen to. Default is empty, but should be configured for security reasons!
21+
* ``ssh_host_key_files: ['/etc/ssh/ssh_host_rsa_key', '/etc/ssh/ssh_host_dsa_key', '/etc/ssh/ssh_host_ecdsa_key']`` - Host keys to look for when starting sshd.
22+
* ``ssh_client_alive_interval: 600``
23+
* ``ssh_client_alive_count: 3``
24+
* ``ssh_remote_hosts: []`` - one or more hosts, to which ssh-client can connect to. Default is empty, but should be configured for security reasons!
25+
* ``ssh_allow_root_with_key`` - false to disable root login altogether. Set to true to allow root to login via key-based mechanism.
26+
* ``ssh_allow_tcp_forwarding`` false to disable TCP Forwarding. Set to true to allow TCP Forwarding.
27+
* ``ssh_allow_agent_forwarding`` false to disable Agent Forwarding. Set to true to allow Agent Forwarding.
28+
* ``ssh_use_pam: false`` - false to disable pam authentication.
29+
* ``ssh_deny_users: ''`` - if specified, login is disallowed for user names that match one of the patterns.
30+
* ``ssh_allow_users: ''`` - if specified, login is allowed only for user names that match one of the patterns.
31+
* ``ssh_deny_groups: ''`` - if specified, login is disallowed for users whose primary group or supplementary group list matches one of the patterns.
32+
* ``ssh_allow_groups: ''`` - if specified, login is allowed only for users whose primary group or supplementary group list matches one of the patterns.
33+
* ``ssh_print_motd`` - false to disable printing of the MOTD
34+
* ``ssh_print_last_log`` - false to disable display of last login information
35+
3736

3837
## Example Playbook
3938

0 commit comments

Comments
 (0)