You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 26, 2020. It is now read-only.
# Specifies the maximum number of authentication attempts permitted per connection. Once the number of failures reaches half this value, additional failures are logged.
33
+
ssh_max_auth_retries: 2
34
+
32
35
ssh_client_alive_interval: 600# sshd
33
36
ssh_client_alive_count: 3# sshd
34
37
# one or more hosts, to which ssh-client can connect to. Default is empty, but should be configured for security reasons!
AddressFamily {{ 'any' if network_ipv6_enable else 'inet' }}
25
21
26
22
# Define which addresses sshd should listen to. Default to `0.0.0.0`, ie make sure you put your desired address in here, since otherwise sshd will listen to everyone.
27
23
{%foraddressinssh_listen_to -%}
@@ -125,7 +121,7 @@ UsePrivilegeSeparation {% if (ansible_distribution == 'Debian' and ansible_distr
125
121
126
122
PermitUserEnvironment no
127
123
LoginGraceTime 30s
128
-
MaxAuthTries 2
124
+
MaxAuthTries {{ssh_max_auth_retries}}
129
125
MaxSessions 10
130
126
MaxStartups 10:30:100
131
127
@@ -138,7 +134,7 @@ IgnoreUserKnownHosts yes
138
134
HostbasedAuthentication no
139
135
140
136
# Enable PAM to enforce system wide rules
141
-
UsePAM {%ifssh_use_pam-%}yes{%else%}no{%endif%}
137
+
UsePAM {{ 'yes' if ssh_use_pam else 'no' }}
142
138
143
139
# Disable password-based authentication, it can allow for potentially easier brute-force attacks.
0 commit comments