123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051 |
- # sync with https://github.com/fphammerle/docker-gitolite/blob/master/sshd_config
- LogLevel INFO
- #LogLevel DEBUG
- PidFile none
- Port 2200
- Protocol 2
- HostKey /etc/ssh/host_keys/rsa
- HostKey /etc/ssh/host_keys/ed25519
- # https://www.ssh-audit.com/hardening_guides.html#ubuntu_20_04_lts
- KexAlgorithms curve25519-sha256,curve25519-sha256@libssh.org,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha256
- Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
- MACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,umac-128-etm@openssh.com
- HostKeyAlgorithms ssh-ed25519,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-256,rsa-sha2-512,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com
- #UsePAM no
- PermitRootLogin no
- PubkeyAuthentication yes
- # > RSA: The length of the modulus n shall be 2048 bits or more to meet the
- # > minimum security-strength requirement of 112 bits [...]
- # https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final
- RequiredRSASize 2048
- PasswordAuthentication no
- ChallengeResponseAuthentication no
- StrictModes no
- AllowAgentForwarding no
- AllowTcpForwarding no
- GatewayPorts no
- PermitTunnel no
- X11Forwarding no
- PermitUserEnvironment no
- PrintMotd no
- PermitTTY no
- # > In the event that the SSH connection [...] is disconnected or stuck
- # > abnormally [...], it can take a long time for sshd to notice the client is
- # > disconnected. [...] [Configure sshd] to send a keep alive to the client
- # > every 10 seconds. If 30 consecutive keepalives are sent without a response
- # > [...], the server’s sshd process will be terminated, causing the borg serve
- # > process to terminate gracefully and release the lock on the repository.
- # https://web.archive.org/web/20221101185048/https://borgbackup.readthedocs.io/en/stable/usage/serve.html#ssh-configuration
- # > The TCP keepalive option enabled by TCPKeepAlive is spoofable.
- ClientAliveInterval 10
- ClientAliveCountMax 30
- # ForceCommand via command= in ~/.ssh/authorized_keys
|