Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@
collections/
roles/cloudalchemy.grafana/
roles/dev-sec.os-hardening/
roles/dev-sec.ssh-hardening/
roles/galaxyproject.galaxy/
roles/galaxyproject.nginx/
roles/galaxyproject.cvmfs/
Expand Down
7 changes: 5 additions & 2 deletions all.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
---
- name: Manage authorized SSH keys
- name: Configure SSH service and manage authorized keys
hosts: all
gather_facts: false
gather_facts: true
roles:
- role: usegalaxy_eu.ssh_manager
- ssh-host-sign
- role: devsec.hardening.ssh_hardening
become: true
1 change: 0 additions & 1 deletion apollo.yml
Original file line number Diff line number Diff line change
Expand Up @@ -45,4 +45,3 @@
# END custom
- dj-wasabi.telegraf
# - dev-sec.os-hardening
# - dev-sec.ssh-hardening
2 changes: 0 additions & 2 deletions beacon.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,6 @@
- group_vars/beacon/vars.yml
- group_vars/beacon/vault.yml
vars:
collections:
- devsec.hardening
roles:
- role: usegalaxy_eu.handy.os_setup
vars:
Expand Down
2 changes: 0 additions & 2 deletions build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,6 @@
loop:
- http
- https
collections:
- devsec.hardening
roles:
- hostname
- usegalaxy-eu.dynmotd
Expand Down
4 changes: 0 additions & 4 deletions cvmfs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,6 @@
- "secret_group_vars/all.yml"
- mounts/mountpoints.yml
- mounts/dest/all.yml
collections:
- devsec.hardening
pre_tasks:
- name: Set default version of Python
alternatives:
Expand Down Expand Up @@ -51,7 +49,6 @@
- dj-wasabi.telegraf
# hardening
- os_hardening
- ssh_hardening

#
# - hostname
Expand All @@ -69,4 +66,3 @@
# # END custom
# - dj-wasabi.telegraf
# - dev-sec.os-hardening
# - dev-sec.ssh-hardening
1 change: 0 additions & 1 deletion galaxy-test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -149,4 +149,3 @@
# Some of our 'cleanups' also generate telegraf format so this goes at end.
- dj-wasabi.telegraf
#- dev-sec.os-hardening
- dev-sec.ssh-hardening
1 change: 0 additions & 1 deletion grafana.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@
name:
- git
collections:
- devsec.hardening
- grafana.grafana
roles:
## Starting configuration of the operating system
Expand Down
11 changes: 11 additions & 0 deletions group_vars/all/ssh-host-sign.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
ssh_host_sign_keys:
- key: /etc/ssh/ssh_host_rsa_key.pub
certificate: /etc/ssh/ssh_host_rsa_key-cert.pub

- key: /etc/ssh/ssh_host_ecdsa_key.pub
certificate: /etc/ssh/ssh_host_ecdsa_key-cert.pub

- key: /etc/ssh/ssh_host_ed25519_key.pub
certificate: /etc/ssh/ssh_host_ed25519_key-cert.pub

ssh_host_sign_cert_domains_ips: "*.galaxyproject.eu,*.usegalaxy.eu,*.bi.privat,192.52.33.*,192.52.32.*,10.4.68.*,10.5.68.*,10.5.67.*"
5 changes: 5 additions & 0 deletions group_vars/all/ssh_hardening.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
ssh_host_certificates: "{{ ssh_host_sign_keys | map(attribute='certificate') }}"
ssh_permit_root_login: "without-password"
ssh_use_pam: true
sftp_enabled: true
ssh_client_alive_interval: 600
25 changes: 0 additions & 25 deletions group_vars/all/vars.yml
Original file line number Diff line number Diff line change
Expand Up @@ -64,9 +64,6 @@ nginx_selinux_allow_local_connections: true
#nginx_servers:
# - redirect-ssl

# Allow root login on all machines - TBD
ssh_allow_root_with_key: true

redis_connection_string: "redis://:{{ redis_requirepass }}@mq02.galaxyproject.eu:6379/0"
# Chrony
chrony_server: 'time.ruf.uni-freiburg.de iburst'
Expand Down Expand Up @@ -168,28 +165,6 @@ au_random_sleep: 360
sysctl_config:
net.ipv6.conf.all.disable_ipv6: 0

# SSH

# ALL hosts should have signed SSH keys.
# ssh-host-(re)sign role
ssh_host_key_cert_files:
- /etc/ssh/ssh_host_rsa_key-cert.pub
- /etc/ssh/ssh_host_ecdsa_key-cert.pub
- /etc/ssh/ssh_host_ed25519_key-cert.pub

# dev-sec.ssh-hardening role
# Allow root login on all machines
ssh_permit_root_login: "without-password"
sshd_custom_options:
- "HostCertificate {{ ssh_host_key_cert_files[0] }}"
- "HostCertificate {{ ssh_host_key_cert_files[1] }}"
- "HostCertificate {{ ssh_host_key_cert_files[2] }}"
# Anything else prevents more login
ssh_use_pam: true
# Required if you want to run ansible more than once.
sftp_enabled: true
ssh_client_alive_interval: 600

# Apollo env vars
apollo_env: "GALAXY_WEBAPOLLO_URL={{ GALAXY_WEBAPOLLO_URL }} GALAXY_WEBAPOLLO_USER={{ GALAXY_WEBAPOLLO_USER }} GALAXY_WEBAPOLLO_PASSWORD={{ GALAXY_WEBAPOLLO_PASSWORD }} GALAXY_WEBAPOLLO_EXT_URL={{ GALAXY_WEBAPOLLO_EXT_URL }} GALAXY_SHARED_DIR={{ GALAXY_SHARED_DIR }} GALAXY_APOLLO_ORG_SUFFIX=id"

Expand Down
1 change: 1 addition & 0 deletions host_vars/apps.galaxyproject.eu.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
ssh_server_ports: ["8080"]
2 changes: 0 additions & 2 deletions incoming.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,6 @@
- secret_group_vars/all.yml
- mounts/mountpoints.yml
- mounts/dest/all.yml
collections:
- devsec.hardening
pre_tasks:
- name: Set timezone to Europe/Berlin
community.general.timezone:
Expand Down
2 changes: 0 additions & 2 deletions influxdb.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,8 +39,6 @@
ansible.builtin.service:
name: firewalld
state: reloaded
collections:
- devsec.hardening
roles:
## Starting configuration of the operating system
- geerlingguy.swap
Expand Down
2 changes: 0 additions & 2 deletions maintenance.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,6 @@
- secret_group_vars/all.yml
- mounts/dest/all.yml
- mounts/mountpoints.yml
collections:
- devsec.hardening
handlers:
- name: restart rsyslog
service:
Expand Down
2 changes: 0 additions & 2 deletions mq.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,6 @@
- secret_group_vars/all.yml
- secret_group_vars/aws.yml # AWS creds
- secret_group_vars/pulsar.yml # Pulsar + MQ Connections
collections:
- devsec.hardening
pre_tasks:
# - name: Set default version of Python
# alternatives:
Expand Down
1 change: 0 additions & 1 deletion one-off/cvmfs-stratum0.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,4 +30,3 @@
# END custom
- dj-wasabi.telegraf
# - dev-sec.os-hardening
# - dev-sec.ssh-hardening
1 change: 0 additions & 1 deletion one-off/denbi-stratum0.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,4 +29,3 @@
# END custom
- dj-wasabi.telegraf
#- dev-sec.os-hardening
#- dev-sec.ssh-hardening
1 change: 0 additions & 1 deletion one-off/hicbrowser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,3 @@
# END custom
- dj-wasabi.telegraf
- dev-sec.os-hardening
- dev-sec.ssh-hardening
1 change: 0 additions & 1 deletion one-off/job-working-dir.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,4 +19,3 @@
# END custom
- dj-wasabi.telegraf
- dev-sec.os-hardening
- dev-sec.ssh-hardening
1 change: 0 additions & 1 deletion one-off/org-jenkins-nodes.yml
Original file line number Diff line number Diff line change
Expand Up @@ -45,4 +45,3 @@
- hxr.monitor-email
- influxdata.chrony
- dev-sec.os-hardening
- dev-sec.ssh-hardening
1 change: 0 additions & 1 deletion one-off/ssds1.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,4 +15,3 @@
- geerlingguy.nfs
- linuxhq.yum_cron
- dev-sec.os-hardening
- dev-sec.ssh-hardening
2 changes: 0 additions & 2 deletions plausible.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,6 @@
vars_files:
- secret_group_vars/all.yml
- secret_group_vars/plausible.yml
collections:
- devsec.hardening
roles:
- hostname
- usegalaxy-eu.dynmotd
Expand Down
2 changes: 0 additions & 2 deletions proxy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,6 @@
hostname: proxy.galaxyproject.eu
vars_files:
- secret_group_vars/all.yml
collections:
- devsec.hardening
pre_tasks:
- name: Set default version of Python
alternatives:
Expand Down
2 changes: 0 additions & 2 deletions requirements.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -55,8 +55,6 @@ collections:
roles:
- name: dev-sec.os-hardening
version: 4.2.0
- name: dev-sec.ssh-hardening
version: 9.7.0
- name: devops.tomcat7
version: 1.0.0
- name: dj-wasabi.telegraf
Expand Down
7 changes: 0 additions & 7 deletions resign-keys.yml

This file was deleted.

89 changes: 0 additions & 89 deletions roles/ssh-host-resign/files/server_ca

This file was deleted.

1 change: 0 additions & 1 deletion roles/ssh-host-resign/files/server_ca.pub

This file was deleted.

32 changes: 0 additions & 32 deletions roles/ssh-host-resign/tasks/main.yml

This file was deleted.

Loading
Loading