Files
LEMPer/scripts/server_security.sh
2024-12-29 23:58:02 +07:00

600 lines
20 KiB
Bash
Executable File

#!/usr/bin/env bash
# Basic Server Security Hardening
# Min. Requirement : GNU/Linux Ubuntu 18.04
# Last Build : 12/02/2022
# Author : MasEDI.Net (me@masedi.net)
# Since Version : 1.0.0
# Include helper functions.
if [[ "$(type -t run)" != "function" ]]; then
BASE_DIR=$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )
# shellcheck disable=SC1091
. "${BASE_DIR}/utils.sh"
# Make sure only root can run this installer script.
requires_root "$@"
# Make sure only supported distribution can run this installer script.
preflight_system_check
fi
##
# Securing SSH server.
#
function securing_ssh() {
LEMPER_USERNAME=${LEMPER_USERNAME:-"lemper"}
SSH_PASSWORDLESS=${SSH_PASSWORDLESS:-false}
if [[ "${SSH_PASSWORDLESS}" == true ]]; then
echo "
Before starting, let's create a pair of keys that some hosts ask for during installation of the server.
On your local machine, open new terminal and create an SSH key pair using the ssh-keygen tool,
use the following command:
ssh-keygen -t rsa -b ${KEY_HASH_LENGTH}
After this step, you will have the following files: id_rsa and id_rsa.pub (private and public keys).
Never share your private key.
"
#read -rt 120 -p "Press [Enter] to continue..." </dev/tty
#echo ""
sleep 3
echo "Open your public key (id_rsa.pub) file, copy paste the key here..."
RSA_PUB_KEY=${RSA_PUB_KEY:-""}
while ! [[ ${RSA_PUB_KEY} =~ ssh-rsa* ]]; do
read -rp ": " -e RSA_PUB_KEY
done
# Grand access to SSH with key.
if [[ ${RSA_PUB_KEY} =~ ssh-rsa* ]]; then
echo -e "\nSecuring your SSH server with public key..."
if [ ! -d "/home/${LEMPER_USERNAME}/.ssh" ]; then
run mkdir -p "/home/${LEMPER_USERNAME}/.ssh" && \
run chmod 700 "/home/${LEMPER_USERNAME}/.ssh"
fi
if [ ! -f "/home/${LEMPER_USERNAME}/.ssh/authorized_keys" ]; then
run touch "/home/${LEMPER_USERNAME}/.ssh/authorized_keys" && \
run chmod 600 "/home/${LEMPER_USERNAME}/.ssh/authorized_keys"
fi
# Create authorized_keys file and copy your public key here.
if [[ "${DRYRUN}" != true ]]; then
cat >> "/home/${LEMPER_USERNAME}/.ssh/authorized_keys" <<EOL
${RSA_PUB_KEY}
EOL
success "RSA public key added to the authorized_keys."
else
info "RSA public key added in dry run mode."
fi
# Fix authorized_keys file ownership and permission.
run chown -hR "${LEMPER_USERNAME}:${LEMPER_USERNAME}" "/home/${LEMPER_USERNAME}/.ssh"
run chmod 700 "/home/${LEMPER_USERNAME}/.ssh"
run chmod 600 "/home/${LEMPER_USERNAME}/.ssh/authorized_keys"
echo -e "\nEnable SSH password-less login..."
run bash -c "echo -e '\n\n#LEMPer custom config' >> /etc/ssh/sshd_config"
# Restrict root login directly, use sudo user instead.
SSH_ROOT_LOGIN=${SSH_ROOT_LOGIN:-false}
if [[ "${SSH_ROOT_LOGIN}" == false ]]; then
echo "Restricting SSH root login..."
if grep -qwE "^PermitRootLogin\ [a-z]*" /etc/ssh/sshd_config; then
run sed -i "s/^PermitRootLogin\ [a-z]*/PermitRootLogin\ no/g" /etc/ssh/sshd_config
else
#run sed -i "/^#PermitRootLogin/a PermitRootLogin\ no" /etc/ssh/sshd_config
run bash -c "echo 'PermitRootLogin no' >> /etc/ssh/sshd_config"
fi
fi
# Enable RSA key authentication.
if grep -qwE "^RSAAuthentication\ no" /etc/ssh/sshd_config; then
run sed -i "s/^RSAAuthentication\ no/RSAAuthentication\ yes/g" /etc/ssh/sshd_config
else
#run sed -i "/^#RSAAuthentication/a RSAAuthentication\ yes" /etc/ssh/sshd_config
run bash -c "echo 'RSAAuthentication yes' >> /etc/ssh/sshd_config"
fi
# Enable pub key authentication.
if grep -qwE "^PubkeyAuthentication\ no" /etc/ssh/sshd_config; then
run sed -i "s/^PubkeyAuthentication\ no/PubkeyAuthentication\ yes/g" /etc/ssh/sshd_config
else
#run sed -i "/^#PubkeyAuthentication/a PubkeyAuthentication\ yes" /etc/ssh/sshd_config
run bash -c "echo 'PubkeyAuthentication yes' >> /etc/ssh/sshd_config"
fi
# Disable password authentication for password-less login using key.
if grep -qwE "^PasswordAuthentication\ [a-z]*" /etc/ssh/sshd_config; then
run sed -i "s/^PasswordAuthentication\ [a-z]*/PasswordAuthentication\ no/g" /etc/ssh/sshd_config
else
#run sed -i "/^#PasswordAuthentication/a PasswordAuthentication\ no" /etc/ssh/sshd_config
run bash -c "echo 'PasswordAuthentication no' >> /etc/ssh/sshd_config"
fi
if grep -qwE "^ClientAliveInterval\ [0-9]*" /etc/ssh/sshd_config; then
run sed -i "s/^ClientAliveInterval\ [0-9]*/ClientAliveInterval\ 600/g" /etc/ssh/sshd_config
else
#run sed -i "/^#ClientAliveInterval/a ClientAliveInterval\ 600" /etc/ssh/sshd_config
run bash -c "echo 'ClientAliveInterval 600' >> /etc/ssh/sshd_config"
fi
if grep -qwE "^ClientAliveCountMax\ [0-9]*" /etc/ssh/sshd_config; then
run sed -i "s/^ClientAliveCountMax\ [0-9]*/ClientAliveCountMax\ 3/g" /etc/ssh/sshd_config
else
#run sed -i "/^#ClientAliveCountMax/a ClientAliveCountMax\ 3" /etc/ssh/sshd_config
run bash -c "echo 'ClientAliveCountMax 3' >> /etc/ssh/sshd_config"
fi
fi
fi
# Securing the SSH server.
echo "Securing your SSH server with custom port..."
SSH_PORT=${SSH_PORT:-""}
while ! [[ ${SSH_PORT} =~ ^[0-9]+$ ]]; do
read -rp "Custom SSH port (default SSH port is 22): " -e SSH_PORT
done
if [[ ${SSH_PORT} =~ ^[0-9]+$ ]]; then
if grep -qwE "^Port\ [0-9]*" /etc/ssh/sshd_config; then
run sed -i "s/^Port\ [0-9]*/Port\ ${SSH_PORT}/g" /etc/ssh/sshd_config
else
run sed -i "/^#Port\ [0-9]*/a Port\ ${SSH_PORT}" /etc/ssh/sshd_config
fi
# Save config.
#save_config -e "HOSTNAME=${HOSTNAME}\nSERVER_IP=${SERVER_IP}\nSSH_PORT=${SSH_PORT}"
run sudo sed -i "s|^SERVER_SSH_PORT=[0-9]*|SERVER_SSH_PORT=${SSH_PORT}|g" /etc/lemper/lemper.conf
# Save log.
save_log "Default SSH port updated to ${SSH_PORT}."
success "SSH port updated to ${SSH_PORT}."
else
info "Unable to update SSH port."
fi
# Restart SSH service after LEMPer installation completed.
run service sshd restart
}
##
# Install & Configure Uncomplicated Firewall (UFW).
#
function install_ufw() {
SSH_PORT=${1:-"${SSH_PORT}"}
echo "Installing Uncomplicated Firewall (UFW)..."
if [[ -n $(command -v apf) ]]; then
# Remove APF+BFD if exists.
remove_apf
fi
if [[ -n $(command -v csf) ]]; then
# Remove CSF+LFD if exists.
remove_csf
fi
# Install UFW
run apt-get install -q -y ufw
# UFW app rules is here /etc/ufw/applications.d
if [[ -n $(command -v ufw) ]]; then
echo "Configuring UFW firewall rules..."
# Close all incoming ports.
run ufw default deny incoming
# Open all outgoing ports.
run ufw default allow outgoing
# Open SSH port.
run ufw allow "${SSH_PORT}/tcp"
# Open HTTP port.
run ufw allow 80
run ufw allow 8082 #LEMPer port
# Open HTTPS port.
run ufw allow 443
run ufw allow 8083 #LEMPer port
# Open MySQL port.
if [[ "${MYSQL_ALLOW_REMOTE}" == true ]]; then
run ufw allow 3306
fi
# Open FTP ports.
if [[ "${IINSTALL_FTP_SERVER}" == true ]]; then
FTP_MIN_PORT=${FTP_MIN_PORT:-45000}
FTP_MAX_PORT=${FTP_MAX_PORT:-45099}
run ufw allow 20/tcp
run ufw allow 21/tcp
# For TLS enabled.
run ufw allow 990/tcp
# The range of passive ports.
run ufw allow "${FTP_MIN_PORT}:${FTP_MAX_PORT}/tcp"
fi
if [[ "${INSTALL_MAILER}" == true ]]; then
# Open SMTPs port.
run ufw allow 25/tcp
run ufw allow 465/tcp
run ufw allow 587/tcp
# Open IMAPs ports.
run ufw allow 143/tcp
run ufw allow 993/tcp
# Open POP3s ports.
run ufw allow 110/tcp
run ufw allow 995/tcp
fi
# Open DNS port.
run ufw allow 53
# Open ntp port : to sync the clock of your machine.
#run ufw allow 123/udp
# Turn on firewall.
run ufw --force enable
# Restart
if [[ "${DRYRUN}" != true ]]; then
if systemctl restart ufw; then
success "UFW firewall installed successfully."
else
info "Something went wrong with UFW installation."
fi
else
info "UFW firewall installed in dry run mode."
fi
fi
}
##
# Install & Configure ConfigServer Security & Firewall (CSF).
#
function install_csf() {
SSH_PORT=${1:-"${SSH_PORT}"}
echo "Installing CSF+LFD firewall..."
if [[ -n $(command -v ufw) ]]; then
# Remove default Ubuntu firewall (UFW) if exists.
remove_ufw
fi
if [[ -n $(command -v apf) ]]; then
# Remove APF+BFD if exists.
remove_apf
fi
# Install requirements.
echo "Installing requirement packages..."
if [[ -n $(command -v cpan) ]]; then
run cpan -i "LWP LWP::Protocol::https GD::Graph IO::Socket::INET6"
else
run apt-get install -q -y libwww-perl liblwp-protocol-https-perl \
libgd-graph-perl libio-socket-inet6-perl
fi
local CURRENT_DIR && \
CURRENT_DIR=$(pwd)
run cd "${BUILD_DIR}" || return 1
echo "Installing CSF+LFD firewall..."
if curl -sLI https://download.configserver.com/csf.tgz | grep -q "HTTP/[.12]* [2].."; then
run curl -sSL -o csf.tgz https://download.configserver.com/csf.tgz && \
run tar -xzf csf.tgz && \
run cd csf/ && \
run sh install.sh && \
run cd ../ || return 1
if [[ -f /usr/local/csf/bin/csftest.pl ]]; then
run perl /usr/local/csf/bin/csftest.pl
fi
fi
if [[ -f /etc/csf/csf.conf ]]; then
echo "Configuring CSF+LFD firewall rules..."
# Enable CSF.
run sed -i 's/^TESTING\ =\ "1"/TESTING\ =\ "0"/g' /etc/csf/csf.conf
# Allowed ports.
CSF_ALLOW_PORTS="53,80,8081,8082,8083,8443,25,465,587,110,143,993,995"
# Open MySQL port for remote client access.
if [[ "${MYSQL_ALLOW_REMOTE}" == true ]]; then
CSF_ALLOW_PORTS="${CSF_ALLOW_PORTS},3306"
fi
# Open FTP ports.
if [[ "${INSTALL_VSFTPD}" == true ]]; then
FTP_MIN_PORT=${FTP_MIN_PORT:-45000}
FTP_MAX_PORT=${FTP_MAX_PORT:-45099}
CSF_ALLOW_PORTS="${CSF_ALLOW_PORTS},20,21,990,${FTP_MIN_PORT}:${FTP_MAX_PORT}"
fi
# Allowed incoming TCP ports.
run sed -i "s/^TCP_IN\ =\ \"[0-9_,]*\"/TCP_IN\ =\ \"${CSF_ALLOW_PORTS}\"/g" /etc/csf/csf.conf
# Allowed outgoing TCP ports.
run sed -i "s/^TCP_OUT\ =\ \"[0-9_,]*\"/TCP_OUT\ =\ \"${CSF_ALLOW_PORTS}\"/g" /etc/csf/csf.conf
# IPv6 support (requires ip6tables).
if [[ -n $(command -v ip6tables) ]]; then
ip6tables_version=$(ip6tables --version | grep 'v' | cut -d'v' -f2)
if ! version_older_than "${ip6tables_version}" "1.4.3"; then
echo "Configuring CSF+LFD for IPv6..."
# Enable IPv6 support.
run sed -i 's/^IPV6\ =\ "0"/IPV6\ =\ "1"/g' /etc/csf/csf.conf
# Allowed incoming TCP ports for IPv6.
run sed -i "s/^TCP6_IN\ =\ \"[0-9_,]*\"/TCP6_IN\ =\ \"${CSF_ALLOW_PORTS}\"/g" /etc/csf/csf.conf
# Allowed outgoing TCP ports for IPv6.
run sed -i "s/^TCP6_OUT\ =\ \"[0-9_,]*\"/TCP6_OUT\ =\ \"${CSF_ALLOW_PORTS}\"/g" /etc/csf/csf.conf
else
info "ip6tables version greater than 1.4.3 required for IPv6 support."
fi
fi
fi
# Clean up installation files.
run rm -fr csf/
run cd "${CURRENT_DIR}" || return 1
if [[ "${DRYRUN}" != true ]]; then
if [[ -n $(command -v csf) && -n $(command -v lfd) ]]; then
if systemctl restart csf; then
success "CSF firewall installed successfully. Starting now..."
else
info "Something went wrong with CSF installation."
fi
if systemctl restart lfd; then
success "LFD firewall installed successfully. Starting now..."
else
info "Something went wrong with LFD installation."
fi
else
info "Something went wrong with CSF+LFD installation."
fi
else
info "CSF+LFD firewall installed in dry run mode."
fi
}
##
# Install & Configure Advanced Policy Firewall (APF).
#
function install_apf() {
SSH_PORT=${1:-"${SSH_PORT}"}
APF_VERSION=${APF_VERSION:-"1.7.6-2"}
echo "Installing APF+BFD iptables firewall..."
if [[ -n $(command -v ufw) ]]; then
# Remove default Ubuntu firewall (UFW) if exists.
remove_ufw
fi
if [[ -n $(command -v csf) ]]; then
# Remove CSF+LFD if exists.
remove_csf
fi
local CURRENT_DIR && \
CURRENT_DIR=$(pwd)
run cd "${BUILD_DIR}" || return 1
echo "Installing APF+BFD firewall..."
if curl -sLI "https://github.com/rfxn/advanced-policy-firewall/archive/${APF_VERSION}.tar.gz" \
| grep -q "HTTP/[.12]* [2].."; then
run curl -sSL -o "${APF_VERSION}.tar.gz" "https://github.com/rfxn/advanced-policy-firewall/archive/${APF_VERSION}.tar.gz" && \
run tar -xf "${APF_VERSION}.tar.gz" && \
run cd advanced-policy-firewall-*/ && \
run bash install.sh && \
run cd ../ || return 1
fi
if [ -f /etc/apf/conf.apf ]; then
echo "Configuring APF+BFD firewall rules..."
# Enable APF.
run sed -i "s/^DEVEL_MODE=\"1\"/DEVEL_MODE=\"0\"/g" /etc/apf/conf.apf
# Get ethernet interface.
IFACE=${IFACE:-$(find /sys/class/net -type l | grep -e "enp\|eth0" | cut -d'/' -f5)}
# Set ethernet interface to monitor.
run sed -i "s/^IFACE_UNTRUSTED=\"[0-9a-zA-Z]*\"/IFACE_UNTRUSTED=\"${IFACE}\"/g" /etc/apf/conf.apf
# Enable fast load.
run sed -i 's/^SET_FASTLOAD="0"/SET_FASTLOAD="1"/g' /etc/apf/conf.apf
fi
# Clean up installation files.
run rm -fr advanced-policy-firewall-*/
run cd "${CURRENT_DIR}" || return 1
if [[ "${DRYRUN}" == true ]]; then
info "APF+BFD firewall installed in dry run mode."
else
if [[ -n $(command -v apf) ]]; then
if systemctl restart apf; then
success "APF firewall installed successfully. Starting now..."
else
info "Something went wrong with APF installation."
fi
else
info "Something went wrong with APF installation."
fi
fi
}
##
# Remove UFW.
#
function remove_ufw() {
if [[ -n $(command -v ufw) ]]; then
echo "Found UFW iptables firewall, trying to remove it..."
#run service ufw stop
run ufw disable
run systemctl stop ufw
echo "Removing UFW iptables firewall..."
run apt-get remove -q -y ufw
fi
}
##
# Remove CSF.
#
function remove_csf() {
if [[ -n $(command -v csf) || -f /usr/lib/systemd/system/csf.service ]]; then
echo "Found CSF+LFD iptables firewall, trying to remove it..."
if [[ -f /etc/csf/uninstall.sh ]]; then
run bash /etc/csf/uninstall.sh
fi
fi
}
##
# Remove APF.
#
function remove_apf() {
if [[ -n $(command -v apf) && -f /etc/apf/conf.apf ]]; then
echo "Found APF+BFD iptables firewall, trying to remove it..."
#run service apf stop
run systemctl stop apf
echo "Removing APF+BFD iptables firewall..."
run rm -rf /etc/apf
run rm -f /etc/cron.daily/fw
run rm -f /etc/init.d/apf
run rm -f /usr/local/sbin/apf
run rm -f /usr/local/sbin/fwmgr
fi
}
##
# Install IP-tables based firewall.
#
function install_firewall() {
echo -e "\nIPtables-based Firewall Installation\n"
info "Do Not Run any other iptables firewall configuration script.
Any other iptables based firewall will be removed otherwise they will conflict."
echo ""
if [[ "${AUTO_INSTALL}" == true ]]; then
DO_INSTALL_FW="y"
fi
while [[ ${DO_INSTALL_FW} != "y" && ${DO_INSTALL_FW} != "n" ]]; do
read -rp "Do you want to install Firewall configurator? [y/n]: " -i y -e DO_INSTALL_FW
done
if [[ "${DO_INSTALL_FW}" == y* && "${INSTALL_FW}" == true ]]; then
if [[ "${AUTO_INSTALL}" == true ]]; then
# Set default Iptables-based firewall configutor engine.
SELECTED_FW_CONFIGURATOR=${FW_CONFIGURATOR:-"ufw"}
else
# Menu Install FW
echo ""
echo "Which Firewall configurator engine to install?"
echo "Available configurator engine:"
echo " 1). Uncomplicated Firewall (ufw)"
echo " 2). ConfigServer Security Firewall (csf)"
echo " 3). Advanced Policy Firewall (apf)"
echo "------------------------------------------------"
while [[ ${SELECTED_FW_CONFIGURATOR} != "1" && ${SELECTED_FW_CONFIGURATOR} != "2" \
&& ${SELECTED_FW_CONFIGURATOR} != "3" && ${SELECTED_FW_CONFIGURATOR} != "ufw" \
&& ${SELECTED_FW_CONFIGURATOR} != "csf" && ${SELECTED_FW_CONFIGURATOR} != "apf" ]]; do
read -rp "Select an option [1-3]: " -i "${FW_CONFIGURATOR}" -e SELECTED_FW_CONFIGURATOR
done
echo ""
fi
# Ensure that iptables installed.
if [[ -z $(command -v iptables) ]]; then
echo "Iptables is required, trying to install it first..."
run apt-get install -q -y iptables
fi
case "${SELECTED_FW_CONFIGURATOR}" in
apf)
install_apf "${SSH_PORT}"
;;
csf)
install_csf "${SSH_PORT}"
;;
ufw|*)
install_ufw "${SSH_PORT}"
;;
esac
else
info "Firewall installation skipped."
fi
}
##
# Initialize server security.
#
function init_secure_server() {
if [[ "${AUTO_INSTALL}" == true ]]; then
DO_SECURE_SERVER="y"
else
while [[ "${DO_SECURE_SERVER}" != "y" && "${DO_SECURE_SERVER}" != "n" && "${AUTO_INSTALL}" != true ]]; do
read -rp "Do you want to enable basic server security? [y/n]: " -i y -e DO_SECURE_SERVER
done
fi
if [[ "${DO_SECURE_SERVER}" == Y* || "${DO_SECURE_SERVER}" == y* ]]; then
securing_ssh "$@"
install_firewall "$@"
if [[ ${SSH_PORT} -ne 22 ]]; then
echo -e "\nYou're running SSH server with modified configuration, restart to apply your changes.
use this command: service ssh restart"
fi
fi
}
echo "[LEMPer Stack Basic Server Security]"
# Start running things from a call at the end so if this script is executed
# after a partial download it doesn't do anything.
if [[ "${1}" == "--remove" || "${1}" == "--uninstall" ]]; then
remove_apf
remove_csf
remove_ufw
else
init_secure_server "$@"
fi