blob: 68505ede075b5313ab003e32ca978c9825d69b6b (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
|
---
- name: install ssh-server
apt: name=openssh-server state=present
- name: hardening ssh-server config
lineinfile:
regexp: "{{ item.regexp }}"
line: "{{ item.line }}"
dest: /etc/ssh/sshd_config
mode: 0644
with_items:
- { "regexp": "^#?\\s*IgnoreRhosts", "line": "IgnoreRhosts yes" }
- { "regexp": "^#?\\s*PermitRootLogin", "line": "PermitRootLogin without-password" }
- { "regexp": "^#?\\s*PubkeyAuthentication", "line": "PubkeyAuthentication yes" }
- { "regexp": "^#?\\s*HostbasedAuthentication", "line": "HostbasedAuthentication no" }
- { "regexp": "^#?\\s*PermitEmptyPasswords", "line": "PermitEmptyPasswords no" }
- { "regexp": "^#?\\s*UseDNS", "line": "UseDNS no" }
notify: restart ssh
- name: limit allowed users
lineinfile:
dest: /etc/ssh/sshd_config
regexp: "^AllowUsers"
line: "AllowUsers {{ ' '.join([ 'root', 'rhadmin' ] | union(sshserver_allowusers_group | default([])) | union(sshserver_allowusers_host | default([]))) }}"
when: sshserver_allowusers_set | default(true)
notify: restart ssh
- name: allow any user to login via ssh
lineinfile:
dest: /etc/ssh/sshd_config
regexp: "^AllowUsers"
state: absent
when: not (sshserver_allowusers_set | default(true))
notify: restart ssh
|