diff --git a/server/files/apticron.conf b/apticron/files/apticron.conf
similarity index 100%
rename from server/files/apticron.conf
rename to apticron/files/apticron.conf
diff --git a/server/tasks/apticron.yml b/apticron/tasks/apticron.yml
similarity index 100%
rename from server/tasks/apticron.yml
rename to apticron/tasks/apticron.yml
diff --git a/server/tasks/main.yml b/apticron/tasks/main.yml
similarity index 100%
rename from server/tasks/main.yml
rename to apticron/tasks/main.yml
diff --git a/common/files/fsmpi/issue.net b/branding/files/fsmpi/issue.net
similarity index 100%
rename from common/files/fsmpi/issue.net
rename to branding/files/fsmpi/issue.net
diff --git a/common/files/fsmpi/motd b/branding/files/fsmpi/motd
similarity index 100%
rename from common/files/fsmpi/motd
rename to branding/files/fsmpi/motd
diff --git a/common/files/root/gitconfig b/branding/files/gitconfig
similarity index 100%
rename from common/files/root/gitconfig
rename to branding/files/gitconfig
diff --git a/common/tasks/shell.yml b/branding/tasks/shell.yml
similarity index 100%
rename from common/tasks/shell.yml
rename to branding/tasks/shell.yml
diff --git a/common/defaults/main.yml b/common/defaults/main.yml
deleted file mode 100644
index afa7d3a0edd3f4ffc049f3a3fe3a7a4d498d95ec..0000000000000000000000000000000000000000
--- a/common/defaults/main.yml
+++ /dev/null
@@ -1,11 +0,0 @@
----
-# file: roles/common/defaults/main.yml
-
-apt_use_updates: yes
-apt_use_backports: yes
-ssh_authorized_keys: "{{ inventory_dir }}/files/keys"
-ssh_mkhomedir: yes
-ssh_strong_crypto: yes
-ssh_gssapi: yes
-ssh_sftp_options: ""
-ssh_allow_groups: []
diff --git a/common/files/locale b/common/files/locale
deleted file mode 100644
index 01ec548f82205efd53e4fc1be27aef47ddaee9cc..0000000000000000000000000000000000000000
--- a/common/files/locale
+++ /dev/null
@@ -1 +0,0 @@
-LANG=en_US.UTF-8
diff --git a/common/files/logrotate.conf b/common/files/logrotate.conf
deleted file mode 100644
index 0e3ac370bca9f495559b9285b99a84083e8a9007..0000000000000000000000000000000000000000
--- a/common/files/logrotate.conf
+++ /dev/null
@@ -1,33 +0,0 @@
-# see "man logrotate" for details
-# rotate log files daily
-daily
-
-# keep 7 days worth of backlogs
-rotate 7
-
-# create new (empty) log files after rotating old ones
-create
-
-# uncomment this if you want your log files compressed
-compress
-delaycompress
-
-# packages drop log rotation information into this directory
-include /etc/logrotate.d
-
-# no packages own wtmp, or btmp -- we'll rotate them here
-/var/log/wtmp {
-    missingok
-    monthly
-    create 0664 root utmp
-    rotate 1
-}
-
-/var/log/btmp {
-    missingok
-    monthly
-    create 0660 root utmp
-    rotate 1
-}
-
-# system-specific logs may be configured here
diff --git a/common/files/molly-guard b/common/files/molly-guard
deleted file mode 100644
index f3310582ddb81a7cde08da73beb3d8bce8e678d7..0000000000000000000000000000000000000000
--- a/common/files/molly-guard
+++ /dev/null
@@ -1,6 +0,0 @@
-# molly-guard settings
-#
-# ALWAYS_QUERY_HOSTNAME
-# when set, causes the 30-query-hostname script to always ask for the
-# hostname, even if no SSH session was detected.
-ALWAYS_QUERY_HOSTNAME=true
diff --git a/common/files/pam/mkhomedir b/common/files/pam/mkhomedir
deleted file mode 100644
index be7b76507a21d177d25c631c12a542cbc41b9ac0..0000000000000000000000000000000000000000
--- a/common/files/pam/mkhomedir
+++ /dev/null
@@ -1,6 +0,0 @@
-Name: Create home directory during login
-Default: yes
-Priority: 900
-Session-Type: Additional
-Session:
-        required        pam_mkhomedir.so umask=0077 skel=/etc/skel
diff --git a/common/files/pam/sshd b/common/files/pam/sshd
deleted file mode 100644
index d70b384bd9a388f3e04f25c47316dbf6677e02d5..0000000000000000000000000000000000000000
--- a/common/files/pam/sshd
+++ /dev/null
@@ -1,55 +0,0 @@
-# PAM configuration for the Secure Shell service
-
-# Standard Un*x authentication.
-@include common-auth
-
-# Disallow non-root logins when /etc/nologin exists.
-account    required     pam_nologin.so
-
-# Uncomment and edit /etc/security/access.conf if you need to set complex
-# access limits that are hard to express in sshd_config.
-# account  required     pam_access.so
-
-# Standard Un*x authorization.
-@include common-account
-
-# SELinux needs to be the first session rule.  This ensures that any
-# lingering context has been cleared.  Without this it is possible that a
-# module could execute code in the wrong domain.
-session [success=ok ignore=ignore module_unknown=ignore default=bad]        pam_selinux.so close
-
-# Set the loginuid process attribute.
-session    required     pam_loginuid.so
-
-# Create a new session keyring.
-session    optional     pam_keyinit.so force revoke
-
-# Standard Un*x session setup and teardown.
-@include common-session
-
-# Print the message of the day upon successful login.
-# This includes a dynamically generated part from /run/motd.dynamic
-# and a static (admin-editable) part from /etc/motd.
-session    optional     pam_motd.so  motd=/run/motd.dynamic
-session    optional     pam_motd.so noupdate
-
-# Print the status of the user's mailbox upon successful login.
-session    optional     pam_mail.so standard noenv # [1]
-
-# Set up user limits from /etc/security/limits.conf.
-session    required     pam_limits.so
-
-# Read environment variables from /etc/environment and
-# /etc/security/pam_env.conf.
-session    required     pam_env.so # [1]
-# In Debian 4.0 (etch), locale-related environment variables were moved to
-# /etc/default/locale, so read that as well.
-session    required     pam_env.so user_readenv=1 envfile=/etc/default/locale
-
-# SELinux needs to intervene at login time to ensure that the process starts
-# in the proper default security context.  Only sessions which are intended
-# to run in the user's context should be run after this.
-session [success=ok ignore=ignore module_unknown=ignore default=bad]        pam_selinux.so open
-
-# Standard Un*x password updating.
-@include common-password
diff --git a/common/files/root/bashrc b/common/files/root/bashrc
deleted file mode 100644
index df6453adbf8de9de0cb8a47928ca32160d8fb950..0000000000000000000000000000000000000000
--- a/common/files/root/bashrc
+++ /dev/null
@@ -1,175 +0,0 @@
-
-bash_prompt() {
-    case $TERM in
-     xterm*|rxvt*)
-         local TITLEBAR='\[\033]0;\u:${NEW_PWD}\007\]'
-          ;;
-     *)
-         local TITLEBAR=""
-          ;;
-    esac
-    local NONE="\[\033[0m\]"    # unsets color to term's fg color
-    
-    # regular colors
-    local K="\[\033[0;30m\]"    # black
-    local R="\[\033[0;31m\]"    # red
-    local G="\[\033[0;32m\]"    # green
-    local Y="\[\033[0;33m\]"    # yellow
-    local B="\[\033[0;34m\]"    # blue
-    local M="\[\033[0;35m\]"    # magenta
-    local C="\[\033[0;36m\]"    # cyan
-    local W="\[\033[0;37m\]"    # white
-    
-    # emphasized (bolded) colors
-    local EMK="\[\033[1;30m\]"
-    local EMR="\[\033[1;31m\]"
-    local EMG="\[\033[1;32m\]"
-    local EMY="\[\033[1;33m\]"
-    local EMB="\[\033[1;34m\]"
-    local EMM="\[\033[1;35m\]"
-    local EMC="\[\033[1;36m\]"
-    local EMW="\[\033[1;37m\]"
-    
-    # background colors
-    local BGK="\[\033[40m\]"
-    local BGR="\[\033[41m\]"
-    local BGG="\[\033[42m\]"
-    local BGY="\[\033[43m\]"
-    local BGB="\[\033[44m\]"
-    local BGM="\[\033[45m\]"
-    local BGC="\[\033[46m\]"
-    local BGW="\[\033[47m\]"
-    
-    local UC=$G                 # user's color
-    [ $UID -eq "0" ] && UC=$R   # root's color
-    
-    PS1="$TITLEBAR ${EMW}\t [${UC}\u ${EMK}@ ${C}\h${EMW}] ${EMC}\w ${UC}\\$ ${NONE}"
-    # without colors: PS1="[\u@\h \${NEW_PWD}]\\$ "
-    # extra backslash in front of \$ to make bash colorize the prompt
-}
-
-#append_root() {
-#	export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$1/lib
-#	export PATH=$PATH:$1/bin
-#	export PKG_CONFIG_PATH=$PKG_CONFIG_PATH:$1/lib/pkgconfig
-#	for D in $1/lib/python*/site-packages; do
-#		export PYTHONPATH=$PYTHONPATH:$D
-#	done
-#}
-
-prepend_root() {
-	echo "** prepend $1"
-    export LD_LIBRARY_PATH="$1/lib:$LD_LIBRARY_PATH"
-    export PATH="$1/bin:$PATH"
-    export PKG_CONFIG_PATH="$1/lib/pkgconfig:$PKG_CONFIG_PATH"
-    for D in $1/lib/python*/site-packages; do
-        export PYTHONPATH="$D:$PYTHONPATH"
-    done
-}
-
-append_element() {
-    local IFS=":"
-    for item in $1; do
-        if ! [[ $item == $2* ]]; then
-            echo -n "$item:"
-        fi
-    done
-    echo $2
-}
-
-prepend_element() {
-    local IFS=":"
-    echo $2
-    for item in $1; do
-        if ! [[ $item == $2* ]]; then
-            echo -n ":$item"
-        fi
-    done
-}
-
-remove_element() {
-	local IFS=":"
-	for item in $1; do
-		if ! [[ $item == $2* ]]; then
-			echo -n ":$item"
-		fi
-	done
-}
-
-list_path() {
-    local IFS=":"
-    for item in $1; do
-        echo $item
-    done
-}
-
-append_root() {
-    export LD_LIBRARY_PATH=$(append_element $LD_LIBRARY_PATH $1/lib)
-    export PATH=$(append_element $PATH $1/bin)
-    export PKG_CONFIG_PATH=$(append_element $PKG_CONFIG_PATH $1/lib/pkgconfig)
-    for D in $1/lib/python*/site-packages; do
-        export PYTHONPATH=$(append_element $PYTHONPATH $D)
-    done
-}
-
-
-remove_root() {
-	PATH=$(remove_element $PATH $1)
-	LD_LIBRARY_PATH=$(remove_element $LD_LIBRARY_PATH $1)
-	PKG_CONFIG_PATH=$(remove_element $PKG_CONFIG_PATH $1)
-	PYTHONPATH=$(remove_element $PYTHONPATH $1)
-}
-
-# Check for an interactive session
-[ -z "$PS1" ] && return
-
-if [ "$PS1" ]; then
-	shopt -s checkwinsize
-	shopt -s cdspell
-
-	# don't put duplicate lines in the history. See bash(1) for more options
-	# don't overwrite GNU Midnight Commander's setting of `ignorespace'.
-	HISTCONTROL=$HISTCONTROL${HISTCONTROL+,}ignoredups
-	# ... or force ignoredups and ignorespace
-	HISTCONTROL=ignoreboth
-
-	# append to the history file, don't overwrite it
-	shopt -s histappend
-
-	alias ls='ls -h --color=auto'
-	alias l='ls -lh --color=auto'
-	alias ll='ls -Alh --color=auto'
-	alias ssh='ssh -A -X'
-	alias make='make -j 4'
-	alias ne='TERM=xterm ne'
-	alias ..='cd ..'
-	bash_prompt
-
-	export EDITOR=/usr/bin/vim
-	
-	set bell-style none
-	
-	# enhanced bash completition
-	if [ -f /etc/bash_completion ]; then
-	 . /etc/bash_completion
-	fi
-	if [ -f ~/.bash_completion ]; then
-	 . ~/.bash_completion
-	fi
-	
-#	if [ -z "$SSH_AUTH_SOCK" ] && [ "${SSH_AUTH_SOCK}xxx" = "xxx" ]; then
-#		SSH_ENV="$HOME/.ssh/environment"
-#		echo "Starting KeyChain"
-#	       	# Source SSH settings, if applicable
-#		keychain --nogui --eval id_rsa
-#		. ~/.keychain/$HOSTNAME-sh &> /dev/null
-#		. ~/.keychain/$HOSTNAME-sh-gpg &> /dev/null
-#	fi
-	
-	#prepend_root $HOME/.local
-	
-	if [ -f $HOME/.bashrc.local ]
-	then
-		source $HOME/.bashrc.local
-	fi
-fi
diff --git a/common/files/root/vimrc b/common/files/root/vimrc
deleted file mode 100644
index b9ce89d2f030277c6534c6a1b94d60e7b291aea6..0000000000000000000000000000000000000000
--- a/common/files/root/vimrc
+++ /dev/null
@@ -1,52 +0,0 @@
-filetype plugin indent on
-syntax enable
-let g:tex_flavor = "latex"
-let g:ansible_options = {'ignore_blank_lines': 0}
-
-set noexrc
-set nocompatible
-
-set ruler
-set showmode
-set number
-set showcmd
-set showmatch
-set wrap
-
-set tabstop=8
-set shiftwidth=8
-set softtabstop=8
-set noexpandtab
-set smarttab
-"set autoindent
-set copyindent
-
-set wrapscan
-set hlsearch
-set incsearch
-set ignorecase
-set smartcase
-
-set notitle
-set undolevels=1000
-set history=1000
-set noerrorbells
-set novisualbell
-set background=dark
-"set spell
-set nobackup
-"set viminfo=$HOME/.cache/viminfo
-
-":nmap <Space> i_<Esc>r
-:nmap <F1> :echo<CR>
-:imap <F1> <C-o>:echo<CR>
-
-cmap w!! w !sudo tee % >/dev/null
-
-au BufRead /tmp/mutt-* set textwidth=72
-map <F6> : !hunspell %<CR>: e %<CR>
-
-"set textwidth=79
-set backspace=2
-set wrapmargin=0
-set formatoptions=c,q,r,t
diff --git a/common/files/rwth_chain_sha2.pem b/common/files/rwth_chain_sha2.pem
deleted file mode 100644
index 6c7fa44d2868424a006cb9b91840bbeebb3362ec..0000000000000000000000000000000000000000
--- a/common/files/rwth_chain_sha2.pem
+++ /dev/null
@@ -1,84 +0,0 @@
-SHA-2 chain, PCA Jul 14
-subject= /C=DE/O=RWTH Aachen/CN=RWTH Aachen CA/emailAddress=ca@rwth-aachen.de
------BEGIN CERTIFICATE-----
-MIIFOTCCBCGgAwIBAgIHF5Bg4cwAkzANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQG
-EwJERTETMBEGA1UEChMKREZOLVZlcmVpbjEQMA4GA1UECxMHREZOLVBLSTEkMCIG
-A1UEAxMbREZOLVZlcmVpbiBQQ0EgR2xvYmFsIC0gRzAxMB4XDTE0MDUxMjE1MDU1
-M1oXDTE5MDcwOTIzNTkwMFowXjELMAkGA1UEBhMCREUxFDASBgNVBAoTC1JXVEgg
-QWFjaGVuMRcwFQYDVQQDEw5SV1RIIEFhY2hlbiBDQTEgMB4GCSqGSIb3DQEJARYR
-Y2FAcnd0aC1hYWNoZW4uZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
-AQC4MAhk48jcelLfNUI5kvMv+CF54xJnL4x/cJQnN2NId6CJ3fqs0siO2exIACfz
-djxOUpQ6ZFOn5pdTvTi7stnk8WAaP/d9LFd8k9Gbxjh7xh3L+0a3ac+/tHJcX564
-ntUxGtVGMuShEoUaZUT5fw97TL36UJ8OqXLrqpdAKcFKaJ+pgRp2gTLj4MNUMPjA
-4GlstpjoLnT++qFm7t/ZS92/E3OqNJUwHH6C35vSroVscmg+a7XxT6U4JO99MYxN
-cTIMzhPS9Ytp+302w7i51daBjr0hFGPK0nLSV6gv77zBSFJ7AVGJJxBSUzDn0xkD
-LYvZwqaeYkj8kDB2oSeRyfGjAgMBAAGjggH+MIIB+jASBgNVHRMBAf8ECDAGAQH/
-AgEBMA4GA1UdDwEB/wQEAwIBBjARBgNVHSAECjAIMAYGBFUdIAAwHQYDVR0OBBYE
-FG7VPsAcL3HJPL9JTu9qVUjs0fI4MB8GA1UdIwQYMBaAFEm3xs/oPR9/6kR7Eyn3
-8QpwPt5kMBwGA1UdEQQVMBOBEWNhQHJ3dGgtYWFjaGVuLmRlMIGIBgNVHR8EgYAw
-fjA9oDugOYY3aHR0cDovL2NkcDEucGNhLmRmbi5kZS9nbG9iYWwtcm9vdC1jYS9w
-dWIvY3JsL2NhY3JsLmNybDA9oDugOYY3aHR0cDovL2NkcDIucGNhLmRmbi5kZS9n
-bG9iYWwtcm9vdC1jYS9wdWIvY3JsL2NhY3JsLmNybDCB1wYIKwYBBQUHAQEEgcow
-gccwMwYIKwYBBQUHMAGGJ2h0dHA6Ly9vY3NwLnBjYS5kZm4uZGUvT0NTUC1TZXJ2
-ZXIvT0NTUDBHBggrBgEFBQcwAoY7aHR0cDovL2NkcDEucGNhLmRmbi5kZS9nbG9i
-YWwtcm9vdC1jYS9wdWIvY2FjZXJ0L2NhY2VydC5jcnQwRwYIKwYBBQUHMAKGO2h0
-dHA6Ly9jZHAyLnBjYS5kZm4uZGUvZ2xvYmFsLXJvb3QtY2EvcHViL2NhY2VydC9j
-YWNlcnQuY3J0MA0GCSqGSIb3DQEBCwUAA4IBAQBu4RMsIIzIOBrkrz5loQOmoZuH
-ekB7LGlYBiou7YTqjWOaAxUGL5xf2L9qo2QnxeFhWUnDIHsgTHtoJQmAgM/e/gwT
-v0u/x3zWAsgOGPPXKuLrJRrLIcwoWT9V9VzqZfbzga9s0Uo2s7wVxGnSexKAmzGG
-dIsYP7BBQWkAr6bFWLQmD2R8Cr5OTOHNBS//w2ZuWsvetM7HAOH4ECTYZtG4ZXP2
-u0jclErqjePssIkh09lb3ESeIZ+8avIqAXz0QVTNti3HYAPandLyq7PhR/PaWajJ
-Z6Hq30iq2w32zhFAghqTjJMPJCgU78MehKS5QdVCFfIr4xJA+O7sr1kh3eYu
------END CERTIFICATE-----
-subject= /C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Global - G01
------BEGIN CERTIFICATE-----
-MIIE1TCCA72gAwIBAgIIUE7G9T0RtGQwDQYJKoZIhvcNAQELBQAwcTELMAkGA1UE
-BhMCREUxHDAaBgNVBAoTE0RldXRzY2hlIFRlbGVrb20gQUcxHzAdBgNVBAsTFlQt
-VGVsZVNlYyBUcnVzdCBDZW50ZXIxIzAhBgNVBAMTGkRldXRzY2hlIFRlbGVrb20g
-Um9vdCBDQSAyMB4XDTE0MDcyMjEyMDgyNloXDTE5MDcwOTIzNTkwMFowWjELMAkG
-A1UEBhMCREUxEzARBgNVBAoTCkRGTi1WZXJlaW4xEDAOBgNVBAsTB0RGTi1QS0kx
-JDAiBgNVBAMTG0RGTi1WZXJlaW4gUENBIEdsb2JhbCAtIEcwMTCCASIwDQYJKoZI
-hvcNAQEBBQADggEPADCCAQoCggEBAOmbw2eF+Q2u9Y1Uw5ZQNT1i6W5M7ZTXAFuV
-InTUIOs0j9bswDEEC5mB4qYU0lKgKCOEi3SJBF5b4OJ4wXjLFssoNTl7LZBF0O2g
-AHp8v0oOGwDDhulcKzERewzzgiRDjBw4i2poAJru3E94q9LGE5t2re7eJujvAa90
-D8EJovZrzr3TzRQwT/Xl46TIYpuCGgMnMA0CZWBN7dEJIyqWNVgn03bGcbaQHcTt
-/zWGfW8zs9sPxRHCioOhlF1Ba9jSEPVM/cpRrNm975KDu9rrixZWVkPP4dUTPaYf
-JzDNSVTbyRM0mnF1xWzqpwuY+SGdJ68+ozk5SGqMrcmZ+8MS8r0CAwEAAaOCAYYw
-ggGCMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUSbfGz+g9H3/qRHsTKffxCnA+
-3mQwHwYDVR0jBBgwFoAUMcN5G7r1U9cX4Il6LRdsCrMrnTMwEgYDVR0TAQH/BAgw
-BgEB/wIBAjBiBgNVHSAEWzBZMBEGDysGAQQBga0hgiwBAQQCAjARBg8rBgEEAYGt
-IYIsAQEEAwAwEQYPKwYBBAGBrSGCLAEBBAMBMA8GDSsGAQQBga0hgiwBAQQwDQYL
-KwYBBAGBrSGCLB4wPgYDVR0fBDcwNTAzoDGgL4YtaHR0cDovL3BraTAzMzYudGVs
-ZXNlYy5kZS9ybC9EVF9ST09UX0NBXzIuY3JsMHgGCCsGAQUFBwEBBGwwajAsBggr
-BgEFBQcwAYYgaHR0cDovL29jc3AwMzM2LnRlbGVzZWMuZGUvb2NzcHIwOgYIKwYB
-BQUHMAKGLmh0dHA6Ly9wa2kwMzM2LnRlbGVzZWMuZGUvY3J0L0RUX1JPT1RfQ0Ff
-Mi5jZXIwDQYJKoZIhvcNAQELBQADggEBAGMgKP2cIYZyvjlGWTkyJbypAZsNzMp9
-QZyGbQpuLLMTWXWxM5IbYScW/8Oy1TWC+4QqAUm9ZrtmL7LCBl1uP27jAVpbykNj
-XJW24TGnH9UHX03mZYJOMvnDfHpLzU1cdO4h8nUC7FI+0slq05AjbklnNb5/TVak
-7Mwvz7ehl6hyPsm8QNZapAg91ryCw7e3Mo6xLI5qbbc1AhnP9TlEWGOnJAAQsLv8
-Tq9uLzi7pVdJP9huUG8sl5bcHUaaZYnPrszy5dmfU7M+oS+SqdgLxoQfBMbrHuif
-fbV7pQLxJMUkYxE0zFqTICp5iDolQpCpZTt8htMSFSMp/CzazDlbVBc=
------END CERTIFICATE-----
-subject= /C=DE/O=Deutsche Telekom AG/OU=T-TeleSec Trust Center/CN=Deutsche Telekom Root CA 2
------BEGIN CERTIFICATE-----
-MIIDnzCCAoegAwIBAgIBJjANBgkqhkiG9w0BAQUFADBxMQswCQYDVQQGEwJERTEc
-MBoGA1UEChMTRGV1dHNjaGUgVGVsZWtvbSBBRzEfMB0GA1UECxMWVC1UZWxlU2Vj
-IFRydXN0IENlbnRlcjEjMCEGA1UEAxMaRGV1dHNjaGUgVGVsZWtvbSBSb290IENB
-IDIwHhcNOTkwNzA5MTIxMTAwWhcNMTkwNzA5MjM1OTAwWjBxMQswCQYDVQQGEwJE
-RTEcMBoGA1UEChMTRGV1dHNjaGUgVGVsZWtvbSBBRzEfMB0GA1UECxMWVC1UZWxl
-U2VjIFRydXN0IENlbnRlcjEjMCEGA1UEAxMaRGV1dHNjaGUgVGVsZWtvbSBSb290
-IENBIDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCrC6M14IspFLEU
-ha88EOQ5bzVdSq7d6mGNlUn0b2SjGmBmpKlAIoTZ1KXleJMOaAGtuU1cOs7TuKhC
-QN/Po7qCWWqSG6wcmtoIKyUn+WkjR/Hg6yx6m/UTAtB+NHzCnjwAWav12gz1Mjwr
-rFDa1sPeg5TKqAyZMg4ISFZbavva4VhYAUlfckE8FQYBjl2tqriTtM2e66foai1S
-NNs671x1Udrb8zH57nGYMsRUFUQM+ZtV7a3fGAigo4aKSe5TBY8ZTNXeWHmb0moc
-QqvF1afPaA+W5OFhmHZhyJF81j4A4pFQh+GdCuatl9Idxjp9y7zaAzTVjlsB9WoH
-txa2bkp/AgMBAAGjQjBAMB0GA1UdDgQWBBQxw3kbuvVT1xfgiXotF2wKsyudMzAP
-BgNVHRMECDAGAQH/AgEFMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOC
-AQEAlGRZrTlk5ynrE/5aw4sTV8gEJPB0d8Bg42f76Ymmg7+Wgnxu1MM9756Abrsp
-tJh6sTtU6zkXR34ajgv8HzFZMQSyzhfzLMdiNlXiItiJVbSYSKpk+tYcNthEeFpa
-IzpXl/V6ME+un2pMSyuOoAPjPuCp1NJ70rOo4nI8rZ7/gFnkm0W09juwzTkZmDLl
-6iFhkOQxIY40sfcvNUqFENrnijchvllj4PKFiDFT1FQUhXB59C4Gdyd1Lx+4ivn+
-xbrYNuSD7Odlt79jWvNGr4GUN9RBjNYj1h7P9WgbRGOiWrqnNVmh5XAFmw4jV5mU
-Cm26OWMohpLzGITY+9HPBVZkVw==
------END CERTIFICATE-----
diff --git a/common/files/sudo/default b/common/files/sudo/default
deleted file mode 100644
index e96668f1980da358365d11e07c43dafd98474c2e..0000000000000000000000000000000000000000
--- a/common/files/sudo/default
+++ /dev/null
@@ -1,27 +0,0 @@
-#
-# This file MUST be edited with the 'visudo' command as root.
-#
-# Please consider adding local content in /etc/sudoers.d/ instead of
-# directly modifying this file.
-#
-# See the man page for details on how to write a sudoers file.
-#
-Defaults	env_reset
-Defaults	mail_badpass
-Defaults	secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
-
-# Host alias specification
-
-# User alias specification
-
-# Cmnd alias specification
-
-# User privilege specification
-root	ALL=(ALL:ALL) ALL
-
-# Allow members of group sudo to execute any command
-%admin	ALL=(ALL:ALL) ALL
-
-# See sudoers(5) for more information on "#include" directives:
-
-#includedir /etc/sudoers.d
diff --git a/common/files/timezone b/common/files/timezone
deleted file mode 100644
index 94d5accc464988d1b1ddbaac5277ba48459f464a..0000000000000000000000000000000000000000
--- a/common/files/timezone
+++ /dev/null
@@ -1 +0,0 @@
-Europe/Berlin
diff --git a/common/handlers/main.yml b/common/handlers/main.yml
deleted file mode 100644
index eaae134a11216d5b19f6d30c0ef653b74025b8ee..0000000000000000000000000000000000000000
--- a/common/handlers/main.yml
+++ /dev/null
@@ -1,26 +0,0 @@
----
-# file: roles/common/handlers/main.yml
-
-- name: restart ntpd
-  service: name=ntp state=restarted
-
-- name: restart sshd
-  service: name=ssh state=restarted
-
-- name: restart lldpd
-  service: name=lldpd state=restarted
-
-- name: restart rsyslogd
-  service: name=rsyslog state=restarted
-
-- name: rerun depmod
-  command: depmod -ae
-
-- name: update initramfs
-  command: update-initramfs -u
-
-- name: update timezone
-  command: dpkg-reconfigure --frontend noninteractive tzdata
-
-- name: regenerate pam config
-  shell: DEBIAN_FRONTEND=noninteractive pam-auth-update --force
diff --git a/common/tasks/dns.yml b/common/tasks/dns.yml
deleted file mode 100644
index 0a2d51a0a43abeb3eb9f0366e38a03f7052f1c88..0000000000000000000000000000000000000000
--- a/common/tasks/dns.yml
+++ /dev/null
@@ -1,24 +0,0 @@
----
-# file: roles/common/tasks/dns.yml
- 
-- name: ensure dns is configured
-  template: src=resolv.conf.j2 dest=/etc/resolv.conf owner=root group=root mode=0644
-  tags:
-    - dns
-    - config
-
-- name: ensure dbus is installed, since hostnamectl needs this
-  apt: name=dbus state=present
-  tags:
-    - packages
-    - dns
-    - network
-    - config
-
-- name: ensure the hostname is not a fqdn for non-hypervisors
-  hostname: name="{{ inventory_hostname }}"
-  when: not (inventory_hostname in groups['vm-hosts']) and not (inventory_hostname == 'cloud')
-  tags:
-    - dns
-    - network
-    - config
diff --git a/common/tasks/filesystem.yml b/common/tasks/filesystem.yml
deleted file mode 100644
index bd080c5dc9f76295b509019b8ab7c7ab73a7afa4..0000000000000000000000000000000000000000
--- a/common/tasks/filesystem.yml
+++ /dev/null
@@ -1,8 +0,0 @@
----
-# file: roles/common/tasks/filesystem.yml
-
-- name: ensure /tmp is a tmpfs
-  mount: name=/tmp src=tmpfs fstype=tmpfs opts=nosuid,rw,noexec state=mounted
-  tags:
-    - config
-    - mount
diff --git a/common/tasks/locale.yml b/common/tasks/locale.yml
deleted file mode 100644
index 781cbb4851a5ca67d041a81891746237577f7d53..0000000000000000000000000000000000000000
--- a/common/tasks/locale.yml
+++ /dev/null
@@ -1,20 +0,0 @@
----
-
-- apt: name=locales state=latest
-  tags:
-    - packages
-    - locale
-
-- locale_gen: name="{{item}}.UTF-8" state=present
-  with_items:
-    - en_US
-    - de_DE
-    - en_DK
-  tags:
-    - config
-    - locale
-
-- copy: src=locale dest=/etc/default/locale owner=root group=root mode=0644
-  tags:
-    - config
-    - locale
diff --git a/common/tasks/logging.yml b/common/tasks/logging.yml
deleted file mode 100644
index cbd9a3195245d27ad47ca5693759fb57172126fa..0000000000000000000000000000000000000000
--- a/common/tasks/logging.yml
+++ /dev/null
@@ -1,26 +0,0 @@
----
-# file: roles/common/task/logging.yml
-
-## TODO /var/log vs systemd journal
-
-- name: ensure rsyslog is running and enabled
-  service: name=rsyslog state=running enabled=yes
-  tags:
-    - syslog
-    - service
-
-- name: ensure that central logging works
-  template: src=rsyslog.conf.j2 dest=/etc/rsyslog.conf owner=root group=root mode=0644
-  when: ansible_fqdn != "rumo.fsmpi.rwth-aachen.de"
-  notify:
-    - restart rsyslogd
-  tags:
-    - syslog
-    - config
-
-- name: ensure our logrotate.conf is present
-  copy: src=logrotate.conf dest=/etc/logrotate.conf owner=root group=root mode=0644
-  tags:
-    - syslog
-    - config
-
diff --git a/common/tasks/main.yml b/common/tasks/main.yml
deleted file mode 100644
index d50223f47c94c9e515efedf95b26eaaec49c6923..0000000000000000000000000000000000000000
--- a/common/tasks/main.yml
+++ /dev/null
@@ -1,27 +0,0 @@
----
-# file: roles/common/tasks/main.yml
-
-- include: filesystem.yml
-- meta: flush_handlers
-- include: locale.yml
-- meta: flush_handlers
-- include: repositories.yml
-- meta: flush_handlers
-- include: dns.yml
-- meta: flush_handlers
-- include: tls.yml
-- meta: flush_handlers
-- include: sshd.yml
-- meta: flush_handlers
-- include: sudo.yml
-- meta: flush_handlers
-- include: logging.yml
-- meta: flush_handlers
-- include: ntpd.yml
-- meta: flush_handlers
-- include: shell.yml
-- meta: flush_handlers
-- include: software.yml
-- meta: flush_handlers
-- include: sysctl.yml
-- meta: flush_handlers
diff --git a/common/tasks/ntpd.yml b/common/tasks/ntpd.yml
deleted file mode 100644
index 389884040562656f9886038624a0657a8c8febba..0000000000000000000000000000000000000000
--- a/common/tasks/ntpd.yml
+++ /dev/null
@@ -1,30 +0,0 @@
----
-# file: roles/common/tasks/ntp.yml
-
-- name: ensure correct timezone setting
-  copy: src=timezone dest=/etc/timezone owner=root group=root mode=0644
-  notify:
-    - update timezone
-  tags:
-    - config
-    - ntpd
-
-- name: ensure ntpd is installed
-  apt:  name=ntp state=latest
-  tags:
-    - ntpd
-    - packages 
-
-- name: ensure ntpd configured
-  template: src=ntp.conf.j2 dest=/etc/ntp.conf
-  notify:
-    - restart ntpd
-  tags:
-    - ntpd
-    - config
-
-- name: ensure ntpd is running and enabled
-  service: name=ntp state=running enabled=yes
-  tags:
-    - ntpd
-    - service
diff --git a/common/tasks/repositories.yml b/common/tasks/repositories.yml
deleted file mode 100644
index 1923ed5cb9359623207a2cc835b03e64adaff5e9..0000000000000000000000000000000000000000
--- a/common/tasks/repositories.yml
+++ /dev/null
@@ -1,38 +0,0 @@
----
-# file: roles/common/tasks/repositories.yml
-
-- name: provide default sources.list
-  template:
-    src: sources.list
-    dest: /etc/apt/sources.list
-    owner: root
-    group: root
-    mode: 0644
-  tags:
-    - packages
-    - repos
-
-- name: remove old sources
-  file:
-    name: "/etc/apt/sources.list.d/{{item}}.list"
-    state: absent
-  with_items:
-    - ftp_halifax_rwth_aachen_de_debian
-    - security_debian_org
-  tags:
-    - packages
-    - repos
- 
-- name: remove unused packages
-  command: apt-get autoremove -y
-  tags:
-    - packages
-    - repos
-    - clean
-
-- name: update apt cache and upgrade existing packages
-  apt: update_cache=yes upgrade=dist
-  tags:
-    - packages
-    - repos
-    - clean
diff --git a/common/tasks/software.yml b/common/tasks/software.yml
deleted file mode 100644
index 73e5f3019ba5171744b9720e7a79ca40c15e757b..0000000000000000000000000000000000000000
--- a/common/tasks/software.yml
+++ /dev/null
@@ -1,58 +0,0 @@
----
-# file: roles/common/tasks/software.yml
-
-- name: ensure installaton of some essential software
-  apt: state=latest name={{ item }}
-  with_items:
-    - rsync
-    - screen
-    - tmux
-    - sysstat
-    - tcpdump
-    - iotop
-    - pv
-    - atop
-    - htop
-    - build-essential
-    - aptitude
-    - lsof
-    - curl
-    - lftp
-    - strace
-    - nmap
-    - ethtool
-    - telnet
-    - snmp
-    - pwgen
-    - reptyr
-    - file
-    - ipmitool
-    - squashfs-tools
-  tags:
-    - packages
-    - shell
-
-- name: ensure installation of microcode updates
-  apt: state=latest name={{ item }}
-  with_items:
-    - intel-microcode
-    - amd64-microcode
-  tags:
-    - packages
-
-#- name: ensure facter and co are uninstalled
-#  apt: name=libruby2.1:i386,ruby2.1,ruby-json,ruby,facter,vim-addon-manager state=absent
-#  tags:
-#    - packages
-
-- name: remove unused packages
-  command: apt-get autoremove -y
-  tags:
-    - packages
-    - clean
-
-- name: update apt cache and upgrade existing packages
-  apt: update_cache=yes upgrade=dist
-  tags:
-    - packages
-    - deb-updates
diff --git a/common/tasks/sshd.yml b/common/tasks/sshd.yml
deleted file mode 100644
index 45b7b0a843ab0e927187b02e1de024ac2373e25a..0000000000000000000000000000000000000000
--- a/common/tasks/sshd.yml
+++ /dev/null
@@ -1,119 +0,0 @@
----
-# file: roles/common/tasks/sshd.yml
-
-- name: ensure sshd is installed
-  apt:
-    name: openssh-server
-    state: installed
-  tags:
-    - ssh
-    - packages 
-
-- name: ensure sshd configured
-  template:
-    src: sshd_config.j2
-    dest: /etc/ssh/sshd_config
-    owner: root
-    group: root
-    mode: 0644
-    backup: yes
-    validate: '/usr/sbin/sshd -t -f %s'
-  notify:
-    - restart sshd
-  tags:
-    - ssh
-    - config
-
-- name: ensure standard pam configuration for sshd
-  copy:
-    src: pam/sshd
-    dest: /etc/pam.d/sshd
-    owner: root
-    group: root
-    mode: 0644
-  notify:
-    - restart sshd
-  tags:
-    - ssh
-    - config
-
-- name: ensure pam creates a home dir if necessary
-  copy:
-    src: pam/mkhomedir
-    dest: /usr/share/pam-configs/mkhomedir
-    owner: root
-    group: root
-    mode: 0644
-  when: "ssh_mkhomedir"
-  notify:
-    - regenerate pam config
-  tags:
-    - pam
-    - config
-
-- name: ensure sshd is running and enabled
-  service:
-    name: ssh
-    state: started
-    enabled: yes
-  tags:
-    - ssh
-    - service
-
-- name: ensure a proper ssh environment for root
-  file:
-    state: directory
-    path: /root/.ssh
-    owner: root
-    group: root
-    mode: 0700
-  tags:
-    - ssh
-    - root
-
-# filename syntax: name.pub or name+dest_host_1,...,dest_host_n.pub
-- name: ensure our and only our keys are authorized for root
-  assemble:
-    dest: /root/.ssh/authorized_keys
-    owner: root
-    group: root
-    mode: 0600
-    remote_src: False
-    src: "{{ ssh_authorized_keys }}"
-    backup: True
-    ignore_hidden: True
-    regexp: "([^+]+|[^+]+\\+([^+]+,)*{{ inventory_hostname }}(,[^+]+)*).pub"
-  tags:
-    - ssh
-    - root
-
-- name: ensure we fail2ban bad people
-  apt:
-    name: fail2ban
-    state: installed
-  tags:
-    - ssh
-    - packages
-
-- name: ensure we got ourselves protected from sleepiness
-  apt:
-    name: molly-guard
-    state: installed
-  tags:
-    - molly
-    - packages
-    - shell
-    - ssh
-
-- name: ensure screen does not interfere with sleepiness
-  copy:
-    src: molly-guard
-    dest: /etc/molly-guard/rc
-    owner: root
-    group: root
-    mode: 0644
-  tags:
-    - molly
-    - config
-    - shell
-    - ssh
diff --git a/common/tasks/sudo.yml b/common/tasks/sudo.yml
deleted file mode 100644
index 1f77254f7cd937d5869719827b8b1be6e4edef92..0000000000000000000000000000000000000000
--- a/common/tasks/sudo.yml
+++ /dev/null
@@ -1,26 +0,0 @@
----
-# file: roles/common/tasks/sudo.yml
-
-- name: ensure sudo is installed 
-  apt: state=latest name=sudo
-  tags:
-    - sudo
-    - packages
-
-- name: ensure we got a sane sudo config
-  copy: src=sudo/default dest=/etc/sudoers owner=root group=root mode=0440 validate='visudo -q -c -f %s'
-  tags:
-    - sudo
-    - config
-
-- name: check whole sudo config
-  command: visudo -q -c -f /etc/sudoers
-  tags:
-    - sudo
-    - test
-
-- name: ensure we got root
-  user: name=root password={{ rootpassword }}
-  tags:
-    - root
-    - config
diff --git a/common/tasks/sysctl.yml b/common/tasks/sysctl.yml
deleted file mode 100644
index acfd19fb477c407f646d8567873c9a27f2257fc8..0000000000000000000000000000000000000000
--- a/common/tasks/sysctl.yml
+++ /dev/null
@@ -1,17 +0,0 @@
----
-# file: roles/common/tasks/sysctl.yml
-
-- name: ensure deactivation of tcp_timestamps
-  sysctl: name=net.ipv4.tcp_timestamps value=0 state=present sysctl_set=yes
-  tags: 
-    - security
-    - sysctl
-    - config
-
-- name: restrict dmesg access to only root
-  sysctl: name=kernel.dmesg_restrict value=1 state=present sysctl_set=yes
-  tags: 
-    - security
-    - sysctl
-    - config
-
diff --git a/common/tasks/tls.yml b/common/tasks/tls.yml
deleted file mode 100644
index 916b4bf4e881f169a41e48ac68af68504ad8ea99..0000000000000000000000000000000000000000
--- a/common/tasks/tls.yml
+++ /dev/null
@@ -1,19 +0,0 @@
----
-# file: roles/common/tasks/tls.yml
-
-- name: ensure openssl is installed
-  apt: name=openssl state=latest
-  tags:
-    - packages
-    - tls
-
-- name: ensure the sha2 rwth chain is available
-  copy:
-    src: rwth_chain_sha2.pem
-    dest: /etc/ssl/certs/rwth_chain.pem
-    owner: root
-    group: root
-    mode: 0644
-  tags:
-    - tls
-    - rwth
diff --git a/common/templates/ntp.conf.j2 b/common/templates/ntp.conf.j2
deleted file mode 100644
index 1ea2f972f11ac53b8cfc0a874628c17491e73d47..0000000000000000000000000000000000000000
--- a/common/templates/ntp.conf.j2
+++ /dev/null
@@ -1,16 +0,0 @@
-driftfile /var/lib/ntp/ntp.drift
-
-statistics loopstats peerstats clockstats
-filegen loopstats file loopstats type day enable
-filegen peerstats file peerstats type day enable
-filegen clockstats file clockstats type day enable
-
-restrict -4 default kod notrap nomodify nopeer noquery
-restrict -6 default kod notrap nomodify nopeer noquery
-
-restrict 127.0.0.1
-restrict ::1
-
-{% for server in ntpservers %} 
-	server {{ server }} iburst
-{% endfor %}
diff --git a/common/templates/resolv.conf.j2 b/common/templates/resolv.conf.j2
deleted file mode 100644
index 414dbbb3be8c1d44d062eeba30bc3a5d93f3508a..0000000000000000000000000000000000000000
--- a/common/templates/resolv.conf.j2
+++ /dev/null
@@ -1,6 +0,0 @@
-domain {{ domain }}
-search {{ domain }}
-
-{% for server in nameservers %}
-nameserver {{ server }}
-{% endfor %}
diff --git a/common/templates/rsyslog.conf.j2 b/common/templates/rsyslog.conf.j2
deleted file mode 100644
index 26f5868073090b7fa497d560a3ce8e47978a94a4..0000000000000000000000000000000000000000
--- a/common/templates/rsyslog.conf.j2
+++ /dev/null
@@ -1,117 +0,0 @@
-$ModLoad imuxsock # provides support for local system logging
-$ModLoad imklog   # provides kernel logging support
-#$ModLoad immark  # provides --MARK-- message capability
-
-# provides UDP syslog reception
-#$ModLoad imudp
-#$UDPServerRun 514
-
-# provides TCP syslog reception
-#$ModLoad imtcp
-#$InputTCPServerRun 514
-
-
-###########################
-#### GLOBAL DIRECTIVES ####
-###########################
-
-#
-# Use traditional timestamp format.
-# To enable high precision timestamps, comment out the following line.
-#
-$ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat
-
-#
-# Set the default permissions for all log files.
-#
-$FileOwner root
-$FileGroup adm
-$FileCreateMode 0640
-$DirCreateMode 0755
-$Umask 0022
-
-#
-# Where to place spool and state files
-#
-$WorkDirectory /var/spool/rsyslog
-
-$ActionQueueType LinkedList   # use asynchronous processing
-$ActionQueueFileName srvrfwd  # set file name, also enables disk mode
-$ActionResumeRetryCount -1    # infinite retries on insert failure
-$ActionQueueSaveOnShutdown on # save in-memory data if rsyslog shuts down
-*.*       @@{{ syslogserver }}
-
-#
-# Include all config files in /etc/rsyslog.d/
-#
-$IncludeConfig /etc/rsyslog.d/*.conf
-
-
-###############
-#### RULES ####
-###############
-
-#
-# First some standard log files.  Log by facility.
-#
-auth,authpriv.*			/var/log/auth.log
-*.*;auth,authpriv.none		-/var/log/syslog
-#cron.*				/var/log/cron.log
-daemon.*			-/var/log/daemon.log
-kern.*				-/var/log/kern.log
-lpr.*				-/var/log/lpr.log
-mail.*				-/var/log/mail.log
-user.*				-/var/log/user.log
-
-#
-# Logging for the mail system.  Split it up so that
-# it is easy to write scripts to parse these files.
-#
-mail.info			-/var/log/mail.info
-mail.warn			-/var/log/mail.warn
-mail.err			/var/log/mail.err
-
-#
-# Logging for INN news system.
-#
-news.crit			/var/log/news/news.crit
-news.err			/var/log/news/news.err
-news.notice			-/var/log/news/news.notice
-
-#
-# Some "catch-all" log files.
-#
-*.=debug;\
-	auth,authpriv.none;\
-	news.none;mail.none	-/var/log/debug
-*.=info;*.=notice;*.=warn;\
-	auth,authpriv.none;\
-	cron,daemon.none;\
-	mail,news.none		-/var/log/messages
-
-#
-# Emergencies are sent to everybody logged in.
-#
-*.emerg				:omusrmsg:*
-
-#
-# I like to have messages displayed on the console, but only on a virtual
-# console I usually leave idle.
-#
-#daemon,mail.*;\
-#	news.=crit;news.=err;news.=notice;\
-#	*.=debug;*.=info;\
-#	*.=notice;*.=warn	/dev/tty8
-
-# The named pipe /dev/xconsole is for the `xconsole' utility.  To use it,
-# you must invoke `xconsole' with the `-file' option:
-# 
-#    $ xconsole -file /dev/xconsole [...]
-#
-# NOTE: adjust the list below, or you'll go crazy if you have a reasonably
-#      busy site..
-#
-daemon.*;mail.*;\
-	news.err;\
-	*.=debug;*.=info;\
-	*.=notice;*.=warn	|/dev/xconsole
diff --git a/common/templates/sources.list b/common/templates/sources.list
deleted file mode 100644
index 9624c182532e8e66a33458f5f3e7b27c449235d8..0000000000000000000000000000000000000000
--- a/common/templates/sources.list
+++ /dev/null
@@ -1,15 +0,0 @@
-deb http://ftp.halifax.rwth-aachen.de/debian/ {{debian_version}} main contrib non-free
-deb-src http://ftp.halifax.rwth-aachen.de/debian/ {{debian_version}} main contrib non-free
-
-deb http://security.debian.org/ {{debian_version}}/updates main contrib non-free
-deb-src http://security.debian.org/ {{debian_version}}/updates main contrib non-free
-
-{% if apt_use_updates %}
-deb http://ftp.halifax.rwth-aachen.de/debian/ {{debian_version}}-updates main contrib non-free
-deb-src http://ftp.halifax.rwth-aachen.de/debian/ {{debian_version}}-updates main contrib non-free
-{% endif %}
-
-{% if apt_use_backports %}
-deb http://ftp.halifax.rwth-aachen.de/debian/ {{debian_version}}-backports main contrib non-free
-deb-src http://ftp.halifax.rwth-aachen.de/debian/ {{debian_version}}-backports main contrib non-free
-{% endif %}
diff --git a/common/templates/ssh_config b/common/templates/ssh_config
deleted file mode 100644
index 3810e13d739e15cf0404b417eb3a3a193ac90e6b..0000000000000000000000000000000000000000
--- a/common/templates/ssh_config
+++ /dev/null
@@ -1,54 +0,0 @@
-
-# This is the ssh client system-wide configuration file.  See
-# ssh_config(5) for more information.  This file provides defaults for
-# users, and the values can be changed in per-user configuration files
-# or on the command line.
-
-# Configuration data is parsed as follows:
-#  1. command line options
-#  2. user-specific file
-#  3. system-wide file
-# Any configuration value is only changed the first time it is set.
-# Thus, host-specific definitions should be at the beginning of the
-# configuration file, and defaults at the end.
-
-# Site-wide defaults for some commonly used options.  For a comprehensive
-# list of available options, their meanings and defaults, please see the
-# ssh_config(5) man page.
-
-Host *
-#   ForwardAgent no
-#   ForwardX11 no
-#   ForwardX11Trusted yes
-#   RhostsRSAAuthentication no
-#   RSAAuthentication yes
-#   PasswordAuthentication yes
-#   HostbasedAuthentication no
-#   GSSAPIAuthentication no
-#   GSSAPIDelegateCredentials no
-#   GSSAPIKeyExchange no
-#   GSSAPITrustDNS no
-#   BatchMode no
-#   CheckHostIP yes
-#   AddressFamily any
-#   ConnectTimeout 0
-#   StrictHostKeyChecking ask
-#   IdentityFile ~/.ssh/identity
-#   IdentityFile ~/.ssh/id_rsa
-#   IdentityFile ~/.ssh/id_dsa
-#   Port 22
-#   Protocol 2,1
-#   Cipher 3des
-#   Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
-#   MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
-#   EscapeChar ~
-#   Tunnel no
-#   TunnelDevice any:any
-#   PermitLocalCommand no
-#   VisualHostKey no
-#   ProxyCommand ssh -q -W %h:%p gateway.example.com
-#   RekeyLimit 1G 1h
-    SendEnv LANG LC_*
-    HashKnownHosts yes
-    GSSAPIAuthentication yes
-    GSSAPIDelegateCredentials no
diff --git a/common/templates/sshd_config.j2 b/common/templates/sshd_config.j2
deleted file mode 100644
index 0fadada5c25de68f53260cc4684a93b4157e0bd2..0000000000000000000000000000000000000000
--- a/common/templates/sshd_config.j2
+++ /dev/null
@@ -1,95 +0,0 @@
-# Package generated configuration file
-# See the sshd_config(5) manpage for details
-
-# What ports, IPs and protocols we listen for
-Port 22
-# Use these options to restrict which interfaces/protocols sshd will bind to
-#ListenAddress ::
-#ListenAddress 0.0.0.0
-Protocol 2
-{% if ssh_strong_crypto %}
-KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
-Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
-MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-ripemd160-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,umac-128@openssh.com
-{% endif %}
-# HostKeys for protocol version 2
-HostKey /etc/ssh/ssh_host_rsa_key
-HostKey /etc/ssh/ssh_host_ed25519_key
-#Privilege Separation is turned on for security
-UsePrivilegeSeparation yes
-
-# Lifetime and size of ephemeral version 1 server key
-KeyRegenerationInterval 3600
-ServerKeyBits 1024
-
-# Logging
-SyslogFacility AUTH
-LogLevel INFO
-
-# Authentication:
-LoginGraceTime 120
-PermitRootLogin without-password
-StrictModes yes
-
-RSAAuthentication yes
-PubkeyAuthentication yes
-#AuthorizedKeysFile	%h/.ssh/authorized_keys
-
-# Don't read the user's ~/.rhosts and ~/.shosts files
-IgnoreRhosts yes
-# For this to work you will also need host keys in /etc/ssh_known_hosts
-RhostsRSAAuthentication no
-# similar for protocol version 2
-HostbasedAuthentication no
-# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
-#IgnoreUserKnownHosts yes
-
-# To enable empty passwords, change to yes (NOT RECOMMENDED)
-PermitEmptyPasswords no
-
-# Change to yes to enable challenge-response passwords (beware issues with
-# some PAM modules and threads)
-ChallengeResponseAuthentication no
-
-# Change to no to disable tunnelled clear text passwords
-#PasswordAuthentication yes
-
-# Kerberos options
-#KerberosAuthentication no
-#KerberosGetAFSToken no
-#KerberosOrLocalPasswd yes
-#KerberosTicketCleanup yes
-
-# GSSAPI options
-GSSAPIAuthentication {{ 'yes' if ssh_gssapi else 'no' }}
-#GSSAPICleanupCredentials yes
-
-X11Forwarding yes
-X11DisplayOffset 10
-PrintMotd no
-PrintLastLog yes
-TCPKeepAlive yes
-#UseLogin no
-
-#MaxStartups 10:30:60
-Banner /etc/issue.net
-
-# Allow client to pass locale environment variables
-AcceptEnv LANG LC_*
-
-Subsystem sftp /usr/lib/openssh/sftp-server {{ ssh_sftp_options }}
-
-# Set this to 'yes' to enable PAM authentication, account processing,
-# and session processing. If this is enabled, PAM authentication will
-# be allowed through the ChallengeResponseAuthentication and
-# PasswordAuthentication.  Depending on your PAM configuration,
-# PAM authentication via ChallengeResponseAuthentication may bypass
-# the setting of "PermitRootLogin without-password".
-# If you just want the PAM account and session checks to run without
-# PAM authentication, then enable this but set PasswordAuthentication
-# and ChallengeResponseAuthentication to 'no'.
-UsePAM yes
-
-{% for group in ssh_allow_groups %}
-AllowGroups {{ group }}
-{% endfor %}