Compare commits
	
		
			No commits in common. "0cf53a97cf67da1bcdba10119cd6999dff36f554" and "ec3d9e6049ee02c7957b0a8c0fe7fdd199a7821f" have entirely different histories.
		
	
	
		
			0cf53a97cf
			...
			ec3d9e6049
		
	
		
| @ -9,24 +9,19 @@ in | ||||
|     enable = mkEnableOption "ssh"; | ||||
|   }; | ||||
|   config = mkIf cfg.enable { | ||||
|     services.openssh = { | ||||
|       enable = true; | ||||
|       settings = { | ||||
|         PasswordAuthentication = false; | ||||
|         KbdInteractiveAuthentication = false; | ||||
|         PermitRootLogin = "no"; | ||||
|       }; | ||||
|       hostKeys = mkIf (config.modules.impermanence.enable) [ | ||||
|         { | ||||
|           type = "ed25519"; | ||||
|           path = "/persist/system/etc/ssh/ssh_host_ed25519_key"; | ||||
|         } | ||||
|         { | ||||
|           type = "rsa"; | ||||
|           bits = 4096; | ||||
|           path = "/persist/system/etc/ssh/ssh_host_rsa_key"; | ||||
|         } | ||||
|       ]; | ||||
|     }; | ||||
|     services.openssh.enable = true; | ||||
|     # TODO: Is this default configuration secure? | ||||
| 
 | ||||
|     services.openssh.hostKeys = mkIf (config.modules.impermanence.enable) [ | ||||
|       { | ||||
|         type = "ed25519"; | ||||
|         path = "/persist/system/etc/ssh/ssh_host_ed25519_key"; | ||||
|       } | ||||
|       { | ||||
|         type = "rsa"; | ||||
|         bits = 4096; | ||||
|         path = "/persist/system/etc/ssh/ssh_host_rsa_key"; | ||||
|       } | ||||
|     ]; | ||||
|   }; | ||||
| } | ||||
|  | ||||
| @ -33,8 +33,7 @@ in | ||||
|     }; | ||||
| 
 | ||||
|     # Local user | ||||
|     modules.secrets.secrets."ssh-keys/admin-pub" = { }; | ||||
|     modules.secrets.secrets."passwords/local-hashed".neededForUsers = true; | ||||
|     sops.secrets."ssh-keys/admin-pub" = { }; | ||||
|     services.getty.autologinUser = "local"; | ||||
|     security.sudo.extraRules = [ | ||||
|       { | ||||
| @ -44,7 +43,6 @@ in | ||||
|     ]; | ||||
|     users.mutableUsers = false; | ||||
|     users.users.local = { | ||||
|       hashedPasswordFile = config.sops.secrets."passwords/local-hashed".path; | ||||
|       extraGroups = [ "wheel" ]; | ||||
|       openssh.authorizedKeys.keyFiles = [ | ||||
|         config.sops.secrets."ssh-keys/admin-pub".path | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user