{%- set sshd_config = pillar.get('sshd_config', {}) -%} {#- present in sshd_config and known in actual file options -#} {%- set processed_options = [] -%} {#- generic renderer used for sshd matches, known options, -#} {#- and unknown options -#} {%- macro render_option(keyword, default, config_dict=sshd_config) -%} {%- set value = config_dict.get(keyword, default) -%} {%- if value is sameas true -%} {{ keyword }} yes {%- elif value is sameas false -%} {{ keyword }} no {%- elif value is string or value is number -%} {{ keyword }} {{ value }} {%- else -%} {%- for single_value in value -%} {{ keyword }} {{ single_value }} {% endfor -%} {%- endif -%} {%- endmacro -%} {#- macros for render option according to present -#} {%- macro option_impl(keyword, default, present) -%} {%- if present -%} {%- do processed_options.append(keyword) -%} {%- set prefix='' -%} {%- else -%} {%- set prefix='#' -%} {%- endif -%} {#- add prefix to keyword -#} {%- set keyword = prefix ~ keyword -%} {{ render_option(keyword, default) }} {%- endmacro -%} {#- macros for render option commented by default -#} {%- macro option(keyword, default, present) -%} {{ option_impl(keyword, default, keyword in sshd_config) }} {%- endmacro -%} {#- macros for render option uncommented by default -#} {%- macro option_default_uncommented(keyword, default, present) -%} {{ option_impl(keyword, default, True) }} {%- endmacro -%} # This file is managed by salt. Manual changes risk being overwritten. # The contents of the original sshd_config are kept on the bottom for # quick reference. # See the sshd_config(5) manpage for details # What ports, IPs and protocols we listen for {{ option('Port', 22) }} # Use these options to restrict which interfaces/protocols sshd will bind to {{ option('ListenAddress', ['::', '0.0.0.0']) }} {{ option_default_uncommented('Protocol', 2) }} # HostKeys for protocol version 2 {{ option_default_uncommented('HostKey', ['/etc/ssh/ssh_host_rsa_key', '/etc/ssh/ssh_host_dsa_key', '/etc/ssh/ssh_host_ecdsa_key', '/etc/ssh/ssh_host_ed25519_key']) -}} #Privilege Separation is turned on for security {{ option_default_uncommented('UsePrivilegeSeparation', 'yes') }} # Lifetime and size of ephemeral version 1 server key {{ option_default_uncommented('KeyRegenerationInterval', 3600) }} {{ option_default_uncommented('ServerKeyBits', 768) }} # Logging {{ option_default_uncommented('SyslogFacility', 'AUTH') }} {{ option_default_uncommented('LogLevel', 'INFO') }} # Authentication: {{ option_default_uncommented('LoginGraceTime', 120) }} {{ option_default_uncommented('PermitRootLogin', 'no') }} {{ option_default_uncommented('StrictModes', 'yes') }} {{ option('DSAAuthentication', 'yes') }} {{ option_default_uncommented('RSAAuthentication', 'yes') }} {{ option_default_uncommented('PubkeyAuthentication', 'yes') }} {{ option('AuthorizedKeysFile', '%h/.ssh/authorized_keys') }} # Don't read the user's ~/.rhosts and ~/.shosts files {{ option_default_uncommented('IgnoreRhosts', 'yes') }} # For this to work you will also need host keys in /etc/ssh_known_hosts {{ option_default_uncommented('RhostsRSAAuthentication', 'no') }} # similar for protocol version 2 {{ option_default_uncommented('HostbasedAuthentication', 'no') }} # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication {{ option('IgnoreUserKnownHosts', 'yes') }} # To enable empty passwords, change to yes (NOT RECOMMENDED) {{ option_default_uncommented('PermitEmptyPasswords', 'no') }} # Change to yes to enable challenge-response passwords (beware issues with # some PAM modules and threads) {{ option_default_uncommented('ChallengeResponseAuthentication', 'no') }} {{ option('AuthenticationMethods', 'publickey,keyboard-interactive') }} # Change to no to disable tunnelled clear text passwords {{ option('PasswordAuthentication', 'yes') }} # Kerberos options {{ option('KerberosAuthentication', 'no') }} {{ option('KerberosGetAFSToken', 'no') }} {{ option('KerberosOrLocalPasswd', 'yes') }} {{ option('KerberosTicketCleanup', 'yes') }} # GSSAPI options {{ option('GSSAPIAuthentication', 'no') }} {{ option('GSSAPICleanupCredentials', 'yes') }} {{ option_default_uncommented('X11Forwarding', 'yes') }} {{ option('AllowTcpForwarding', 'yes') }} {{ option_default_uncommented('X11DisplayOffset', '10') }} {{ option_default_uncommented('PrintMotd', 'no') }} {{ option_default_uncommented('PrintLastLog', 'yes') }} {{ option_default_uncommented('TCPKeepAlive', 'yes') }} {{ option('UseLogin', 'no') }} {{ option('MaxStartups', '10:30:60') }} {{ option('Banner', '/etc/issue.net') }} # Allow client to pass locale environment variables {{ option_default_uncommented('AcceptEnv', 'LANG LC_*') }} {{ option_default_uncommented('Subsystem', 'sftp /usr/lib/openssh/sftp-server') }} # Set this to 'yes' to enable PAM authentication, account processing, # and session processing. If this is enabled, PAM authentication will # be allowed through the ChallengeResponseAuthentication and # PasswordAuthentication. Depending on your PAM configuration, # PAM authentication via ChallengeResponseAuthentication may bypass # the setting of "PermitRootLogin without-password". # If you just want the PAM account and session checks to run without # PAM authentication, then enable this but set PasswordAuthentication # and ChallengeResponseAuthentication to 'no'. {{ option_default_uncommented('UsePAM', 'yes') }} # DNS resolve and map remote IP addresses {{ option('UseDNS', 'yes') }} # Restricting Users and Hosts # example: # AllowUsers vader@10.0.0.1 maul@sproing.evil.com luke # AllowGroups wheel staff # # Keep in mind that using AllowUsers or AllowGroups means that anyone # not Matching one of the supplied patterns will be denied access by default. # Also, in order for sshd to allow access based on full or partial hostnames it # needs to to a DNS lookup # # DenyUsers {{ option('DenyUsers', '') }} # AllowUsers {{ option('AllowUsers', '') }} # DenyGroups {{ option('DenyGroups', '') }} # AllowGroups {{ option('AllowGroups', '') }} # Specifies the available KEX (Key Exchange) algorithms. {{ option('KexAlgorithms', 'ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1') }} # Specifies the ciphers allowed for protocol version 2. {{ option('Ciphers', 'aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se') }} # Specifies the available MAC (message authentication code) algorithms. {{ option('MACs', 'hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96') }} {# Handling unknown in salt template options #} {%- for keyword in sshd_config.keys() %} {#- Matches have to be at the bottem and should be handled differently -#} {%- if not keyword in processed_options and keyword != 'matches' -%} {#- send a blank default as it doesn't matter #} {{ render_option(keyword, '') }} {%- endif -%} {%- endfor %} {# Handle matches last as they need to go at the bottom #} {%- if 'matches' in sshd_config %} {%- for match in sshd_config['matches'].values() %} Match {{ match['type'].keys()[0] }} {{ match['type'].values()[0] }} {%- for keyword in match['options'].keys() %} {{ render_option(keyword, '', config_dict=match['options']) }} {%- endfor %} {%- endfor %} {%- endif %}