Age | Commit message (Collapse) | Author | |
---|---|---|---|
2014-06-10 | Openbsd also does not yet have it | mh | |
2014-06-10 | EL 6 also does not have this option yet | mh | |
2014-06-10 | lintig a document | mh | |
2014-06-10 | not all versions support the new default | mh | |
2014-06-10 | Merge remote-tracking branch 'shared/master' | mh | |
Conflicts: manifests/init.pp | |||
2014-05-27 | update $authorized_keys_file variable default to be the default is | Micah Anderson | |
documented by sshd_config(5) | |||
2014-05-27 | add the ability to override the automatic inclusion of the sshd_client | Micah Anderson | |
2014-02-21 | renamed ipaddress_fact to sshkey_ipaddres | Tomas Barton | |
2014-02-14 | too tired to type | Tomas Barton | |
2014-02-14 | custom ip address fact | Tomas Barton | |
2014-01-27 | validate parameters | Tomas Barton | |
2013-05-29 | Nagios disabled by default | Yoann Laissus | |
2013-02-03 | style fixes | Michael Moll | |
silence puppet-lint | |||
2012-06-13 | migrate away from hiera stuff | mh | |
2012-06-05 | new style for 2.7 | mh | |
2011-07-21 | Adding PrintMotd parameter to all templates and setting per-distro default value | Silvio Rhatto | |
2011-07-16 | Clean out $ssh_use_strong_ciphers | Gabriel Filion | |
A tentative option from rhatto using the variable named $ssh_use_strong_ciphers still has two lines in init.pp Since the same functionality is provided by the variable $ssh_hardened_ssl that was merged in the shared repository, rhatto removed his feature. But there are still two lines left, so simply remove them. Signed-off-by: Gabriel Filion <lelutin@gmail.com> | |||
2011-07-13 | Merge branch 'master' of git://labs.riseup.net/shared-sshd | Silvio Rhatto | |
2011-06-21 | Merge remote-tracking branch 'lelutin/freebsd' | Micah Anderson | |
2011-06-21 | New opt-in support to only use strong SSL ciphers and MACs. | intrigeri | |
The new configuration variable is $sshd_hardened_ssl. Settings were stolen from https://github.com/ioerror/duraconf.git. | |||
2011-02-23 | Changing parameter name sshd_perfect_forward_secrecy to ↵ | Silvio Rhatto | |
sshd_use_strong_ciphers as sshd already does PFS | |||
2011-02-19 | Merge branch 'master' of git://labs.riseup.net/shared-sshd | Silvio Rhatto | |
Conflicts: templates/sshd_config/Debian_squeeze.erb | |||
2011-02-19 | Pull together a more comprehensive README, moving the configurable variables ↵ | Micah Anderson | |
from init.pp into the README, and detailing the other features, and requirements, of the module | |||
2011-02-14 | Merge remote branch 'shared/master' | intrigeri | |
Conflicts: templates/sshd_config/Debian_squeeze.erb I always picked the shared repository version when conflicts arose. The only exception to this rule was: I kept my branch's "HostbasedUsesNameFromPacketOnly yes" in order to be consistent with existing Etch and Lenny templates. This is not the default Debian setting, but I would find it weird if a host had this setting changed by Puppet after upgrading to Squeeze. The right way to proceed would probably be to make this configurable. | |||
2011-02-13 | Merge branch 'master' of git://labs.riseup.net/shared-sshd | Silvio Rhatto | |
2011-01-30 | Fix inclusion for default os | Gabriel Filion | |
When the os of a client is not one of those that use a specialized class, (e.g. FreeBSD) the inclusion is currently broken: it tries to include sshd::default which does not exist. Change this to include sshd::base instead. Signed-off-by: Gabriel Filion <lelutin@gmail.com> | |||
2010-12-16 | Introducing perfect forward secrecy for SSH | Silvio Rhatto | |
2010-12-15 | remote KerberosGetAFSToken, its actually not a functional configuration ↵ | Micah Anderson | |
option, even though it is listed in the man page, and commented out in the default config file. I filed a bug with debian (#607238) | |||
2010-12-14 | add Debian Squeeze sshd template. Enabled kerberos and gssapi options, using ↵ | Micah Anderson | |
the defaults when not specified | |||
2010-10-20 | use parametrized class to pass ssh_ports to open up things | mh | |
2010-10-20 | add nagios_check_ssh_hostname to tweak the hostname which whould be ↵ | mh | |
monitored, as this one might actually differ | |||
2010-10-20 | move define to own class | mh | |
2010-10-18 | Bugfix | intrigeri | |
2010-10-16 | bugfix | intrigeri | |
2010-10-16 | bugfix | intrigeri | |
2010-10-16 | New option sshd_ports that obsoletes sshd_port. | intrigeri | |
Backward compatibility is preserved. | |||
2010-02-25 | Merge branch 'master' of git://labs.riseup.net/module_sshd | Silvio Rhatto | |
2010-02-21 | update nagios check_command to check ssh port. it was using ssh_port, it ↵ | Micah Anderson | |
should be 'check_ssh_port' | |||
2010-01-30 | Renaming $sshd_internal_ip to $sshd_shared_ip | Silvio Rhatto | |
2009-12-28 | Merge branch 'master' of git://labs.riseup.net/module_sshd | Silvio Rhatto | |
2009-12-27 | Merge remote branch 'lavamind/master' | Micah Anderson | |
2009-12-27 | Introducing sshd_internal_ip variable | Silvio Rhatto | |
2009-12-27 | PrintMotd using default OpenSSH setting | Silvio Rhatto | |
2009-12-21 | update comments to include information about how to use the nagios | Micah Anderson | |
checks and the pre-requirements | |||
2009-12-19 | fix the comments section so that the include isn't misleading. if you | Micah Anderson | |
use 'include sshd::debian', then none of the variables are set, and you will fail to parse the templates | |||
2009-12-18 | remove fqdn from nagios service description (hostname is used in the ↵ | Jerome Charaoui | |
internal nagios_service name) | |||
2009-12-11 | false != 'false' | mh | |
2009-12-10 | re-add shorewall in rule :/ | mh | |
2009-12-10 | merged with riseup module, various cleaning up | mh | |
2009-12-07 | better set the variables in the init | mh | |