|
|
@@ -122,15 +122,16 @@ var ( |
|
|
|
CreateAuthorizedKeysFile bool `ini:"SSH_CREATE_AUTHORIZED_KEYS_FILE"` |
|
|
|
ExposeAnonymous bool `ini:"SSH_EXPOSE_ANONYMOUS"` |
|
|
|
}{ |
|
|
|
Disabled: false, |
|
|
|
StartBuiltinServer: false, |
|
|
|
Domain: "", |
|
|
|
Port: 22, |
|
|
|
ServerCiphers: []string{"aes128-ctr", "aes192-ctr", "aes256-ctr", "aes128-gcm@openssh.com", "arcfour256", "arcfour128"}, |
|
|
|
ServerKeyExchanges: []string{"diffie-hellman-group1-sha1", "diffie-hellman-group14-sha1", "ecdh-sha2-nistp256", "ecdh-sha2-nistp384", "ecdh-sha2-nistp521", "curve25519-sha256@libssh.org"}, |
|
|
|
ServerMACs: []string{"hmac-sha2-256-etm@openssh.com", "hmac-sha2-256", "hmac-sha1", "hmac-sha1-96"}, |
|
|
|
KeygenPath: "ssh-keygen", |
|
|
|
MinimumKeySizes: map[string]int{"ed25519": 256, "ecdsa": 256, "rsa": 2048, "dsa": 1024}, |
|
|
|
Disabled: false, |
|
|
|
StartBuiltinServer: false, |
|
|
|
Domain: "", |
|
|
|
Port: 22, |
|
|
|
ServerCiphers: []string{"aes128-ctr", "aes192-ctr", "aes256-ctr", "aes128-gcm@openssh.com", "arcfour256", "arcfour128"}, |
|
|
|
ServerKeyExchanges: []string{"diffie-hellman-group1-sha1", "diffie-hellman-group14-sha1", "ecdh-sha2-nistp256", "ecdh-sha2-nistp384", "ecdh-sha2-nistp521", "curve25519-sha256@libssh.org"}, |
|
|
|
ServerMACs: []string{"hmac-sha2-256-etm@openssh.com", "hmac-sha2-256", "hmac-sha1", "hmac-sha1-96"}, |
|
|
|
KeygenPath: "ssh-keygen", |
|
|
|
MinimumKeySizeCheck: true, |
|
|
|
MinimumKeySizes: map[string]int{"ed25519": 256, "ecdsa": 256, "rsa": 2048}, |
|
|
|
} |
|
|
|
|
|
|
|
// Security settings |
|
|
@@ -679,7 +680,7 @@ func NewContext() { |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
SSH.MinimumKeySizeCheck = sec.Key("MINIMUM_KEY_SIZE_CHECK").MustBool() |
|
|
|
SSH.MinimumKeySizeCheck = sec.Key("MINIMUM_KEY_SIZE_CHECK").MustBool(SSH.MinimumKeySizeCheck) |
|
|
|
minimumKeySizes := Cfg.Section("ssh.minimum_key_sizes").Keys() |
|
|
|
for _, key := range minimumKeySizes { |
|
|
|
if key.MustInt() != -1 { |
|
|
|