nixos-config/home/ssh/default.nix

36 lines
1.4 KiB
Nix

{ config, pkgs, ... }:
{
# Make sure controlPath directory exists
home.file.".ssh/c/.dummy".text = "";
programs.ssh = {
enable = true;
controlMaster = "auto";
controlPersist = "10m";
controlPath = "~/.ssh/c/%r@%n:%p";
# We have to do this as text to gaurantee it's part of the last Host * block
userKnownHostsFile = "~/.ssh/known_hosts ${./extra_known_hosts}";
extraConfig = ''
KexAlgorithms sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
HostKeyAlgorithms ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-256,rsa-sha2-512
VerifyHostKeyDNS ask
VisualHostKey yes
UpdateHostKeys ask
'';
# Most hosts are set in private
matchBlocks = {
"*.cmu.edu" = {
user = "atosini";
extraOptions = {
GSSAPIAuthentication = "yes";
GSSAPIDelegateCredentials = "yes";
};
};
"github.com".extraOptions.ControlMaster = "no";
};
};
}