Skip to content
This repository was archived by the owner on Dec 26, 2020. It is now read-only.

Commit 4e6d736

Browse files
committed
Moves vars/main.yml vars into defaults/main.yml
Exposes vars for manipulation by role/playbook tasks. Does not change any default functionality of the role.
1 parent 3035f7d commit 4e6d736

File tree

2 files changed

+57
-55
lines changed

2 files changed

+57
-55
lines changed

defaults/main.yml

Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,3 +77,60 @@ sftp_chroot_dir: /home/%u
7777

7878
# enable experimental client roaming
7979
ssh_client_roaming: false
80+
81+
82+
ssh_ps53: 'yes'
83+
ssh_ps59: 'sandbox'
84+
85+
ssh_macs_53_default:
86+
- hmac-ripemd160
87+
- hmac-sha1
88+
89+
ssh_macs_59_default:
90+
- hmac-sha2-512
91+
- hmac-sha2-256
92+
- hmac-ripemd160
93+
94+
ssh_macs_59_weak: "{{ ssh_macs_59_default + ['hmac-sha1'] }}"
95+
96+
ssh_macs_66_default:
97+
- hmac-sha2-512-etm@openssh.com
98+
- hmac-sha2-256-etm@openssh.com
99+
- hmac-ripemd160-etm@openssh.com
100+
- umac-128-etm@openssh.com
101+
- hmac-sha2-512
102+
- hmac-sha2-256
103+
- hmac-ripemd160
104+
105+
ssh_macs_66_weak: "{{ ssh_macs_66_default + ['hmac-sha1'] }}"
106+
107+
ssh_ciphers_53_default:
108+
- aes256-ctr
109+
- aes192-ctr
110+
- aes128-ctr
111+
112+
ssh_ciphers_53_weak: "{{ ssh_ciphers_53_default + ['aes256-cbc', 'aes192-cbc', 'aes128-cbc'] }}"
113+
114+
ssh_ciphers_66_default:
115+
- chacha20-poly1305@openssh.comi
116+
- aes256-gcm@openssh.com
117+
- aes128-gcm@openssh.com
118+
- aes256-ctr
119+
- aes192-ctr
120+
- aes128-ctr
121+
122+
ssh_ciphers_66_weak: "{{ ssh_ciphers_66_default + ['aes256-cbc', 'aes192-cbc', 'aes128-cbc'] }}"
123+
124+
ssh_kex_59_default:
125+
- diffie-hellman-group-exchange-sha256
126+
127+
ssh_kex_59_weak: "{{ ssh_kex_59_default + ['diffie-hellman-group14-sha1', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group1-sha1'] }}"
128+
129+
ssh_kex_66_default:
130+
- curve25519-sha256@libssh.org
131+
- diffie-hellman-group-exchange-sha256
132+
133+
ssh_kex_66_weak: "{{ ssh_kex_66_default + ['diffie-hellman-group14-sha1', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group1-sha1'] }}"
134+
135+
# directory where to store ssh_password policy
136+
ssh_custom_selinux_dir: '/etc/selinux/local-policies'

vars/main.yml

Lines changed: 0 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -1,55 +0,0 @@
1-
ssh_ps53: 'yes'
2-
ssh_ps59: 'sandbox'
3-
4-
ssh_macs_53_default:
5-
- hmac-ripemd160
6-
- hmac-sha1
7-
8-
ssh_macs_59_default:
9-
- hmac-sha2-512
10-
- hmac-sha2-256
11-
- hmac-ripemd160
12-
13-
ssh_macs_59_weak: "{{ ssh_macs_59_default + ['hmac-sha1'] }}"
14-
15-
ssh_macs_66_default:
16-
- hmac-sha2-512-etm@openssh.com
17-
- hmac-sha2-256-etm@openssh.com
18-
- hmac-ripemd160-etm@openssh.com
19-
- umac-128-etm@openssh.com
20-
- hmac-sha2-512
21-
- hmac-sha2-256
22-
- hmac-ripemd160
23-
24-
ssh_macs_66_weak: "{{ ssh_macs_66_default + ['hmac-sha1'] }}"
25-
26-
ssh_ciphers_53_default:
27-
- aes256-ctr
28-
- aes192-ctr
29-
- aes128-ctr
30-
31-
ssh_ciphers_53_weak: "{{ ssh_ciphers_53_default + ['aes256-cbc', 'aes192-cbc', 'aes128-cbc'] }}"
32-
33-
ssh_ciphers_66_default:
34-
- chacha20-poly1305@openssh.comi
35-
- aes256-gcm@openssh.com
36-
- aes128-gcm@openssh.com
37-
- aes256-ctr
38-
- aes192-ctr
39-
- aes128-ctr
40-
41-
ssh_ciphers_66_weak: "{{ ssh_ciphers_66_default + ['aes256-cbc', 'aes192-cbc', 'aes128-cbc'] }}"
42-
43-
ssh_kex_59_default:
44-
- diffie-hellman-group-exchange-sha256
45-
46-
ssh_kex_59_weak: "{{ ssh_kex_59_default + ['diffie-hellman-group14-sha1', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group1-sha1'] }}"
47-
48-
ssh_kex_66_default:
49-
- curve25519-sha256@libssh.org
50-
- diffie-hellman-group-exchange-sha256
51-
52-
ssh_kex_66_weak: "{{ ssh_kex_66_default + ['diffie-hellman-group14-sha1', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group1-sha1'] }}"
53-
54-
# directory where to store ssh_password policy
55-
ssh_custom_selinux_dir: '/etc/selinux/local-policies'

0 commit comments

Comments
 (0)