Skip to content
This repository was archived by the owner on Dec 26, 2020. It is now read-only.

Commit ab3e966

Browse files
author
Sebastian Gumprich
committed
debian 8 support, verifier changes, metadata change
* add support for debian 8 * cleanup kitchen.yml, add inspec support * remove oracle from meta file, bc it does not exist in ansible galaxy
1 parent fdd8dae commit ab3e966

File tree

3 files changed

+52
-9
lines changed

3 files changed

+52
-9
lines changed

.kitchen.yml

Lines changed: 22 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,32 @@
11
---
22
driver:
33
name: vagrant
4+
45
provisioner:
56
name: ansible_playbook
6-
test_repo_uri: https://github.com/hardening-io/tests-ssh-hardening.git
77
hosts: all
88
require_ansible_repo: false
99
require_ansible_omnibus: true
1010
require_chef_for_busser: false
1111
require_ruby_for_busser: false
1212
ansible_verbose: true
1313
ansible_diff: true
14+
<<<<<<< 7d5e6960c817dfd191f1cb095bc237064424e8c4
1415
roles_path: ../ansible-ssh-hardening/
1516
playbook: default.yml
1617

18+
=======
19+
hosts: all
20+
roles_path: ../ansible-ssh-hardening/
21+
playbook: default.yml
22+
23+
verifier:
24+
name: inspec
25+
sudo: true
26+
inspec_tests:
27+
- https://github.com/dev-sec/tests-ssh-hardening
28+
29+
>>>>>>> debian 8 support, verifier changes, metadata change
1730
platforms:
1831
- name: ubuntu-12.04
1932
driver_config:
@@ -47,10 +60,16 @@ platforms:
4760
driver_config:
4861
box: debian-8
4962
box_url: https://opscode-vm-bento.s3.amazonaws.com/vagrant/virtualbox/opscode_debian-8.1_chef-provisionerless.box
50-
verifier:
51-
name: inspec
63+
5264
suites:
65+
<<<<<<< 7d5e6960c817dfd191f1cb095bc237064424e8c4
5366
- name: ansible_1.9
5467
provisioner:
5568
ansible_version: 1.9.4
5669
- name: ansible_latest
70+
=======
71+
- name: ssh-ansible_1.9
72+
provisioner:
73+
ansible_version: 1.9.4
74+
- name: ssh-ansible_latest
75+
>>>>>>> debian 8 support, verifier changes, metadata change

README.md

Lines changed: 30 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ This role provides secure ssh-client and ssh-server configurations.
1313
* Ansible
1414

1515
## Role Variables
16+
<<<<<<< 7d5e6960c817dfd191f1cb095bc237064424e8c4
1617
| Name | Default Value | Description |
1718
| -------------- | ------------- | -----------------------------------|
1819
|`network_ipv6_enable` | false |true if IPv6 is needed|
@@ -42,6 +43,35 @@ This role provides secure ssh-client and ssh-server configurations.
4243
|`sftp_enabled` | false | true to enable sftp configuration|
4344
|`sftp_chroot_dir` | /home/%u | change default sftp chroot location|
4445
|`ssh_client_roaming` | false | enable experimental client roaming|
46+
=======
47+
* ``network_ipv6_enable`` - true if IPv6 is needed
48+
* ``ssh_client_cbc_required`` - true if CBC for ciphers is required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure ciphers enabled. CBC is a weak alternative. Anything weaker should be avoided and is thus not available.
49+
* ``ssh_server_cbc_required`` - true if CBC for ciphers is required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure ciphers enabled. CBC is a weak alternative. Anything weaker should be avoided and is thus not available.
50+
* ``ssh_client_weak_hmac`` - true if weaker HMAC mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure HMACs enabled.
51+
* ``ssh_server_weak_hmac`` - true if weaker HMAC mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure HMACs enabled.
52+
* ``ssh_client_weak_kex`` - true if weaker Key-Exchange (KEX) mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure KEXs enabled.
53+
* ``ssh_server_weak_kex`` - true if weaker Key-Exchange (KEX) mechanisms are required. This is usually only necessary, if older M2M mechanism need to communicate with SSH, that don't have any of the configured secure KEXs enabled.
54+
* ``ssh_server_ports: ['22']`` - ports to which ssh-server should listen to
55+
* ``ssh_client_ports: ['22']`` - ports to which ssh-client should connect to
56+
* ``ssh_listen_to: ['0.0.0.0']`` - one or more ip addresses, to which ssh-server should listen to. Default is all adresseses, but should be configured to specific addresses for security reasons!
57+
* ``ssh_host_key_files: ['/etc/ssh/ssh_host_rsa_key', '/etc/ssh/ssh_host_dsa_key', '/etc/ssh/ssh_host_ecdsa_key']`` - Host keys to look for when starting sshd.
58+
* ``ssh_client_alive_interval: 600``
59+
* ``ssh_client_alive_count: 3``
60+
* ``ssh_remote_hosts: []`` - one or more hosts, to which ssh-client can connect to. Default is empty, but should be configured for security reasons!
61+
* ``ssh_allow_root_with_key`` - false to disable root login altogether. Set to true to allow root to login via key-based mechanism.
62+
* ``ssh_allow_tcp_forwarding`` false to disable TCP Forwarding. Set to true to allow TCP Forwarding.
63+
* ``ssh_allow_agent_forwarding`` false to disable Agent Forwarding. Set to true to allow Agent Forwarding.
64+
* ``ssh_use_pam: false`` - false to disable pam authentication.
65+
* ``ssh_deny_users: ''`` - if specified, login is disallowed for user names that match one of the patterns.
66+
* ``ssh_allow_users: ''`` - if specified, login is allowed only for user names that match one of the patterns.
67+
* ``ssh_deny_groups: ''`` - if specified, login is disallowed for users whose primary group or supplementary group list matches one of the patterns.
68+
* ``ssh_allow_groups: ''`` - if specified, login is allowed only for users whose primary group or supplementary group list matches one of the patterns.
69+
* ``ssh_print_motd`` - false to disable printing of the MOTD
70+
* ``ssh_print_last_log`` - false to disable display of last login information
71+
* ``sftp_enabled`` - true to enable sftp configuration
72+
* ``sftp_chroot_dir`` - change default sftp chroot location
73+
* ``ssh_client_roaming`` - enable experimental client roaming
74+
>>>>>>> debian 8 support, verifier changes, metadata change
4575
4676
## Example Playbook
4777

@@ -60,9 +90,6 @@ Next install test-kitchen:
6090
gem install bundler
6191
bundle install
6292

63-
# Fetch tests
64-
bundle exec thor kitchen:fetch-remote-tests
65-
6693
# fast test on one machine
6794
bundle exec kitchen test default-ubuntu-1204
6895

meta/main.yml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,6 @@ galaxy_info:
99
- name: EL
1010
versions:
1111
- 6
12-
- name: Oracle Linux
13-
versions:
14-
- 6
1512
- name: Ubuntu
1613
versions:
1714
- precise

0 commit comments

Comments
 (0)