-
Notifications
You must be signed in to change notification settings - Fork 10
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* Fixes #31 * Thanks to the 🛡️-crew for playing ;)
- Loading branch information
Showing
11 changed files
with
235 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,4 @@ | ||
[ssh_connection] | ||
ssh_args = -o ControlMaster=auto -o ControlPersist=60s | ||
[privilege_escalation] | ||
become_exe = /usr/bin/sudo |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
# PAM configuration for the Secure Shell service | ||
|
||
# Standard Un*x authentication. | ||
@include common-auth | ||
|
||
# Disallow non-root logins when /etc/nologin exists. | ||
account required pam_nologin.so | ||
|
||
# Uncomment and edit /etc/security/access.conf if you need to set complex | ||
# access limits that are hard to express in sshd_config. | ||
# account required pam_access.so | ||
|
||
# Standard Un*x authorization. | ||
@include common-account | ||
|
||
# SELinux needs to be the first session rule. This ensures that any | ||
# lingering context has been cleared. Without this it is possible that a | ||
# module could execute code in the wrong domain. | ||
session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close | ||
|
||
# Set the loginuid process attribute. | ||
session required pam_loginuid.so | ||
|
||
# Create a new session keyring. | ||
session optional pam_keyinit.so force revoke | ||
|
||
# Standard Un*x session setup and teardown. | ||
@include common-session | ||
|
||
# Print the message of the day upon successful login. | ||
# This includes a dynamically generated part from /run/motd.dynamic | ||
# and a static (admin-editable) part from /etc/motd. | ||
session optional pam_motd.so motd=/run/motd.dynamic | ||
session optional pam_motd.so noupdate | ||
|
||
# Print the status of the user's mailbox upon successful login. | ||
session optional pam_mail.so standard noenv # [1] | ||
|
||
# Set up user limits from /etc/security/limits.conf. | ||
session required pam_limits.so | ||
|
||
# Read environment variables from /etc/environment and | ||
# /etc/security/pam_env.conf. | ||
session required pam_env.so # [1] | ||
# In Debian 4.0 (etch), locale-related environment variables were moved to | ||
# /etc/default/locale, so read that as well. | ||
session required pam_env.so envfile=/etc/default/locale | ||
# For restricted shell | ||
session [success=ignore default=1] pam_succeed_if.so shell = /bin/rbash | ||
session required pam_env.so envfile=/etc/restricted_env | ||
|
||
# SELinux needs to intervene at login time to ensure that the process starts | ||
# in the proper default security context. Only sessions which are intended | ||
# to run in the user's context should be run after this. | ||
session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open | ||
|
||
# Standard Un*x password updating. | ||
@include common-password |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
#%PAM-1.0 | ||
# pam_securetty.so is commented out since sshd already does a good job of | ||
# protecting itself. You may uncomment it if you like, but then you may | ||
# need to add additional consoles to /etc/securetty if you want to allow | ||
# root logins on them, such as: ssh, pts/0, :0, etc | ||
#auth required pam_securetty.so | ||
# When using pam_faillock, print a message to the user if the account is | ||
# locked. This lets the user know what is going on, but it also potentially | ||
# gives additional information to attackers: | ||
#auth requisite pam_faillock.so preauth | ||
auth include system-auth | ||
# To set a limit on failed authentications, the pam_faillock module | ||
# can be enabled. See pam_faillock(8) for more information. | ||
#auth [default=die] pam_faillock.so authfail | ||
#auth sufficient pam_faillock.so authsucc | ||
account required pam_nologin.so | ||
account include system-auth | ||
password include system-auth | ||
session include system-auth | ||
session include postlogin | ||
session required pam_loginuid.so | ||
-session optional pam_elogind.so | ||
# For restricted shell | ||
session [success=ignore default=1] pam_succeed_if.so shell = /bin/rbash | ||
session required pam_env.so envfile=/etc/restricted_env | ||
# Polyinstantiated (temp) directories | ||
session required pam_namespace.so |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters