summary refs log tree commit diff stats
diff options
context:
space:
mode:
authorene <ene@sils.li>2023-01-07 21:06:45 +0100
committerene <ene@sils.li>2023-01-07 21:06:45 +0100
commit78aae0bda1053235c0fc43556dbd0b58fd4aea8b (patch)
tree6745f07b44524b73ece4244e6318bdecdd10da9c
parentFormat: First formatting with Alejandra (diff)
downloadnixos-server-78aae0bda1053235c0fc43556dbd0b58fd4aea8b.tar.gz
nixos-server-78aae0bda1053235c0fc43556dbd0b58fd4aea8b.zip
Feat: Some security for ssh
Yes, root login is in itself a bad thing, but reducing the attack
surface somewhat should be a good first step to a bright future.
-rw-r--r--configuration.nix12
1 files changed, 9 insertions, 3 deletions
diff --git a/configuration.nix b/configuration.nix
index dd6b7a8..852a6ee 100644
--- a/configuration.nix
+++ b/configuration.nix
@@ -2,19 +2,25 @@
   imports = [
     ./hardware-configuration.nix
     ./packages.nix
-    ./networking.nix # generated at runtime by nixos-infect
+    ./networking.nix # network configuration that just works
   ];
 
   boot.cleanTmpDir = true;
   zramSwap.enable = true;
   networking.hostName = "server1";
   networking.domain = "vhack.eu";
-  services.openssh.enable = true;
+
+  # openssh config
+  services.openssh = {
+    enable = true;
+    passwordAuthentication = false;
+    extraConfig = "PrintMotd yes\n"; # this could be done with pam
+  };
   users.users.root.openssh.authorizedKeys.keys = [
-    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK2mYuiOuIb13E3wJRYPHOFN/dR5ySFozG2I/18HBSRJ dt@DESKTOP-IDOHVE"
     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGBFuTNNn71Rhfnop2cdz3r/RhWWlCePnSBOhTBbu2ME soispha"
     "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG63gxw8JePmrC8Fni0pLV4TnPBhCPmSV9FYEdva+6s7 sils"
   ];
 
   system.stateVersion = "22.11";
 }
+# vim: ts=2