nixos/modules/base/ssh.nix

38 lines
1.5 KiB
Nix
Raw Normal View History

2024-03-05 22:57:41 +01:00
{...}: {
2023-08-01 15:35:09 +02:00
services.openssh = {
enable = true;
settings = {
2024-03-05 22:17:26 +01:00
KbdInteractiveAuthentication = false;
2023-08-01 15:35:09 +02:00
PasswordAuthentication = false;
2024-03-05 22:17:26 +01:00
PermitRootLogin = "no";
2023-08-01 15:35:09 +02:00
};
};
users.users.caspervk = {
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPB/qr63FB0ZqOe/iZGwIKNHD8a1Ud/mXVjQPmpIG7pM caspervk@omega"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII71DKQziktCkyMAmL25QKRK6nG2uJDkQXioIZp5JkMZ caspervk@zeta"
];
};
2024-02-24 14:46:40 +01:00
# ssh-keyscan -t ed25519 alpha
2024-02-16 00:53:43 +01:00
programs.ssh.knownHosts = {
2024-02-24 15:36:07 +01:00
"alpha".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGOpQNEmmEe6jr7Mv37ozokvtTSd1I3SmUU1tpCSNTkc";
2024-02-24 14:46:40 +01:00
"delta".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB0x9oImZjIhoPEwLlHVixIh7y1Kwn+SX17xffrdRzvv";
"lambda".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEEd354UBnQi4xhjtJtKs4yVXuOkKY0svk+YHCm/pG46";
2024-03-28 17:43:24 +01:00
"sigma".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC4Kvx/lcFRvl7KlxqqhrJ32h3FzuzyLA5BNB42+p92c";
"sigma-old".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF2Qrh0tpR5YawiYvcPGC4OSnu4//ge1eVdiBDLrTbCx";
2024-02-24 14:46:40 +01:00
"tor".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMVPxvqwS2NMqqCGBkMmExzdBY5hGLegiOuqPJAOfdKk";
2024-02-16 00:53:43 +01:00
"git.caspervk.net".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAvPxSg6XN6znT1T4H0U1lzJBsGY7Uann+TBisWD3Drd";
};
2023-08-01 15:35:09 +02:00
environment.persistence."/nix/persist" = {
2023-08-01 16:55:53 +02:00
files = [
"/etc/ssh/ssh_host_ed25519_key"
"/etc/ssh/ssh_host_ed25519_key.pub"
"/etc/ssh/ssh_host_rsa_key"
"/etc/ssh/ssh_host_rsa_key.pub"
];
2023-08-01 15:35:09 +02:00
};
}