2021-03-13 23:57:37 +01:00
[![Ansible Galaxy ](https://raw.githubusercontent.com/roles-ansible/ansible_role_sshd/main/.github/galaxy.svg?sanitize=true )](https://galaxy.ansible.com/do1jlr/sshd) [![MIT License ](https://raw.githubusercontent.com/roles-ansible/ansible_role_sshd/main/.github/license.svg?sanitize=true )](https://github.com/roles-ansible/ansible_role_sshd/blob/main/LICENSE)
2021-03-13 23:54:41 +01:00
OpenSSH Server
2018-03-07 03:28:23 +01:00
==============
2021-03-13 23:12:49 +01:00
Ansible role to configure the OpenSSH Server ``SSHD``.
The main goal of this role is to manage the sshd.conf file. And some additional parts like deploying the defined ssh host keys at the configured path.
Pro Tipp
----------------
Use Eliptic cureve cryptografie for your ssh keys:
2018-11-12 21:37:43 +01:00
```bash
ssh-keygen -t ed25519
```
2021-03-13 23:12:49 +01:00
*The defualt values of this role will only allow ed25519 keys. But you can change that obviously if you like.*
2018-03-07 03:28:23 +01:00
2019-11-14 10:36:18 +01:00
combinations
---------------
It is highly recomended to use this role together with a role to manage users and to manage the sshd configuration.< br / >
The following roles are tested in combination and work well - at least for the user [DO1JLR ](https://github.com/do1jlr ):
- [github.com/chaos-bodensee/role-manage_users ](https://github.com/chaos-bodensee/role-manage_users.git )
- [github.com/chaos-bodensee/role-ssh_authorized_keys ](https://github.com/chaos-bodensee/role-ssh_authorized_keys.git )
2021-03-13 23:01:11 +01:00
- [github.com/roles-ansible/ansible_role_sshd ](https://github.com/roles-ansible/ansible_role_sshd.git ) *(this one)*
2019-11-14 10:36:18 +01:00
2018-03-07 03:28:23 +01:00
2019-05-15 12:37:25 +02:00
Some Variables explained
------------------------------
**Remember:** Have a look into ``defaults/main.yml`` for all possible variables.
2018-03-07 03:28:23 +01:00
2021-03-13 23:03:31 +01:00
+ **SSH Port** < br />
2021-03-13 23:01:11 +01:00
The OpenSSH Port is defined with the variable ``sshd__port: 22``. Change it if you wish.
2019-05-15 12:37:25 +02:00
2021-03-13 23:03:31 +01:00
+ **Allowed Users and Groups** < br />
The default users that are allowd to login come from the ``users: {}`` list.< br / >
The same ``users: {}`` variable is used in the other recomended ssh roles.< br / >
2021-03-13 23:01:11 +01:00
A example to allow the login for the users and groups called ``l3d`` and ``ottojo`` are:
```
2018-11-12 21:37:43 +01:00
users:
l3d:
- l3d
ottojo:
- ottojo@uni
- ottojo@home
```
2021-03-13 23:01:11 +01:00
2021-03-13 23:03:31 +01:00
+ **SSH Login via Passwort** < br />
2021-03-13 23:01:11 +01:00
The SSH Passwort auth is set to false via ``sshd__password_authentication: false``. This won't allow you to use your passwort to login via SSH.
2021-03-13 23:03:31 +01:00
+ **Manage SSH Key Types** < br />
2021-03-13 23:01:11 +01:00
By default this role configure which ssh key types are allowed to login. If you don't want to define that change the ``sshd__manage_key_types: true`` variable.
2021-03-13 23:03:31 +01:00
+ **Define allowed ssh key types** < br />
The allowed SSH Key Types are defined with this list. Some of them are commented out.< br / >
2021-03-13 23:01:11 +01:00
Please not that by defualt only ``ed25519`` keys are allowed. Keep that in mind if you are using a rsa key.
```
sshd__key_types:
- 'ed25519'
# - 'rsa'
# - 'ecdsa'
# - 'dsa' # (do not use!)
```
2021-03-13 23:03:31 +01:00
+ **Advanced SSH Algorithm Settings** < br />
2021-03-14 00:01:09 +01:00
You can define the used Key and Kex Algorithm here to. For the default values and some examples for the variables ``sshd__key_algorithmus`` and ``sshd__kex_algorithmus`` have a look into ``defaults/main.yml``.
2019-05-15 12:37:25 +02:00
2018-03-07 03:28:23 +01:00
2021-03-13 23:03:31 +01:00
+ **force new SSH Features** < br />
2021-03-13 23:01:11 +01:00
If you know that you use a ssh version ``>8`` you can optionally define it with ``true/false`` with the ``sshd__version_is_above_eight`` variable.
2019-05-15 12:37:25 +02:00
Files
2018-03-16 04:54:02 +01:00
-----
2021-03-13 23:01:11 +01:00
The main task of this role is to configure the ``sshd.conf`` file.
2018-03-16 04:54:02 +01:00
2019-05-15 12:37:25 +02:00
References
2018-03-07 03:28:23 +01:00
----------
* [Secure Secure Shell ](https://stribika.github.io/2015/01/04/secure-secure-shell.html )
2021-03-13 23:08:03 +01:00
Testing
--------
This role is tested with some linting tests. Sadly I don't know how to run this role in a docker container because systemd is involved... If you have ideas how to improve testing please dend me a message, open a issue or Pull Request.
If you want to find out more about our tests, please have a look at the github marketplace.
| test status | Github Marketplace |
| :--------- | :---------------- |
| [![Galaxy release ](https://github.com/roles-ansible/ansible_role_sshd/actions/workflows/galaxy.yml/badge.svg )](https://github.com/roles-ansible/ansible_role_sshd/actions/workflows/galaxy.yml) | [publish-ansible-role-to-galaxy ](https://github.com/marketplace/actions/publish-ansible-role-to-galaxy ) |
| [![Yamllint GitHub Actions ](https://github.com/roles-ansible/ansible_role_sshd/actions/workflows/yamllint.yaml/badge.svg )](https://github.com/roles-ansible/ansible_role_sshd/actions/workflows/yamllint.yaml) | [yamllint-github-action ](https://github.com/marketplace/actions/yamllint-github-action ) |
| [![Ansible Lint check ](https://github.com/roles-ansible/ansible_role_sshd/actions/workflows/ansible-linting-check.yml/badge.svg )](https://github.com/roles-ansible/ansible_role_sshd/actions/workflows/ansible-linting-check.yml) | [ansible-lint action ](https://github.com/marketplace/actions/ansible-lint )