Signed-off-by: Peter Müller <[email protected]>
---
 config/ssh/ssh_config | 30 +++++++++++++++---------------
 1 file changed, 15 insertions(+), 15 deletions(-)

diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config
index 2fc62e116..66cb0c2cc 100644
--- a/config/ssh/ssh_config
+++ b/config/ssh/ssh_config
@@ -5,30 +5,30 @@
 
 # Set some basic hardening options for all connections
 Host *
-        # Disable undocumented roaming feature as it is known to be vulnerable
-        UseRoaming no
+       # Disable undocumented roaming feature as it is known to be vulnerable
+       UseRoaming no
 
-        # Only use secure crypto algorithms
-               KexAlgorithms 
mlkem768x25519-sha256,sntrup761x25519-sha512,[email protected],curve25519-sha256,[email protected],diffie-hellman-group-exchange-sha256
-        Ciphers 
[email protected],[email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr
-        MACs 
[email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,[email protected]
+       # Only use secure crypto algorithms
+       KexAlgorithms 
mlkem768x25519-sha256,sntrup761x25519-sha512,[email protected],curve25519-sha256,[email protected],diffie-hellman-group-exchange-sha256
+       Ciphers 
[email protected],[email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr
+       MACs 
[email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,[email protected]
 
-        # Always visualise server host keys (helps to identify key based MITM 
attacks)
-        VisualHostKey yes
+       # Always visualise server host keys (helps to identify key based MITM 
attacks)
+       VisualHostKey yes
 
-        # Use SSHFP (might work on some up-to-date networks) to look up host 
keys
-        VerifyHostKeyDNS yes
+       # Use SSHFP (might work on some up-to-date networks) to look up host 
keys
+       VerifyHostKeyDNS yes
 
-        # Send SSH-based keep alive messages to connected server to avoid 
broken connections
-        ServerAliveInterval 10
-        ServerAliveCountMax 30
+       # Send SSH-based keep alive messages to connected server to avoid 
broken connections
+       ServerAliveInterval 10
+       ServerAliveCountMax 30
 
        # Disable TCP keep alive messages since they can be spoofed and we have 
SSH-based
        # keep alive messages enabled; there is no need to do things twice here
        TCPKeepAlive no
 
-        # Ensure only allowed authentication methods are used
-        PreferredAuthentications publickey,keyboard-interactive,password
+       # Ensure only allowed authentication methods are used
+       PreferredAuthentications publickey,keyboard-interactive,password
 
        # Prevent information leak by hashing ~/.ssh/known_hosts
        HashKnownHosts yes
-- 
2.51.0

Reply via email to