added sshd GatwayPorts option
svn path=/nixos/trunk/; revision=13363
This commit is contained in:
parent
d7c321c64a
commit
80377e512e
@ -842,6 +842,13 @@ in
|
|||||||
<command>no</command>
|
<command>no</command>
|
||||||
";
|
";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
gatewayPorts = mkOption {
|
||||||
|
default = "no";
|
||||||
|
description = "
|
||||||
|
Specifies whether remote hosts are allowed to connect to ports forwarded for the client. See man sshd_conf.
|
||||||
|
";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
lshd = {
|
lshd = {
|
||||||
|
@ -191,9 +191,7 @@ let
|
|||||||
inherit (pkgs) writeText openssh glibc;
|
inherit (pkgs) writeText openssh glibc;
|
||||||
inherit (pkgs.xorg) xauth;
|
inherit (pkgs.xorg) xauth;
|
||||||
inherit nssModulesPath;
|
inherit nssModulesPath;
|
||||||
forwardX11 = config.services.sshd.forwardX11;
|
inherit (config.services.sshd) forwardX11 allowSFTP permitRootLogin gatewayPorts;
|
||||||
allowSFTP = config.services.sshd.allowSFTP;
|
|
||||||
permitRootLogin = config.services.sshd.permitRootLogin;
|
|
||||||
})
|
})
|
||||||
|
|
||||||
# GNU lshd SSH2 deamon.
|
# GNU lshd SSH2 deamon.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{ writeText, openssh, glibc, xauth
|
{ writeText, openssh, glibc, xauth
|
||||||
, nssModulesPath
|
, nssModulesPath
|
||||||
, forwardX11, allowSFTP, permitRootLogin
|
, forwardX11, allowSFTP, permitRootLogin, gatewayPorts
|
||||||
}:
|
}:
|
||||||
|
|
||||||
assert permitRootLogin == "yes" ||
|
assert permitRootLogin == "yes" ||
|
||||||
@ -29,6 +29,7 @@ let
|
|||||||
"}
|
"}
|
||||||
|
|
||||||
PermitRootLogin ${permitRootLogin}
|
PermitRootLogin ${permitRootLogin}
|
||||||
|
GatewayPorts ${gatewayPorts}
|
||||||
|
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user