From e30a7a6cebce788bca90a22693ef514fd76f153b Mon Sep 17 00:00:00 2001 From: Christian Poessinger Date: Fri, 11 May 2018 17:19:29 +0200 Subject: T631: Rewrite SSH configuration as XML interface definition --- Makefile | 3 + interface-definitions/ssh.xml | 183 +++++++++++++++++++++++++++++++++++++++ src/conf-mode/vyos-config-ssh.py | 67 ++++++++++++++ 3 files changed, 253 insertions(+) create mode 100644 interface-definitions/ssh.xml create mode 100755 src/conf-mode/vyos-config-ssh.py diff --git a/Makefile b/Makefile index ee89a5608..d194b44e4 100644 --- a/Makefile +++ b/Makefile @@ -20,6 +20,9 @@ interface_definitions: sed -i '/^type: txt/d' $(TMPL_DIR)/system/ntp/server/node.tag/noselect/node.def sed -i '/^type: txt/d' $(TMPL_DIR)/system/ntp/server/node.tag/preempt/node.def sed -i '/^type: txt/d' $(TMPL_DIR)/system/ntp/server/node.tag/prefer/node.def + sed -i '/^type: txt/d' $(TMPL_DIR)/service/ssh/allow-root/node.def + sed -i '/^type: txt/d' $(TMPL_DIR)/service/ssh/disable-host-validation/node.def + sed -i '/^type: txt/d' $(TMPL_DIR)/service/ssh/disable-password-authentication/node.def .PHONY: all all: interface_definitions diff --git a/interface-definitions/ssh.xml b/interface-definitions/ssh.xml new file mode 100644 index 000000000..9965dd69e --- /dev/null +++ b/interface-definitions/ssh.xml @@ -0,0 +1,183 @@ + + + + + + + + + + Secure SHell (SSH) protocol + 500 + + + + + SSH user/group access controls + + + + + Configure sshd_config access control for allowed groups + + + + + Configure sshd_config access control for allowed users + + + + + Configure sshd_config access control for disallowed groups + + + + + Configure sshd_config access control for disallowed users + + + + + + + Enable root login over ssh + + + + + Allowed ciphers + + chacha20-poly1305@openssh.com + ChaCha20 Poly1305 + + + 3des-cbc + 3DES CBC (weak) + + + aes128-cbc + AES 128 CBC + + + aes192-cbc + AES 192 CBC + + + aes256-cbc + AES 256 CBC + + + aes128-ctr + AES 128 CTR + + + aes192-ctr + AES 192 CTR + + + aes256-ctr + AES 256 CTR + + + arcfour128 + AC4 128 (broken) + + + arcfour256 + AC4 256 (broken) + + + arcfour + AC4 (broken) + + + blowfish-cbc + Blowfish CBC + + + cast128-cbc + CAST 128 CBC + + + + + + Don't validate the remote host name with DNS + + + + + Don't allow unknown user to login with password + + + + + Key exchange algorithms + + + + + + + + Local addresses SSH service should listen on + + ipv4 + IP address to listen for incoming connections + + + ipv6 + IPv6 address to listen for incoming connections + + ipv4,ipv6 + + + + + + Log level + + QUIET + stay silent + + + FATAL + log fatals only + + + ERROR + log errors and fatals only + + + INFO + default log level + + + VERBOSE + enable logging of failed login attempts + + + + + + Allowed message authentication algorithms + + + + + + + + Port for SSH service + + u32:1-65535 + Numeric IP port + + u32 + + + + + + + diff --git a/src/conf-mode/vyos-config-ssh.py b/src/conf-mode/vyos-config-ssh.py new file mode 100755 index 000000000..e91e829b2 --- /dev/null +++ b/src/conf-mode/vyos-config-ssh.py @@ -0,0 +1,67 @@ +#!/usr/bin/env python3 +# +# Copyright (C) 2018 VyOS maintainers and contributors +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License version 2 or later as +# published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see . +# +# + +import sys +import os +import time + +from vyos.config import Config +from vyos.util import ConfigError + +config_file = r'/etc/ssh/sshd_config' + +def get_config(): + ssh = {} + conf = Config() + conf.set_level('service ssh') + if not conf.exists(''): + return ssh + + return ssh + +def verify(ssh): + return None + +def generate(ssh): + config_header = '### Autogenerated by vyos-config-ssh.py on {tm} ###\n'.format(tm=time.strftime("%a, %d %b %Y %H:%M:%S", time.localtime())) + + # write new configuration file + f = open(config_file, 'w') + f.write(config_header) + f.write('\n') + f.close() + return None + +def apply(ssh): + if len(ssh) == 0: + cmd = "sudo systemctl stop ssh" + else: + cmd = "sudo systemctl start ssh" + + os.system(cmd) + return None + +if __name__ == '__main__': + try: + c = get_config() + verify(c) + generate(c) + apply(c) + except ConfigError as e: + print(e) + sys.exit(1) -- cgit v1.2.3