Produced by Araxis Merge on 5/14/2018 1:18:39 PM Eastern Daylight Time. See www.araxis.com for information about Merge. This report uses XHTML and CSS2, and is best viewed with a modern standards-compliant browser. For optimum results when printing this report, use landscape orientation and enable printing of background images and colours in your browser.
| # | Location | File | Last Modified |
|---|---|---|---|
| 1 | MCCF_EDI_TAS_Infrastructure.zip\MCCF_EDI_TAS_Infrastructure\mag_sys_build\testing-playbooks | ssh.yml | Tue Mar 27 23:51:12 2018 UTC |
| 2 | MCCF_EDI_TAS_Infrastructure.zip\MCCF_EDI_TAS_Infrastructure\mag_sys_build\testing-playbooks | ssh.yml | Tue May 8 03:19:31 2018 UTC |
| Description | Between Files 1 and 2 |
|
|---|---|---|
| Text Blocks | Lines | |
| Unchanged | 2 | 558 |
| Changed | 1 | 2 |
| Inserted | 0 | 0 |
| Removed | 0 | 0 |
| Whitespace | |
|---|---|
| Character case | Differences in character case are significant |
| Line endings | Differences in line endings (CR and LF characters) are ignored |
| CR/LF characters | Not shown in the comparison detail |
No regular expressions were active.
| 1 | # Ansible Playbook | |
| 2 | # Erik van Oudheusde n PII - 28 Sep 2 017 | |
| 3 | # | |
| 4 | # Configur e OpenSSH Server if Necessary | |
| 5 | # | |
| 6 | # 2 Octobe r 2017 - C ommented o ut below f or Centrif y testing | |
| 7 | ||
| 8 | --- | |
| 9 | - name: Co nfigure Op enSSH Serv er if Nece ssary | |
| 10 | #hosts: rhel7 | |
| 11 | hosts: t esting | |
| 12 | become: yes | |
| 13 | vars: | |
| 14 | sshdCo nfigFiles: | |
| 15 | - /e tc/ssh/ssh d_config | |
| 16 | - /e tc/centrif ydc/ssh/ss hd_config | |
| 17 | tasks: | |
| 18 | - name: latest ssh d version installed | |
| 19 | yum: | |
| 20 | name : openssh- server | |
| 21 | stat e: latest | |
| 22 | - name: Delete exi sting issu e banner | |
| 23 | file: path=/etc/ issue | |
| 24 | stat e=absent | |
| 25 | - name: Delete exi sting issu e.net bann er | |
| 26 | file: path=/etc/ issue.net | |
| 27 | stat e=absent | |
| 28 | - name: edit issue banner | |
| 29 | blocki nfile: | |
| 30 | path : /etc/iss ue.net | |
| 31 | crea te: yes | |
| 32 | back up: yes | |
| 33 | mark er: "Secur ity Warnin g!" | |
| 34 | owne r: root | |
| 35 | grou p: root | |
| 36 | mode : 0644 | |
| 37 | cont ent: | | |
| 38 | Se curity War ning! | |
| 39 | ||
| 40 | Th is U.S. go vernment s ystem is i ntended to be used b y authoriz ed VA netw ork | |
| 41 | us ers for vi ewing and retrieving informati on only ex cept as ot herwise ex plicitly | |
| 42 | au thorized. VA informa tion resid es on and transmits through co mputer sys tems and | |
| 43 | ne tworks fun ded by the VA. All u se is cons idered to be with an understan ding and | |
| 44 | ac ceptance t hat there is no reas onable exp ectation o f privacy for any da ta or | |
| 45 | tr ansmission s on Gover nment Intr anet or Ex tranet (no n-public) networks o r systems. | |
| 46 | ||
| 47 | Al l transact ions that occur on t his system and all d ata transm itted thro ugh this | |
| 48 | sy stem are s ubject to review and action in cluding (b ut not lim ited to) | |
| 49 | mo nitoring- recording- retrievin g- coping- auditing- inspectin g- investi gating- | |
| 50 | re stricting access- bl ocking- tr acking- di sclosing t o authoriz ed personn el or any | |
| 51 | ot her author ized actio ns by all authorized VA and la w enforcem ent person nel. | |
| 52 | ||
| 53 | Al l use of t his system constitut es underst anding and unconditi onal accep tance | |
| 54 | of these ter ms., Unaut horized at tempts or acts to ei ther | |
| 55 | (1 ) access- upload- ch ange- or d elete info rmation on this syst em | |
| 56 | (2 ) modify t his system | |
| 57 | (3 ) deny acc ess to thi s system o r | |
| 58 | (4 ) accrue r esources f or unautho rized use on this sy stem are s trictly pr ohibited. | |
| 59 | Su ch attempt s or acts are subjec t to actio n that may result in criminal civil | |
| 60 | or administr ative pena lties. | |
| 61 | ||
| 62 | - name: create sym link to i ssue banne r | |
| 63 | file: | |
| 64 | src: /etc/issu e.net | |
| 65 | dest : /etc/iss ue | |
| 66 | owne r: root | |
| 67 | grou p: root | |
| 68 | stat e: link | |
| 69 | - name: Set ssh pr otocol to 2 | |
| 70 | linein file: | |
| 71 | back up: yes | |
| 72 | inse rtafter: " #?ListenAd dress [^0- 2]{1,3}" | |
| 73 | line : 'Protoco l 2' | |
| 74 | path : "{{ item }}" | |
| 75 | with_i tems: "{{ sshdConfig Files }}" | |
| 76 | # - name: Disable S SH Support for Rhost s RSA Auth entication | |
| 77 | # linei nfile: | |
| 78 | # pat h: "{{ ite m }}" | |
| 79 | # ins ertafter: "Protocol 2" | |
| 80 | # lin e: 'Rhosts RSAAuthent ication no ' | |
| 81 | # with_ items: "{{ sshdConfi gFiles }}" | |
| 82 | - name: Disable ro ot logon | |
| 83 | linein file: | |
| 84 | back refs: yes | |
| 85 | rege xp: '^#?Pe rmitRootLo gin yes' | |
| 86 | line : 'PermitR ootLogin n o' | |
| 87 | path : "{{ item }}" | |
| 88 | with_i tems: "{{ sshdConfig Files }}" | |
| 89 | - name: Set logon banner | |
| 90 | linein file: | |
| 91 | back refs: yes | |
| 92 | rege xp: '^#?Ba nner none' | |
| 93 | line : 'Banner /etc/issue ' | |
| 94 | path : "{{ item }}" | |
| 95 | with_i tems: "{{ sshdConfig Files }}" | |
| 96 | - name: Print last logon | |
| 97 | linein file: | |
| 98 | back refs: yes | |
| 99 | rege xp: '^#Pri ntLastLog yes' | |
| 100 | line : 'PrintLa stLog yes' | |
| 101 | path : "{{ item }}" | |
| 102 | with_i tems: "{{ sshdConfig Files }}" | |
| 103 | - name: Permit Use r Environm ent | |
| 104 | linein file: | |
| 105 | back refs: yes | |
| 106 | rege xp: '^#Per mitUserEnv ironment n o' | |
| 107 | line : 'PermitU serEnviron ment no' | |
| 108 | path : "{{ item }}" | |
| 109 | with_i tems: "{{ sshdConfig Files }}" | |
| 110 | - name: Enable GSS API Authen tication | |
| 111 | linein file: | |
| 112 | back refs: yes | |
| 113 | rege xp: '^GSSA PIAuthenti cation yes ' | |
| 114 | line : 'GSSAPIA uthenticat ion yes' | |
| 115 | path : "{{ item }}" | |
| 116 | with_i tems: "{{ sshdConfig Files }}" | |
| 117 | - name: Permit Ker beros Auth entication | |
| 118 | linein file: | |
| 119 | back refs: yes | |
| 120 | rege xp: '^#?Ke rberosAuth entication no' | |
| 121 | line : 'Kerbero sAuthentic ation yes' | |
| 122 | path : "{{ item }}" | |
| 123 | with_i tems: "{{ sshdConfig Files }}" | |
| 124 | - name: Enable Cha llengeResp onseAuthen tication # added for Centrify | |
| 125 | linein file: | |
| 126 | back refs: yes | |
| 127 | rege xp: '^Chal lengeRespo nseAuthent ication' | |
| 128 | line : 'Challen geResponse Authentica tion yes' | |
| 129 | path : "{{ item }}" | |
| 130 | with_i tems: "{{ sshdConfig Files }}" | |
| 131 | - name: Enable Use of StictM odes | |
| 132 | linein file: | |
| 133 | back refs: yes | |
| 134 | rege xp: '^#Str ictModes y es' | |
| 135 | line : 'StrictM odes yes' | |
| 136 | path : "{{ item }}" | |
| 137 | with_i tems: "{{ sshdConfig Files }}" | |
| 138 | - name: Disable Co mpression Or Set Com pression t o delayed | |
| 139 | linein file: | |
| 140 | back refs: yes | |
| 141 | rege xp: '^#Com pression d elayed' | |
| 142 | line : 'Compres sion delay ed' | |
| 143 | path : "{{ item }}" | |
| 144 | with_i tems: "{{ sshdConfig Files }}" | |
| 145 | - name: Set SSH Id le Timeout Interval | |
| 146 | linein file: | |
| 147 | back refs: yes | |
| 148 | rege xp: '^#Cli entAliveIn terval 0' | |
| 149 | line : 'ClientA liveInterv al 900' | |
| 150 | path : "{{ item }}" | |
| 151 | with_i tems: "{{ sshdConfig Files }}" | |
| 152 | - name: Set SSH Cl ient Alive Count | |
| 153 | linein file: | |
| 154 | back refs: yes | |
| 155 | rege xp: '^#Cli entAliveCo untMax 3' | |
| 156 | line : 'ClientA liveCountM ax 10' | |
| 157 | path : "{{ item }}" | |
| 158 | with_i tems: "{{ sshdConfig Files }}" | |
| 159 | - name: Disable SS H Access v ia Empty P asswords | |
| 160 | linein file: | |
| 161 | back refs: yes | |
| 162 | rege xp: '^#Per mitEmptyPa sswords no ' | |
| 163 | line : 'PermitE mptyPasswo rds no' | |
| 164 | path : "{{ item }}" | |
| 165 | with_i tems: "{{ sshdConfig Files }}" | |
| 166 | - name: Set loggin g to info | |
| 167 | linein file: | |
| 168 | back refs: yes | |
| 169 | rege xp: '^#Log Level INFO ' | |
| 170 | line : 'LogLeve l INFO' | |
| 171 | path : "{{ item }}" | |
| 172 | with_i tems: "{{ sshdConfig Files }}" | |
| 173 | - name: Use Only A pproved Ci phers Comm ent | |
| 174 | linein file: | |
| 175 | inse rtafter: " # Ciphers and keying " | |
| 176 | line : '#Use on ly fips ce rtified ci phers' | |
| 177 | path : "{{ item }}" | |
| 178 | with_i tems: "{{ sshdConfig Files }}" | |
| 179 | - name: Insert App roved FIPS Ciphers | |
| 180 | linein file: | |
| 181 | inse rtafter: " #Use only fips certi fied ciphe rs" | |
| 182 | line : 'Ciphers aes128-ct r,aes192-c tr,aes256- ctr,aes128 -cbc,3des- cbc,aes192 -cbc,aes25 6-cbc' | |
| 183 | path : "{{ item }}" | |
| 184 | with_i tems: "{{ sshdConfig Files }}" | |
| 185 | - name: Use Only F IPS Approv ed MACs Co mment | |
| 186 | linein file: | |
| 187 | inse rtafter: " Ciphers ae s128-ctr,a es192-ctr, aes256-ctr ,aes128-cb c,3des-cbc ,aes192-cb c,aes256-c bc" | |
| 188 | line : '#Disabl e MD5 MACs algorithm s' | |
| 189 | path : "{{ item }}" | |
| 190 | with_i tems: "{{ sshdConfig Files }}" | |
| 191 | - name: Use Only F IPS Approv ed MACs | |
| 192 | linein file: | |
| 193 | inse rtafter: " #Disable M D5 MACs al gorithms" | |
| 194 | line : 'MACs hm ac-sha2-51 2,hmac-sha 2-256,hmac -sha1' | |
| 195 | path : "{{ item }}" | |
| 196 | with_i tems: "{{ sshdConfig Files }}" | |
| 197 | - name: Enable Use of Privil ege Separa tion Comme nt | |
| 198 | linein file: | |
| 199 | inse rtafter: " MACs hmac- sha2-512,h mac-sha2-2 56,hmac-sh a1" | |
| 200 | line : '#Enable Use of Pr ivilege Se paration' | |
| 201 | path : "{{ item }}" | |
| 202 | with_i tems: "{{ sshdConfig Files }}" | |
| 203 | - name: Enable Use of Privil ege Separa tion | |
| 204 | linein file: | |
| 205 | inse rtafter: " #Enable Us e of Privi lege Separ ation" | |
| 206 | line : 'UsePriv ilegeSepar ation yes' | |
| 207 | path : "{{ item }}" | |
| 208 | with_i tems: "{{ sshdConfig Files }}" | |
| 209 | - name: Display la st login u pon succes sful login | |
| 210 | linein file: | |
| 211 | path : /etc/pam .d/sshd | |
| 212 | inse rtafter: " #%PAM-1.0" | |
| 213 | line : 'session requir ed pam _lastlog.s o showfail ed' | |
| 214 | - name: Do not per mit RSA Ho st Authent ication | |
| 215 | linein file: | |
| 216 | back refs: yes | |
| 217 | rege xp: '^#Ign oreRhosts yes' | |
| 218 | line : 'IgnoreR hosts yes' | |
| 219 | path : "{{ item }}" | |
| 220 | with_i tems: "{{ sshdConfig Files }}" | |
| 221 | - name: Do not per mit Known Host Authe ntication | |
| 222 | linein file: | |
| 223 | back refs: yes | |
| 224 | rege xp: '^#Ign oreUserKno wnHosts no ' | |
| 225 | line : 'IgnoreU serKnownHo sts yes' | |
| 226 | path : "{{ item }}" | |
| 227 | with_i tems: "{{ sshdConfig Files }}" | |
| 228 | # - name: Do not pe rmit RSA H ost Authen tication | |
| 229 | # linei nfile: | |
| 230 | # bac krefs: yes | |
| 231 | # reg exp: '^#Rh ostsRSAAut henticatio n no' | |
| 232 | # lin e: 'Rhosts RSAAuthent ication ye s' | |
| 233 | # pat h: "{{ ite m }}" | |
| 234 | # with_ items: "{{ sshdConfi gFiles }}" | |
| 235 | - name: Do not all ow untrust ed host SS H logon | |
| 236 | linein file: | |
| 237 | back refs: yes | |
| 238 | rege xp: '^#Hos tbasedAuth entication no' | |
| 239 | line : 'Hostbas edAuthenti cation no' | |
| 240 | path : "{{ item }}" | |
| 241 | with_i tems: "{{ sshdConfig Files }}" | |
| 242 | - name: SSH enable d and runn ing | |
| 243 | servic e: | |
| 244 | name : sshd | |
| 245 | enab led: true | |
| 246 | stat e: started | |
| 247 | ||
| 248 | # - name: edit issu e banner | |
| 249 | # block infile: | |
| 250 | # pat h: /etc/is sue.net | |
| 251 | # cre ate: yes | |
| 252 | # bac kup: yes | |
| 253 | # mar ker: "Secu rity Warni ng!" | |
| 254 | # own er: root | |
| 255 | # gro up: root | |
| 256 | # mod e: 0644 | |
| 257 | # con tent: | | |
| 258 | # V A systems are intend ed to be u sed by aut horized VA network u sers for v iewing and | |
| 259 | # r etrieving informatio n only exc ept as oth erwise exp licitly au thorized f or officia l | |
| 260 | # b usiness an d limited personal u se under V A policy. | |
| 261 | # | |
| 262 | # I nformation from this system re sides on a nd transmi ts through computer systems an d | |
| 263 | # n etworks fu nded by th e VA. All access or use const itutes und erstanding and accep tance | |
| 264 | # t hat there is no reas onable exp ectation o f privacy in the use of Govern ment netwo rks | |
| 265 | # o r systems. All acce ss or use of this sy stem const itutes use r understa nding and | |
| 266 | # a cceptance of these t erms and c onstitutes unconditi onal conse nt to revi ew and act ion | |
| 267 | # i ncluding ( but not li mited to) monitoring recording copying a uditing in specting | |
| 268 | # i nvestigati ng restric ting acces s blocking tracking disclosin g to autho rized pers onnel | |
| 269 | # o r any othe r authoriz ed actions by all au thorized V A and law enforcemen t personne l. | |
| 270 | # | |
| 271 | # U nauthorize d user att empts or a cts to | |
| 272 | # ( 1) access upload dow nload chan ge or dele te informa tion on th is system | |
| 273 | # ( 2) modify this syste m | |
| 274 | # ( 3) deny ac cess to th is system | |
| 275 | # ( 4) accrue resources for unauth orized use or | |
| 276 | # ( 5) otherwi se misuse this syste m are stri ctly prohi bited. | |
| 277 | # S uch attemp ts or acts are subje ct to acti on that ma y result i n | |
| 278 | # c riminal ci vil or adm inistrativ e penaltie s. | |
| 279 | # | |
| 280 |
Araxis Merge (but not the data content of this report) is Copyright © 1993-2016 Araxis Ltd (www.araxis.com). All rights reserved.