defaults | ||
handlers | ||
meta | ||
tasks | ||
templates | ||
tests | ||
vars | ||
.travis.yml | ||
CHANGELOG | ||
LICENSE | ||
README.md |
OpenSSH Server
This role configures the OpenSSH daemon. It:
- By default configures the SSH daemon with the normal OS defaults.
- Works across a variety of UN*X like distributions
- Can be configured by dict or simple variables
- Supports Match sets
- Supports all sshd_config options. Templates are programmatically generated. (see meta/make_option_list)
- Tests the sshd_config before reloading sshd.
WARNING Misconfiguration of this role can lock you out of your server! Please test your configuration and its interaction with your users configuration before using in production!
WARNING Digital Ocean allows root with passwords via SSH on Debian and
Ubuntu. This is not the default assigned by this module - it will set
PermitRootLogin without-password
which will allow access via SSH key but not
via simple password. If you need this functionality, be sure to set
ssh_PermitRootLogin yes
for those hosts.
Requirements
Tested on:
- Ubuntu precise, trusty
- Debian wheezy, jessie
- FreeBSD 10.1
- EL 6,7 derived distributions
It will likely work on other flavours and more direct support via suitable vars/ files is welcome.
Role variables
-
Unconfigured, this role will provide a sshd_config that matches the OS default, minus the comments and in a different order.
-
Defaults can be disabled by setting
sshd_skip_defaults: true
-
Supports use of a dict to configure items:
sshd:
Compression: delayed
ListenAddress:
- 0.0.0.0
- Simple variables can be used rather than a dict. Simple values override dict values:
sshd_Compression: off
- Correctly interprets booleans as yes and no in sshd configuration
- Supports lists for multi line configuration items:
sshd_ListenAddress:
- 0.0.0.0
- '::'
- Supports match section either via Match in the sshd dict, sshd_match and any of sshd_match_1 through sshd_match_9. Match items can either be a dict or an array.
Example Playbook
---
- hosts: all
vars:
sshd_skip_defaults: true
sshd:
Compression: true
ListenAddress:
- "0.0.0.0"
- "::"
GSSAPIAuthentication: no
Match:
- Condition: "Group user"
GSSAPIAuthentication: yes
sshd_UsePrivilegeSeparation: sandbox
sshd_match:
- Condition: "Group xusers"
X11Forwarding: yes
roles:
- role: willshersystems.sshd
Results in:
# Ansible managed: ...
Compression yes
GSSAPIAuthentication no
UsePrivilegeSeparation sandbox
Match Group user
GSSAPIAuthentication yes
Match Group xusers
X11Forwarding yes
License
LGPLv3
Author
Matt Willsher matt@willsher.systems
Copyright 2014,2015 Willsher Systems