File tree 4 files changed +21
-1
lines changed
4 files changed +21
-1
lines changed Original file line number Diff line number Diff line change @@ -67,6 +67,7 @@ override['ssh-hardening']['ssh']['server']['listen_to'] = node['ipaddress']
67
67
* ` ['ssh-hardening']['ssh']['server']['max_auth_tries'] ` - ` 2 ` . The number of authentication attempts per connection
68
68
* ` ['ssh-hardening']['ssh']['server']['max_sessions'] ` - ` 10 ` The number of sessions per connection
69
69
* ` ['ssh-hardening']['ssh']['server']['password_authentication'] ` - ` false ` . Set to ` true ` if password authentication should be enabled
70
+ * ` ['ssh-hardening']['ssh']['server']['log_level'] ` - ` verbose ` . The log level of sshd. See ` LogLevel ` in ` man 5 sshd_config ` for possible values.
70
71
* ` ['ssh-hardening']['ssh']['server']['sftp']['enable'] ` - ` false ` . Set to ` true ` to enable the SFTP feature of OpenSSH daemon
71
72
* ` ['ssh-hardening']['ssh']['server']['sftp']['group'] ` - ` sftponly ` . Sets the ` Match Group ` option of SFTP to allow SFTP only for dedicated users
72
73
* ` ['ssh-hardening']['ssh']['server']['sftp']['chroot'] ` - ` /home/%u ` . Sets the directory where the SFTP user should be chrooted
Original file line number Diff line number Diff line change 93
93
default [ 'ssh-hardening' ] [ 'ssh' ] [ 'server' ] [ 'max_auth_tries' ] = 2
94
94
default [ 'ssh-hardening' ] [ 'ssh' ] [ 'server' ] [ 'max_sessions' ] = 10
95
95
default [ 'ssh-hardening' ] [ 'ssh' ] [ 'server' ] [ 'password_authentication' ] = false
96
+ default [ 'ssh-hardening' ] [ 'ssh' ] [ 'server' ] [ 'log_level' ] = 'verbose'
96
97
# sshd sftp options
97
98
default [ 'ssh-hardening' ] [ 'ssh' ] [ 'server' ] [ 'sftp' ] [ 'enable' ] = false
98
99
default [ 'ssh-hardening' ] [ 'ssh' ] [ 'server' ] [ 'sftp' ] [ 'group' ] = 'sftponly'
Original file line number Diff line number Diff line change 404
404
end
405
405
end
406
406
407
+ it 'sets the log level to verbose' do
408
+ expect ( chef_run ) . to render_file ( '/etc/ssh/sshd_config' ) .
409
+ with_content ( 'LogLevel VERBOSE' )
410
+ end
411
+
412
+ context 'with log level set to debug' do
413
+ cached ( :chef_run ) do
414
+ ChefSpec ::ServerRunner . new do |node |
415
+ node . normal [ 'ssh-hardening' ] [ 'ssh' ] [ 'server' ] [ 'log_level' ] = 'debug'
416
+ end . converge ( described_recipe )
417
+ end
418
+
419
+ it 'sets the log level to debug' do
420
+ expect ( chef_run ) . to render_file ( '/etc/ssh/sshd_config' ) .
421
+ with_content ( 'LogLevel DEBUG' )
422
+ end
423
+ end
424
+
407
425
it 'leaves deny users commented' do
408
426
expect ( chef_run ) . to render_file ( '/etc/ssh/sshd_config' ) .
409
427
with_content ( /#DenyUsers */ )
Original file line number Diff line number Diff line change @@ -48,7 +48,7 @@ StrictModes yes
48
48
49
49
# Logging, obsoletes QuietMode and FascistLogging
50
50
SyslogFacility AUTH
51
- LogLevel VERBOSE
51
+ LogLevel <%= @node['ssh-hardening']['ssh']['server']['log_level'].upcase %>
52
52
53
53
# Cryptography
54
54
# ------------
You can’t perform that action at this time.
0 commit comments