| options/nixos/services.openssh.ports | Specifies on which ports the SSH daemon listens.
|
| options/nixos/services.openssh.sftpFlags | Commandline flags to add to sftp-server.
|
| options/nixos/services.openssh.banner | Message to display to the remote user before authentication is allowed.
|
| options/nixos/services.openssh.knownHosts | Alias of programs.ssh.knownHosts.
|
| options/nixos/services.openssh.package | OpenSSH package to use for sshd.
|
| options/nixos/services.openssh.enable | Whether to enable the OpenSSH secure shell daemon, which
allows secure remote logins.
|
| options/nixos/services.openssh.extraConfig | Verbatim contents of sshd_config.
|
| options/nixos/services.openssh.allowSFTP | Whether to enable the SFTP subsystem in the SSH daemon
|
| options/darwin/services.openssh.enable | Whether to enable Apple's built-in OpenSSH server
|
| options/nixos/services.openssh.settings | Configuration for sshd_config(5).
|
| options/nixos/services.endlessh.port | Specifies on which port the endlessh daemon listens for SSH
connections
|
| options/nixos/services.openssh.hostKeys | NixOS can automatically generate SSH host keys
|
| options/darwin/services.openssh.extraConfig | Extra configuration text loaded in sshd_config
|
| options/nixos/services.endlessh-go.port | Specifies on which port the endlessh-go daemon listens for SSH
connections
|
| options/nixos/services.openssh.moduliFile | Path to moduli file to install in
/etc/ssh/moduli
|
| options/nixos/services.openssh.openFirewall | Whether to automatically open the specified ports in the firewall.
|
| options/nixos/services.openssh.startWhenNeeded | If set, sshd is socket-activated; that
is, instead of having it permanently running as a daemon,
systemd will start an instance for each incoming connection.
|
| options/nixos/boot.initrd.network.ssh.enable | Start SSH service during initrd boot
|
| options/nixos/services.openssh.generateHostKeys | Whether to generate SSH host keys
|
| options/nixos/services.openssh.sftpServerExecutable | The sftp server executable
|
| options/nixos/services.openssh.authorizedKeysCommand | Specifies a program to be used to look up the user's public
keys
|
| options/nixos/services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| options/nixos/services.openssh.authorizedKeysCommandUser | Specifies the user under whose account the AuthorizedKeysCommand
is run
|
| options/nixos/services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| options/nixos/services.openssh.listenAddresses | List of addresses and ports to listen on (ListenAddress directive
in config)
|
| options/nixos/services.openssh.settings.DenyUsers | If specified, login is denied for all listed users
|
| options/nixos/services.openssh.settings.DenyGroups | If specified, login is denied for all users part of the listed
groups
|
| options/nixos/services.openssh.settings.UsePAM | Whether to enable PAM authentication.
|
| options/nixos/services.openssh.settings.Macs | Allowed MACs
Defaults to recommended settings from both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| options/nixos/services.openssh.listenAddresses.*.port | Port to listen to.
|
| options/nixos/services.openssh.listenAddresses.*.addr | Host, IPv4 or IPv6 address to listen to.
|
| options/nixos/services.openssh.knownHosts.<name>.publicKey | The public key data for the host
|
| options/nixos/services.openssh.knownHosts.<name>.extraHostNames | A list of additional host names and/or IP numbers used for
accessing the host's ssh service
|
| options/nixos/services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| options/nixos/services.openssh.settings.PrintMotd | Whether to enable printing /etc/motd when a user logs in interactively.
|
| options/nixos/services.openssh.settings.LogLevel | Gives the verbosity level that is used when logging messages from sshd(8)
|
| options/nixos/services.openssh.settings.AllowUsers | If specified, login is allowed only for the listed users
|
| options/nixos/services.openssh.settings.UseDns | Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
the remote IP address maps back to the very same IP address
|
| options/nixos/services.openssh.settings.Ciphers | Allowed ciphers
Defaults to recommended settings from both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| options/nixos/services.openssh.settings.StrictModes | Whether sshd should check file modes and ownership of directories
|
| options/nixos/services.openssh.settings.AcceptEnv | Specifies what environment variables sent by the client will be copied into the session's
environment
|
| options/nixos/services.openssh.knownHosts.<name>.publicKeyFile | The path to the public key file for the host
|
| options/nixos/services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.openssh.settings.PermitRootLogin | Whether the root user can login using ssh.
|
| options/nixos/services.openssh.settings.GatewayPorts | Specifies whether remote hosts are allowed to connect to
ports forwarded for the client
|
| options/nixos/services.openssh.settings.X11Forwarding | Whether to allow X11 connections to be forwarded.
|
| options/nixos/services.openssh.settings.KexAlgorithms | Allowed key exchange algorithms
Uses the lower bound recommended in both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| options/nixos/services.openssh.settings.AuthorizedPrincipalsFile | Specifies a file that lists principal names that are accepted for certificate authentication
|
| options/nixos/services.openssh.settings.PasswordAuthentication | Specifies whether password authentication is allowed.
|
| options/nixos/services.openssh.settings.KbdInteractiveAuthentication | Specifies whether keyboard-interactive authentication is allowed.
|
| options/nixos/services.sshd.enable | Alias of services.openssh.enable.
|
| options/nixos/services.slurm.enableSrunX11 | If enabled srun will accept the option "--x11" to allow for X11 forwarding
from within an interactive session or a batch job
|
| options/nixos/services.reaction.runAsRoot | Whether to run reaction as root
|
| options/nixos/services.fail2ban.jails | The configuration of each Fail2ban “jail”
|