Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
Graham Lillico committed Oct 8, 2021
1 parent 685839b commit 916b813
Showing 1 changed file with 28 additions and 28 deletions.
56 changes: 28 additions & 28 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,51 +19,51 @@ The `ssh` package must be installed if you want to manage the ssh configuration

|Variable|Description|
|---|:---|
|configure_sshd_Port|The port number that sshd listens on.|
|configure_sshd_ListenAddress|The IPv4 address that the sshd service will listen on. By default this will listen on all configured IPv4 addresses.|
|configure_sshd_Protocol|The protocol versions sshd supports.|
|configure_sshd_PasswordAuthentication|If Password authentication is allowed.|
|configure_sshd_PermitRootLogin|Whether root can log in using ssh.|
|configure_sshd_UseDNS|Should DNS be used to look up the remote host name, also checks that the DNS hostname matches the ipaddress of the source server.|
|configure_sshd_PermitEmptyPasswords|Can empty password be used.|
|configure_sshd_ChallengeResponseAuthentication|Is challenge-response authentication is allowed.|
|configure_sshd_GSSAPIAuthentication|Is authentication based on GSSAPI is allowed. This only applies when protocol version 2 is being used.|
|configure_sshd_X11Forwarding|Is X11 forwarding is permitted.|
|configure_sshd_MaxAuthTries|What is the maximum number of allowed authentions attempts, also once half this number is reached then further failures are logged.|
|configure_sshd_Banner|Send the contents of the specified file to the user before authentication is atempted.|
|configure_sshd_AuthorizedKeysFile|This file contains the public keys that can be used for user authentication. This setting uses the value specified by configure_sshd_AuthorizedKeysFile_dir.|
|configure_sshd_PubkeyAuthentication|Is public key authentication is allowed.|
|configure_sshd_Ciphers|The ciphers allowed when protocol version 2 is being used.<br><br>chacha20-poly1305@<span>openssh.com</span><br>aes256-gcm@<span>openssh.com</span><br>aes128-gcm@<span>openssh.com</span><br>aes256-ctr<br>aes192-ctr<br>aes128-ctr|
|configure_sshd_KexAlgorithms|The available KEX (Key Exchange) algorithms.<br><br>curve25519-sha256@<span>libssh.org</span><br>diffie-hellman-group-exchange-sha256|
|configure_sshd_MACs|The available MAC (message authentication code) algorithms.<br><br>hmac-sha2-512-etm@<span>openssh.com</span><br>hmac-sha2-256-etm@<span>openssh.com</span><br>umac-128-etm@<span>openssh.com</span><br>hmac-sha2-512<br>hmac-sha2-256<br>umac-128@<span>openssh.com</span>|
|configure_sshd_DenyUsers|A space seperated list of usernames that are not allowed to login to this server. Even if they belong to the group defined by configure_sshd_AllowGroups.|
|configure_sshd_AllowGroups|Only users who are members of this group can login to the server.|
|configure_sshd_AuthorizedKeysFile_dir|The directoy to store a users the authorized keys file in.|
|configure_sshd_AuthorizedKeysFile_create_dir|Whether the directory defined by `configure_sshd_AuthorizedKeysFile_dir` should be created or not.|
|configure_sshd_AllowGroups_create_group|Specifies whether the group defined by `configure_sshd_AllowGroups` should be created or not.|
|configure_sshd_AllowGroups_user|Specifies the user who should be made a member of the group defined by `configure_sshd_AllowGroups`.|
|configure_sshd_port|The port number that sshd listens on.|
|configure_sshd_listenaddress|The IPv4 address that the sshd service will listen on. By default this will listen on all configured IPv4 addresses.|
|configure_sshd_protocol|The protocol versions sshd supports.|
|configure_sshd_passwordauthentication|If Password authentication is allowed.|
|configure_sshd_permitrootlogin|Whether root can log in using ssh.|
|configure_sshd_usedns|Should DNS be used to look up the remote host name, also checks that the DNS hostname matches the ipaddress of the source server.|
|configure_sshd_permitemptypasswords|Can empty password be used.|
|configure_sshd_challengeresponseauthentication|Is challenge-response authentication is allowed.|
|configure_sshd_gssapiauthentication|Is authentication based on GSSAPI is allowed. This only applies when protocol version 2 is being used.|
|configure_sshd_x11forwarding|Is X11 forwarding is permitted.|
|configure_sshd_maxauthtries|What is the maximum number of allowed authentions attempts, also once half this number is reached then further failures are logged.|
|configure_sshd_banner|Send the contents of the specified file to the user before authentication is atempted.|
|configure_sshd_authorizedkeysfile|This file contains the public keys that can be used for user authentication. This setting uses the value specified by configure_sshd_authorizedkeysfile_dir.|
|configure_sshd_pubkeyauthentication|Is public key authentication is allowed.|
|configure_sshd_ciphers|The ciphers allowed when protocol version 2 is being used.<br><br>chacha20-poly1305@<span>openssh.com</span><br>aes256-gcm@<span>openssh.com</span><br>aes128-gcm@<span>openssh.com</span><br>aes256-ctr<br>aes192-ctr<br>aes128-ctr|
|configure_sshd_kexalgorithms|The available KEX (Key Exchange) algorithms.<br><br>curve25519-sha256@<span>libssh.org</span><br>diffie-hellman-group-exchange-sha256|
|configure_sshd_macs|The available MAC (message authentication code) algorithms.<br><br>hmac-sha2-512-etm@<span>openssh.com</span><br>hmac-sha2-256-etm@<span>openssh.com</span><br>umac-128-etm@<span>openssh.com</span><br>hmac-sha2-512<br>hmac-sha2-256<br>umac-128@<span>openssh.com</span>|
|configure_sshd_denyusers|A space seperated list of usernames that are not allowed to login to this server. Even if they belong to the group defined by `configure_sshd_allowgroups`.|
|configure_sshd_allowgroups|Only users who are members of this group can login to the server.|
|configure_sshd_authorizedkeysfile_dir|The directoy to store a users the authorized keys file in.|
|configure_sshd_authorizedkeysfile_create_dir|Whether the directory defined by `configure_sshd_authorizedkeysfile_dir` should be created or not.|
|configure_sshd_allowgroups_create_group|Specifies whether the group defined by `configure_sshd_allowgroups` should be created or not.|
|configure_sshd_allowgroups_user|Specifies the user who should be made a member of the group defined by `configure_sshd_allowgroups`.|

The below KexAlgorithms will be used in addition to the ones defined above if the server is running OpenSSH 7.3 or later.

|Variable|Description|
|---|:---|
|configure_sshd_KexAlgorithms_73|The KEX (Key Exchange) algorithms that will be used in addition to the ones defined above if the server is running OpenSSH 7.3 or later.<br><br>diffie-hellman-group14-sha256<br>diffie-hellman-group16-sha512<br>diffie-hellman-group18-sha512|
|configure_sshd_kexalgorithms_73|The KEX (Key Exchange) algorithms that will be used in addition to the ones defined above if the server is running OpenSSH 7.3 or later.<br><br>diffie-hellman-group14-sha256<br>diffie-hellman-group16-sha512<br>diffie-hellman-group18-sha512|

### vars/RedHat.yml

|Variable|Description|
|---|:---|
|__configure_sshd_name|The name of the ssh service on RedHat based systems. This value is used to define configure_sshd_name in the tasks/main.yml file.<br>This value can be overridden by setting configure_sshd_name in the playbook.
|__configure_sshd_SyslogFacility|Sets the rsyslog facility on RedHat based systems.<br>By default this will be AUTHPRIV.INFO.<br>This value can be overridden by setting configure_sshd_SyslogFacility in the playbook.|
|__configure_sshd_syslogfacility|Sets the rsyslog facility on RedHat based systems.<br>By default this will be AUTHPRIV.INFO.<br>This value can be overridden by setting configure_sshd_SyslogFacility in the playbook.|
|__configure_sshd_sftpserver|Sets the path of the sftp-server used by the sftp subsystem.<br>This value can be overridden by setting onfigure_sshd_sftpserver in the playbook.|

### vars/Debian.yml

|Variable|Description|
|---|:---|
|__configure_sshd_name|The name of the ssh service on Debian based systems. This value is used to define configure_sshd_name in the tasks/main.yml file.<br>This value can be overridden by setting configure_sshd_name in the playbook.|
|__configure_sshd_SyslogFacility|Sets the rsyslog facility on Debian based systems.<br>By default this will be AUTH.INFO.<br>This value can be overridden by setting configure_sshd_SyslogFacility in the playbook.|
|__configure_sshd_sftpserver|Sets the path of the sftp-server used by the sftp subsystem.<br>This value can be overridden by setting onfigure_sshd_sftpserver in the playbook.|
|__configure_sshd_name|The name of the ssh service on Debian based systems. This value is used to define `configure_sshd_name` in the tasks/main.yml file.<br>This value can be overridden by setting `configure_sshd_name` in the playbook.|
|__configure_sshd_SyslogFacility|Sets the rsyslog facility on Debian based systems.<br>By default this will be AUTH.INFO.<br>This value can be overridden by setting `configure_sshd_syslogfacility` in the playbook.|
|__configure_sshd_sftpserver|Sets the path of the sftp-server used by the sftp subsystem.<br>This value can be overridden by setting `configure_sshd_sftpserver` in the playbook.|

## Dependencies

Expand Down

0 comments on commit 916b813

Please sign in to comment.