33 lines
1.1 KiB
Nix
33 lines
1.1 KiB
Nix
{ pkgs, config, lib, ... }: {
|
|
services.openssh = {
|
|
enable = true;
|
|
passwordAuthentication = false;
|
|
permitRootLogin = "no";
|
|
forwardX11 = true;
|
|
ports = [ 22 ];
|
|
};
|
|
|
|
users.users.balsoft.openssh.authorizedKeys.keys =
|
|
["ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDd2OdcSHUsgezuV+cpFqk9+Svtup6PxIolv1zokVZdqvS8qxLsA/rwYmQgTnuq4/zK/GIxcUCH4OxYlW6Or4M4G7qrDKcLAUrRPWkectqEooWRflZXkfHduMJhzeOAsBdMfYZQ9024GwKr/4yriw2BGa8GbbAnQxiSeTipzvXHoXuRME+/2GsMFAfHFvxzXRG7dNOiLtLaXEjUPUTcw/fffKy55kHtWxMkEvvcdyR53/24fmO3kLVpEuoI+Mp1XFtX3DvRM9ulgfwZUn8/CLhwSLwWX4Xf9iuzVi5vJOJtMOktQj/MwGk4tY/NPe+sIk+nAUKSdVf0y9k9JrJT98S/ comment"];
|
|
|
|
services.udev.packages = [ pkgs.yubikey-personalization ];
|
|
|
|
|
|
environment.shellInit = ''
|
|
export GPG_TTY="$(tty)"
|
|
gpg-connect-agent /bye
|
|
export SSH_AUTH_SOCK="/run/user/$UID/gnupg/S.gpg-agent.ssh"
|
|
'';
|
|
|
|
home-manager.users.balsoft.home.file.".gnupg/scdaemon.conf".text = "reader-port Yubico Yubi";
|
|
|
|
home-manager.users.balsoft.programs.ssh = {
|
|
enable = true;
|
|
matchBlocks = {
|
|
"*" = {
|
|
compression = false;
|
|
};
|
|
};
|
|
};
|
|
}
|