Skip to content
This repository was archived by the owner on Dec 26, 2020. It is now read-only.

Adds option to enable password based authentication on the server #107

Merged
merged 2 commits into from
Apr 23, 2017
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,8 @@ Warning: This role disables root-login on the target server! Please make sure yo
|`ssh_client_roaming` | false | enable experimental client roaming|
|`sshd_moduli_minimum` | 2048 | remove Diffie-Hellman parameters smaller than the defined size to mitigate logjam|
|`ssh_challengeresponseauthentication` | false | Specifies whether challenge-response authentication is allowed (e.g. via PAM) |
|`ssh_client_password_login` | false | `true` to allow password-based authentication with the ssh client |
|`ssh_server_password_login` | false | `true` to allow password-based authentication with the ssh server |

## Example Playbook

Expand Down
3 changes: 2 additions & 1 deletion defaults/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,8 +17,9 @@ ssh_server_weak_hmac: false # sshd
ssh_client_weak_kex: false # ssh
ssh_server_weak_kex: false # sshd

# If true, password login is allowed. For sshd, it is always set to no password login.
# If true, password login is allowed
ssh_client_password_login: false # ssh
ssh_server_password_login: false # sshd

# ports on which ssh-server should listen
ssh_server_ports: ['22'] # sshd
Expand Down
2 changes: 1 addition & 1 deletion templates/opensshd.conf.j2
Original file line number Diff line number Diff line change
Expand Up @@ -131,7 +131,7 @@ HostbasedAuthentication no
UsePAM {{ 'yes' if ssh_use_pam else 'no' }}

# Disable password-based authentication, it can allow for potentially easier brute-force attacks.
PasswordAuthentication no
PasswordAuthentication {{ 'yes' if ssh_server_password_login else 'no' }}
PermitEmptyPasswords no
ChallengeResponseAuthentication {{ 'yes' if ssh_challengeresponseauthentication else 'no' }}

Expand Down