aboutsummaryrefslogtreecommitdiff
path: root/templates/sshd_config/OpenBSD.erb
diff options
context:
space:
mode:
authorMicah Anderson <micah@riseup.net>2015-05-01 13:48:19 -0400
committerMicah Anderson <micah@riseup.net>2015-05-04 15:42:26 -0400
commit430c48200eeacf11fd3980f162ffa1994c2d0dd0 (patch)
tree20d743d7475ae67cd7aa986cc416c5712ad21783 /templates/sshd_config/OpenBSD.erb
parentfd82841c1f03d22acf4ed448cd22743a785f573e (diff)
downloadpuppet-sshd-430c48200eeacf11fd3980f162ffa1994c2d0dd0.tar.gz
puppet-sshd-430c48200eeacf11fd3980f162ffa1994c2d0dd0.tar.bz2
Implement KexAlgorithms settings, based on Key exchange section of
https://stribika.github.io/2015/01/04/secure-secure-shell.html Note, that on some systems it is uncertain if they will have a new enough version of openssh installed, so on those a version test is done to see before setting them.
Diffstat (limited to 'templates/sshd_config/OpenBSD.erb')
-rw-r--r--templates/sshd_config/OpenBSD.erb3
1 files changed, 3 insertions, 0 deletions
diff --git a/templates/sshd_config/OpenBSD.erb b/templates/sshd_config/OpenBSD.erb
index 7577bac..591d980 100644
--- a/templates/sshd_config/OpenBSD.erb
+++ b/templates/sshd_config/OpenBSD.erb
@@ -129,6 +129,9 @@ AllowGroups <%= s %>
# ForceCommand cvs server
<% if scope.lookupvar('sshd::hardened') == 'yes' -%>
+<% if (scope.function_versioncmp([scope.lookupvar('::ssh_version'),'6.5'])) >= 0 -%>
+KexAlgorithms curve25519-sha256@libssh.org
+<% end -%>
Ciphers aes256-ctr
MACs hmac-sha1
<% end -%>