2010-02-01 18:05:02 +01:00
|
|
|
{ config, pkgs, ... }:
|
|
|
|
|
|
|
|
with pkgs.lib;
|
2009-03-06 13:26:08 +01:00
|
|
|
|
2007-01-07 11:19:16 +01:00
|
|
|
let
|
2009-03-06 13:26:08 +01:00
|
|
|
|
2010-03-11 18:02:49 +01:00
|
|
|
cfg = config.services.openssh;
|
2009-03-06 13:26:08 +01:00
|
|
|
|
|
|
|
nssModulesPath = config.system.nssModules.path;
|
2007-01-07 11:19:16 +01:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
sshdConfig = pkgs.writeText "sshd_config"
|
|
|
|
''
|
|
|
|
Protocol 2
|
|
|
|
|
|
|
|
UsePAM yes
|
|
|
|
|
2010-02-01 18:05:02 +01:00
|
|
|
${ concatMapStrings (port : ''Port ${toString port}
|
2009-12-10 15:45:41 +01:00
|
|
|
'') cfg.ports}
|
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
${if cfg.forwardX11 then "
|
|
|
|
X11Forwarding yes
|
|
|
|
XAuthLocation ${pkgs.xlibs.xauth}/bin/xauth
|
|
|
|
" else "
|
|
|
|
X11Forwarding no
|
|
|
|
"}
|
|
|
|
|
|
|
|
${if cfg.allowSFTP then "
|
2010-03-11 18:02:49 +01:00
|
|
|
Subsystem sftp ${pkgs.openssh}/libexec/sftp-server
|
2009-07-15 17:53:39 +02:00
|
|
|
" else "
|
|
|
|
"}
|
|
|
|
|
|
|
|
PermitRootLogin ${cfg.permitRootLogin}
|
|
|
|
GatewayPorts ${cfg.gatewayPorts}
|
|
|
|
'';
|
2007-01-07 11:19:16 +01:00
|
|
|
|
2009-08-19 17:04:05 +02:00
|
|
|
permitRootLoginCheck = v:
|
|
|
|
v == "yes" ||
|
|
|
|
v == "without-password" ||
|
|
|
|
v == "forced-commands-only" ||
|
|
|
|
v == "no";
|
2009-03-06 13:26:08 +01:00
|
|
|
|
2007-01-07 11:19:16 +01:00
|
|
|
in
|
2006-11-23 18:43:28 +01:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
{
|
2007-06-08 17:41:12 +02:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
2010-03-11 18:02:49 +01:00
|
|
|
services.openssh = {
|
2009-07-15 17:53:39 +02:00
|
|
|
|
|
|
|
enable = mkOption {
|
|
|
|
default = false;
|
|
|
|
description = ''
|
2010-03-11 18:02:49 +01:00
|
|
|
Whether to enable the OpenSSH secure shell daemon, which
|
|
|
|
allows secure remote logins.
|
2009-07-15 17:53:39 +02:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
forwardX11 = mkOption {
|
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
Whether to allow X11 connections to be forwarded.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
allowSFTP = mkOption {
|
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
Whether to enable the SFTP subsystem in the SSH daemon. This
|
|
|
|
enables the use of commands such as <command>sftp</command> and
|
|
|
|
<command>sshfs</command>.
|
|
|
|
'';
|
|
|
|
};
|
2006-11-23 18:43:28 +01:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
permitRootLogin = mkOption {
|
|
|
|
default = "yes";
|
2009-08-19 17:04:05 +02:00
|
|
|
check = permitRootLoginCheck;
|
2009-07-15 17:53:39 +02:00
|
|
|
description = ''
|
|
|
|
Whether the root user can login using ssh. Valid values are
|
|
|
|
<literal>yes</literal>, <literal>without-password</literal>,
|
|
|
|
<literal>forced-commands-only</literal> or
|
|
|
|
<literal>no</literal>.
|
2009-12-11 01:51:13 +01:00
|
|
|
If without-password doesn't work try <literal>yes</literal>.
|
2009-07-15 17:53:39 +02:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
gatewayPorts = mkOption {
|
|
|
|
default = "no";
|
|
|
|
description = ''
|
|
|
|
Specifies whether remote hosts are allowed to connect to
|
|
|
|
ports forwarded for the client. See
|
|
|
|
<citerefentry><refentrytitle>sshd_config</refentrytitle>
|
|
|
|
<manvolnum>5</manvolnum></citerefentry>.
|
|
|
|
'';
|
|
|
|
};
|
2009-12-10 15:45:41 +01:00
|
|
|
|
|
|
|
ports = mkOption {
|
|
|
|
default = [22];
|
|
|
|
description = ''
|
|
|
|
Specifies on which ports the SSH daemon listens.
|
|
|
|
'';
|
|
|
|
};
|
2009-07-15 17:53:39 +02:00
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
|
2010-03-11 18:02:49 +01:00
|
|
|
config = mkIf config.services.openssh.enable {
|
2009-07-15 17:53:39 +02:00
|
|
|
|
2010-02-01 18:05:02 +01:00
|
|
|
users.extraUsers = singleton
|
2010-03-11 18:02:49 +01:00
|
|
|
{ name = "opensshd";
|
2009-05-29 16:25:56 +02:00
|
|
|
uid = config.ids.uids.sshd;
|
2009-03-06 13:26:13 +01:00
|
|
|
description = "SSH privilege separation user";
|
|
|
|
home = "/var/empty";
|
2009-07-15 17:53:39 +02:00
|
|
|
};
|
2009-03-06 13:26:13 +01:00
|
|
|
|
2010-02-01 18:05:02 +01:00
|
|
|
environment.etc = singleton
|
2010-03-11 18:02:49 +01:00
|
|
|
{ source = "${pkgs.openssh}/etc/ssh/moduli";
|
2010-02-01 18:05:02 +01:00
|
|
|
target = "ssh/moduli";
|
|
|
|
};
|
|
|
|
|
2010-03-11 18:02:53 +01:00
|
|
|
jobs.sshd = {
|
2006-11-23 18:43:28 +01:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
description = "OpenSSH server";
|
2007-01-15 18:19:41 +01:00
|
|
|
|
2009-11-06 16:46:56 +01:00
|
|
|
startOn = "started network-interfaces";
|
2006-11-23 18:43:28 +01:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
environment = { LD_LIBRARY_PATH = nssModulesPath; };
|
2006-11-23 18:43:28 +01:00
|
|
|
|
2009-07-15 17:53:39 +02:00
|
|
|
preStart =
|
|
|
|
''
|
2009-03-06 13:26:08 +01:00
|
|
|
mkdir -m 0755 -p /etc/ssh
|
|
|
|
|
|
|
|
if ! test -f /etc/ssh/ssh_host_dsa_key; then
|
2010-03-11 18:02:49 +01:00
|
|
|
${pkgs.openssh}/bin/ssh-keygen -t dsa -b 1024 -f /etc/ssh/ssh_host_dsa_key -N ""
|
2009-03-06 13:26:08 +01:00
|
|
|
fi
|
2009-07-15 17:53:39 +02:00
|
|
|
'';
|
|
|
|
|
2009-11-06 16:46:56 +01:00
|
|
|
daemonType = "fork";
|
|
|
|
|
2010-03-11 18:02:49 +01:00
|
|
|
exec = "${pkgs.openssh}/sbin/sshd -h /etc/ssh/ssh_host_dsa_key -f ${sshdConfig}";
|
2009-07-15 17:53:39 +02:00
|
|
|
};
|
2009-03-06 13:26:08 +01:00
|
|
|
|
2010-02-01 18:05:02 +01:00
|
|
|
networking.firewall.allowedTCPPorts = cfg.ports;
|
2009-03-06 13:26:08 +01:00
|
|
|
};
|
2009-07-15 17:53:39 +02:00
|
|
|
|
2006-11-23 18:43:28 +01:00
|
|
|
}
|