# SPDX-FileCopyrightText: 2023 - 2024 Benjamin Grande M. S. # # SPDX-License-Identifier: AGPL-3.0-or-later # vim: ft=sshconfig ## Security configuration is enforced. Host * ## Distrust the remote ForwardX11 no ForwardX11Trusted no ForwardAgent no ## Authentication UpdateHostKeys ask PreferredAuthentications publickey,keyboard-interactive,password HostbasedAuthentication no StrictHostKeyChecking yes ## Encryption HostKeyAlgorithms ssh-ed25519,sk-ssh-ed25519@openssh.com PubkeyAcceptedAlgorithms ssh-ed25519,sk-ssh-ed25519@openssh.com KexAlgorithms sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org Ciphers aes256-gcm@openssh.com MACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com ## Load host configuration. UserKnownHostsFile ~/.ssh/known_hosts.d/%k.host ~/.ssh/known_hosts.d/%h.host Include ~/.ssh/config.d/*.conf ## Recommended configuration at last. Host * ## Connectivity ControlMaster auto ControlPath ~/.ssh/control.d/%r@%h:%p ControlPersist 60s ## Only try fancy Qubes proxy if qube has compatible service enabled. Match Exec "test -f /var/run/qubes-service/qusal-proxy-client" ProxyCommand qrexec-client-vm @default qusal.ConnectTCP+%h+%p