Config-Model-OpenSsh
view release on metacpan - search on metacpan
view release on metacpan or search on metacpan
lib/Config/Model/models/Sshd.pl view on Meta::CPAN
#
# This file is part of Config-Model-OpenSsh
#
# This software is Copyright (c) 2008-2019 by Dominique Dumont.
#
# This is free software, licensed under:
#
# The GNU Lesser General Public License, Version 2.1, February 1999
#
use strict;
use warnings;
return [
{
'accept' => [
'.*',
{
'summary' => 'boilerplate parameter that may hide a typo',
'type' => 'leaf',
'value_type' => 'uniline',
'warn' => 'Unknown parameter. Please make sure there\'s no typo and contact the author'
}
],
'class_description' => 'This configuration class was generated from sshd_system documentation.
by L<parse-man.pl|https://github.com/dod38fr/config-model-openssh/contrib/parse-man.pl>
',
'element' => [
'AddressFamily',
{
'choice' => [
'any',
'inet',
'inet6'
],
'description' => 'B<AddressFamily>Specifies which address family
should be used by L<sshd(8)>. Valid arguments are B<any>
(the default), B<inet> (use IPv4 only), or B<inet6>
(use IPv6 only).',
'type' => 'leaf',
'upstream_default' => 'any',
'value_type' => 'enum'
},
'CASignatureAlgorithms',
{
'description' => 'B<CASignatureAlgorithms>Specifies which algorithms are
allowed for signing of certificates by certificate
authorities (CAs). The default is:ecdsa-sha2-nistp256.ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsaCertificates
signed using other algorithms will not be accepted for
public key or host-based authentication.',
'type' => 'leaf',
'value_type' => 'uniline'
},
'ChallengeResponseAuthentication',
{
'description' => 'B<ChallengeResponseAuthentication>Specifies whether
challenge-response authentication is allowed (e.g. via PAM).
The default is B<yes>.',
'type' => 'leaf',
'upstream_default' => 'yes',
'value_type' => 'boolean',
'write_as' => [
'no',
'yes'
]
},
'Ciphers',
{
'description' => "B<Ciphers>Specifies the ciphers allowed.
Multiple ciphers must be comma-separated. If the specified
value begins with a \x{2019}+\x{2019} character, then the
specified ciphers will be appended to the default set
instead of replacing them. If the specified value begins
with a \x{2019}-\x{2019} character, then the specified ciphers
(including wildcards) will be removed from the default set
instead of replacing them.The supported
ciphers are:3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm\@openssh.com
aes256-gcm\@openssh.com
chacha20-poly1305\@openssh.comThe default
is:chacha20-poly1305\@openssh.com,
aes128-ctr,aes192-ctr,aes256-ctr,
aes128-gcm\@openssh.com,aes256-gcm\@openssh.comThe list of
available ciphers may also be obtained using \"ssh -Q
cipher\".",
'type' => 'leaf',
'value_type' => 'uniline'
},
'Compression',
view all matches for this distributionview release on metacpan - search on metacpan
( run in 0.598 second using v1.00-cache-2.02-grep-82fe00e-cpan-2c419f77a38b )