summary refs log tree commit diff stats
path: root/services
diff options
context:
space:
mode:
authorene <ene@sils.li>2023-01-17 06:50:27 +0100
committerGitea <gitea@fake.local>2023-01-17 19:10:02 +0100
commitf0edcec82eadf7dc57ea0a12562717d40cff2cb6 (patch)
treeafaa6956d1df5a1444627647f98bc5500365d8c7 /services
parentMerge pull request 'Feat: Added /boot as persistent subvolume' (#10) from ser... (diff)
downloadnixos-server-f0edcec82eadf7dc57ea0a12562717d40cff2cb6.tar.gz
nixos-server-f0edcec82eadf7dc57ea0a12562717d40cff2cb6.zip
Sec: Persistent ssh host keys
I changed the valid ssh-host-keys from both rsa and ed25519 to
only ed25519 and moved them to `/srv/ssh` to make them persistent.
In addition to that, I also increased the rounds for the ed25519 key to
1000.
This fixes the ssh-host-key issue introduced by pull request #5.

Fixes: #5
Diffstat (limited to '')
-rw-r--r--services/opensshd.nix19
1 files changed, 19 insertions, 0 deletions
diff --git a/services/opensshd.nix b/services/opensshd.nix
new file mode 100644
index 0000000..4bd38fd
--- /dev/null
+++ b/services/opensshd.nix
@@ -0,0 +1,19 @@
+{ config, pkg, ... }: {
+  services.openssh = {
+    enable = true;
+    passwordAuthentication = false;
+    extraConfig = ''
+      PrintMotd yes
+    ''; # this could be done with pam
+    hostKeys = [{
+      comment = "key comment";
+      path = "/srv/sshd/ssh_host_ed25519_key";
+      rounds = 1000;
+      type = "ed25519";
+    }];
+  };
+  users.users.root.openssh.authorizedKeys.keys = [
+    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGBFuTNNn71Rhfnop2cdz3r/RhWWlCePnSBOhTBbu2ME soispha"
+    "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG63gxw8JePmrC8Fni0pLV4TnPBhCPmSV9FYEdva+6s7 sils"
+  ];
+}