diff options
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 137 |
1 files changed, 55 insertions, 82 deletions
@@ -85,130 +85,103 @@ The following is a list of the currently available variables: - `listen_address` specify the addresses sshd should listen on set this to `['10.0.0.1', '192.168.0.1']` to have it listen on both addresses, or leave it unset to listen on all Default: empty -> results in listening on `0.0.0.0` - - `allowed_users` list of usernames separated by spaces. set this for example to `"foobar root"` to ensure that only user foobar and root might login. Default: empty -> no restriction is set - - `allowed_groups` list of groups separated by spaces. set this for example to `"wheel sftponly"` to ensure that only users in the groups wheel and sftponly might login. Default: empty -> no restriction is set Note: This is set after `allowed_users`, take care of the behaviour if you use these 2 options together. - - `use_pam` if you want to use pam or not for authenticaton. Values: - `no` (default) - `yes` - - `permit_root_login` If you want to allow root logins or not. Valid values: - `yes` - `no` - `without-password` (default) - `forced-commands-only` - - `password_authentication` - If you want to enable password authentication or not. Valid values: `yes` or - `no`; Default: `no` - + If you want to enable password authentication or not. Valid values: + - `yes` + - `no` (default) - `kerberos_authentication` If you want the password that is provided by the user to be validated through the Kerberos KDC. To use this option the server needs a Kerberos servtab which allows the verification of the KDC's identity. Valid values: - `yes` or `no`; Default: `no` - - - `kerberos_orlocalpasswd` - If password authentication through Kerberos fails, then the password will be - validated via any additional local mechanism. Valid values: `yes` or `no`; - Default: `yes` - - - `kerberos_ticketcleanup` - Destroy the user's ticket cache file on logout? Valid values: `yes` or `no`; - Default: `yes` - - - `gssapi_authentication` - Authenticate users based on GSSAPI? Valid values: `yes` or `no`; Default: `no` - - - `gssapi_cleanupcredentials` - Destroy user's credential cache on logout? Valid values: `yes` or `no`; Default: - `yes` - - - `challenge_response_authentication` - If you want to enable ChallengeResponseAuthentication or not When disabled, - s/key passowords are disabled Valid values: `yes` or `no`; Default: `no` - - - `tcp_forwarding` - If you want to enable TcpForwarding. Valid Values: `yes` or `no`; Default: `no` - - - `x11_forwarding` - If you want to enable x11 forwarding. Valid Values: `yes` or `no`; Default: `no` - - - `agent_forwarding` - If you want to allow ssh-agent forwarding. Valid Values: `yes` or `no`; Default: - `no` - - - `pubkey_authentication` - If you want to enable public key authentication. Valid Values: `yes` or `no`; - Default: `yes` - - - `rsa_authentication` - If you want to enable RSA Authentication. Valid Values: `yes` or `no`; Default: - `no` - + - `yes` + - `no` (default) + - `kerberos_orlocalpasswd` If password authentication through Kerberos fails, then the password will be validated via any additional local mechanism. Valid values: + - `yes` (default) + - `no` + - `kerberos_ticketcleanup` Destroy the user's ticket cache file on logout? Valid values: + - `yes` (default) + - `no` + - `gssapi_authentication` Authenticate users based on GSSAPI? Valid values: + - `yes` + - `no` (default) + - `gssapi_cleanupcredentials` Destroy user's credential cache on logout? Valid values: + - `yes` (default) + - `no` + - `challenge_response_authentication` If you want to enable ChallengeResponseAuthentication or not When disabled, s/key passwords are disabled. Valid values: + - `yes` + - `no` (default) + - `tcp_forwarding` If you want to enable TcpForwarding. Valid values: + - `yes` + - `no` (default) + - `x11_forwarding` If you want to enable x11 forwarding. Valid values: + - `yes` + - `no` (default) + - `agent_forwarding` If you want to allow ssh-agent forwarding. Valid values: + - `yes` + - `no` (default) + - `pubkey_authentication` If you want to enable public key authentication. Valid values: + - `yes` (default) + - `no` + - `rsa_authentication` If you want to enable RSA Authentication. Valid values: + - `yes` + - `no` (default) - `rhosts_rsa_authentication` - If you want to enable rhosts RSA Authentication. Valid Values: `yes` or `no`; - Default: `no` - - - `hostbased_authentication` - If you want to enable `HostbasedAuthentication`. Valid Values: `yes` or `no`; - Default: `no` - - - `strict_modes` - If you want to set `StrictModes` (check file modes/ownership before accepting - login). Valid Values: `yes` or `no`; Default: yes - + If you want to enable rhosts RSA Authentication. Valid values: + - `yes` + - `no` (default) + - `hostbased_authentication` If you want to enable `HostbasedAuthentication`. Valid values: + - `yes` + - `no` (default) + - `strict_modes` If you want to set `StrictModes` (check file modes/ownership before accepting login). Valid values: + - `yes` (default) + - `no` - `permit_empty_passwords` If you want enable PermitEmptyPasswords to allow empty passwords. Valid - Values: `yes` or `no`; Default: `no` - - - `ports` - If you want to specify a list of ports other than the default `22`; Default: - `[22]` - + Values: + - `yes` + - `no` (default) + - `ports` If you want to specify a list of ports other than the default `22`; Default: `[22]` - `authorized_keys_file` Set this to the location of the AuthorizedKeysFile (e.g. `/etc/ssh/authorized_keys/%u`). Default: `AuthorizedKeysFile %h/.ssh/authorized_keys` - - `hardened_ssl` Use only strong SSL ciphers and MAC. - Values: `no` or `yes`; Default: `no`. - + Values: + - `no` (default) + - `yes` - `print_motd` Show the Message of the day when a user logs in. - - `sftp_subsystem` Set a different sftp-subystem than the default one. Might be interesting for sftponly usage. Default: empty -> no change of the default - - `head_additional_options` Set this to any additional sshd_options which aren't listed above. Anything set here will be added to the beginning of the sshd_config file. This option might be useful to define complicated Match Blocks. This string is going to be included, like it is defined. So take care! Default: empty -> not added. - - - `tail_additional_options` - - Set this to any additional sshd_options which aren't listed above. Anything - set here will be added to the end of the sshd_config file. This option might - be useful to define complicated Match Blocks. This string is going to be - included, like it is defined. So take care! Default: empty -> not added. - - - `shared_ip` - Whether the server uses a shared network IP address. If it does, then we - don't want it to export an rsa key for its IP address. - Values: `no` or `yes`; Default: `no` + - `tail_additional_options` Set this to any additional sshd_options which aren't listed above. Anything set here will be added to the end of the sshd_config file. This option might be useful to define complicated Match Blocks. This string is going to be included, like it is defined. So take care! Default: empty -> not added. + - `shared_ip` Whether the server uses a shared network IP address. If it does, then we don't want it to export an rsa key for its IP address. Values: + - `no` (default) + - `yes` ### Defines and functions |