|
46 | 46 | default['ssh-hardening']['sshserver']['service_name'] = 'ssh'
|
47 | 47 | end
|
48 | 48 |
|
| 49 | +# sshd + ssh client |
| 50 | +default['ssh-hardening']['network']['ipv6']['enable'] = false |
49 | 51 | default['ssh-hardening']['config_disclaimer'] = '**Note:** This file was automatically created by Hardening Framework (dev-sec.io) configuration. If you use its automated setup, do not edit this file directly, but adjust the automation instead.'
|
50 |
| -default['ssh-hardening']['network']['ipv6']['enable'] = false # sshd + ssh |
51 |
| -default['ssh-hardening']['ssh']['server']['kex'] = nil # nil = calculate best combination for server version |
| 52 | +default['ssh-hardening']['ssh']['ports'] = [22] |
| 53 | + |
| 54 | +# ssh client |
52 | 55 | default['ssh-hardening']['ssh']['client']['mac'] = nil # nil = calculate best combination for client
|
53 |
| -default['ssh-hardening']['ssh']['server']['cipher'] = nil # nil = calculate best combination for server version |
54 | 56 | default['ssh-hardening']['ssh']['client']['kex'] = nil # nil = calculate best combination for client
|
55 |
| -default['ssh-hardening']['ssh']['server']['mac'] = nil # nil = calculate best combination for server version |
56 | 57 | default['ssh-hardening']['ssh']['client']['cipher'] = nil # nil = calculate best combination for client
|
57 |
| -default['ssh-hardening']['ssh']['client']['cbc_required'] = false # ssh |
58 |
| -default['ssh-hardening']['ssh']['server']['cbc_required'] = false # sshd |
59 |
| -default['ssh-hardening']['ssh']['client']['weak_hmac'] = false # ssh |
60 |
| -default['ssh-hardening']['ssh']['server']['weak_hmac'] = false # sshd |
61 |
| -default['ssh-hardening']['ssh']['client']['weak_kex'] = false # ssh |
62 |
| -default['ssh-hardening']['ssh']['server']['weak_kex'] = false # sshd |
63 |
| -default['ssh-hardening']['ssh']['ports'] = [22] # sshd + ssh |
64 |
| -default['ssh-hardening']['ssh']['listen_to'] = ['0.0.0.0'] # sshd |
65 |
| -default['ssh-hardening']['ssh']['host_key_files'] = ['/etc/ssh/ssh_host_rsa_key', '/etc/ssh/ssh_host_dsa_key', '/etc/ssh/ssh_host_ecdsa_key'] # sshd |
66 |
| -default['ssh-hardening']['ssh']['client_alive_interval'] = 600 # sshd, 10min |
67 |
| -default['ssh-hardening']['ssh']['client_alive_count'] = 3 # sshd, ~> 3 x interval |
68 |
| -default['ssh-hardening']['ssh']['remote_hosts'] = [] # ssh |
69 |
| -default['ssh-hardening']['ssh']['allow_root_with_key'] = false # sshd |
70 |
| -default['ssh-hardening']['ssh']['allow_tcp_forwarding'] = false # sshd |
71 |
| -default['ssh-hardening']['ssh']['allow_agent_forwarding'] = false # sshd |
72 |
| -default['ssh-hardening']['ssh']['allow_x11_forwarding'] = false # sshd |
73 |
| -default['ssh-hardening']['ssh']['use_pam'] = false # sshd |
74 |
| -default['ssh-hardening']['ssh']['challenge_response_authentication'] = false # sshd |
75 |
| -default['ssh-hardening']['ssh']['deny_users'] = [] # sshd |
76 |
| -default['ssh-hardening']['ssh']['allow_users'] = [] # sshd |
77 |
| -default['ssh-hardening']['ssh']['deny_groups'] = [] # sshd |
78 |
| -default['ssh-hardening']['ssh']['allow_groups'] = [] # sshd |
79 |
| -default['ssh-hardening']['ssh']['print_motd'] = false # sshd |
80 |
| -default['ssh-hardening']['ssh']['print_last_log'] = false # sshd |
81 |
| -# set this to nil to disable banner or provide a path like '/etc/issue.net' |
82 |
| -default['ssh-hardening']['ssh']['banner'] = nil # sshd |
83 |
| -default['ssh-hardening']['ssh']['os_banner'] = false # sshd (Debian OS family) |
| 58 | +default['ssh-hardening']['ssh']['client']['cbc_required'] = false |
| 59 | +default['ssh-hardening']['ssh']['client']['weak_hmac'] = false |
| 60 | +default['ssh-hardening']['ssh']['client']['weak_kex'] = false |
84 | 61 |
|
85 |
| -# set this to nil to let us use the default OpenSSH in case it's not set by the user |
86 |
| -default['ssh-hardening']['ssh']['use_dns'] = nil # sshd |
87 |
| -# set this to nil to let us detect the attribute based on the node platform |
88 |
| -default['ssh-hardening']['ssh']['use_privilege_separation'] = nil |
89 |
| -default['ssh-hardening']['ssh']['login_grace_time'] = '30s' # sshd |
90 |
| -default['ssh-hardening']['ssh']['max_auth_tries'] = 2 # sshd |
91 |
| -default['ssh-hardening']['ssh']['max_sessions'] = 10 # sshd |
| 62 | +default['ssh-hardening']['ssh']['client']['remote_hosts'] = [] |
92 | 63 | default['ssh-hardening']['ssh']['client']['password_authentication'] = false # ssh
|
93 |
| -default['ssh-hardening']['ssh']['server']['password_authentication'] = false # sshd |
94 | 64 | # http://undeadly.org/cgi?action=article&sid=20160114142733
|
95 | 65 | default['ssh-hardening']['ssh']['client']['roaming'] = false
|
96 | 66 |
|
97 |
| -# Define SFTP options |
98 |
| -default['ssh-hardening']['ssh']['sftp']['enable'] = false |
99 |
| -default['ssh-hardening']['ssh']['sftp']['group'] = 'sftponly' |
100 |
| -default['ssh-hardening']['ssh']['sftp']['chroot'] = '/home/%u' |
| 67 | +# sshd |
| 68 | +default['ssh-hardening']['ssh']['server']['kex'] = nil # nil = calculate best combination for server version |
| 69 | +default['ssh-hardening']['ssh']['server']['cipher'] = nil # nil = calculate best combination for server version |
| 70 | +default['ssh-hardening']['ssh']['server']['mac'] = nil # nil = calculate best combination for server version |
| 71 | +default['ssh-hardening']['ssh']['server']['cbc_required'] = false |
| 72 | +default['ssh-hardening']['ssh']['server']['weak_hmac'] = false |
| 73 | +default['ssh-hardening']['ssh']['server']['weak_kex'] = false |
| 74 | +default['ssh-hardening']['ssh']['server']['listen_to'] = ['0.0.0.0'] |
| 75 | +default['ssh-hardening']['ssh']['server']['host_key_files'] = ['/etc/ssh/ssh_host_rsa_key', '/etc/ssh/ssh_host_dsa_key', '/etc/ssh/ssh_host_ecdsa_key'] |
| 76 | +default['ssh-hardening']['ssh']['server']['client_alive_interval'] = 600 # 10min |
| 77 | +default['ssh-hardening']['ssh']['server']['client_alive_count'] = 3 # ~> 3 x interval |
| 78 | + |
| 79 | +default['ssh-hardening']['ssh']['server']['allow_root_with_key'] = false |
| 80 | +default['ssh-hardening']['ssh']['server']['allow_tcp_forwarding'] = false |
| 81 | +default['ssh-hardening']['ssh']['server']['allow_agent_forwarding'] = false |
| 82 | +default['ssh-hardening']['ssh']['server']['allow_x11_forwarding'] = false |
| 83 | +default['ssh-hardening']['ssh']['server']['use_pam'] = false |
| 84 | +default['ssh-hardening']['ssh']['server']['challenge_response_authentication'] = false |
| 85 | +default['ssh-hardening']['ssh']['server']['deny_users'] = [] |
| 86 | +default['ssh-hardening']['ssh']['server']['allow_users'] = [] |
| 87 | +default['ssh-hardening']['ssh']['server']['deny_groups'] = [] |
| 88 | +default['ssh-hardening']['ssh']['server']['allow_groups'] = [] |
| 89 | +default['ssh-hardening']['ssh']['server']['print_motd'] = false |
| 90 | +default['ssh-hardening']['ssh']['server']['print_last_log'] = false |
| 91 | +default['ssh-hardening']['ssh']['server']['banner'] = nil # set this to nil to disable banner or provide a path like '/etc/issue.net' |
| 92 | +default['ssh-hardening']['ssh']['server']['os_banner'] = false # (Debian OS family) |
| 93 | +default['ssh-hardening']['ssh']['server']['use_dns'] = nil # set this to nil to let us use the default OpenSSH in case it's not set by the user |
| 94 | +default['ssh-hardening']['ssh']['server']['use_privilege_separation'] = nil # set this to nil to let us detect the attribute based on the node platform |
| 95 | +default['ssh-hardening']['ssh']['server']['login_grace_time'] = '30s' |
| 96 | +default['ssh-hardening']['ssh']['server']['max_auth_tries'] = 2 |
| 97 | +default['ssh-hardening']['ssh']['server']['max_sessions'] = 10 |
| 98 | +default['ssh-hardening']['ssh']['server']['password_authentication'] = false |
| 99 | +# sshd sftp options |
| 100 | +default['ssh-hardening']['ssh']['server']['sftp']['enable'] = false |
| 101 | +default['ssh-hardening']['ssh']['server']['sftp']['group'] = 'sftponly' |
| 102 | +default['ssh-hardening']['ssh']['server']['sftp']['chroot'] = '/home/%u' |
0 commit comments