V8.00.000.2025.06.17
All checks were successful
🛡️ Shell Script Linting / 🛡️ Shell Script Linting (push) Successful in 55s
All checks were successful
🛡️ Shell Script Linting / 🛡️ Shell Script Linting (push) Successful in 55s
Signed-off-by: Marc S. Weidner <msw@coresecret.dev>
This commit is contained in:
@@ -110,7 +110,9 @@ dropbear_setup() {
|
|||||||
"${TARGET}/etc/initramfs-tools/files/"
|
"${TARGET}/etc/initramfs-tools/files/"
|
||||||
|
|
||||||
### Install the script to be called inside the initramfs environment for preparing dropbear execution.
|
### Install the script to be called inside the initramfs environment for preparing dropbear execution.
|
||||||
chroot_exec "${TARGET}" mv /usr/share/initramfs-tools/scripts/init-premount/dropbear /root/.ciss/cdi/backup/dropbear.trixie
|
mkdir -p "${TARGET}/root/.ciss/cdi/backup/usr/share/initramfs-tools/scripts/init-premount"
|
||||||
|
chroot_exec "${TARGET}" mv /usr/share/initramfs-tools/scripts/init-premount/dropbear \
|
||||||
|
/root/.ciss/cdi/backup/usr/share/initramfs-tools/scripts/init-premount/dropbear.trixie
|
||||||
chmod 0644 "${TARGET}/root/.ciss/cdi/backup/dropbear.trixie"
|
chmod 0644 "${TARGET}/root/.ciss/cdi/backup/dropbear.trixie"
|
||||||
install -D -m 0755 -o root -g root "${VAR_SETUP_PATH}/includes/target/usr/share/initramfs-tools/scripts/init-premount/dropbear" \
|
install -D -m 0755 -o root -g root "${VAR_SETUP_PATH}/includes/target/usr/share/initramfs-tools/scripts/init-premount/dropbear" \
|
||||||
"${TARGET}/usr/share/initramfs-tools/scripts/init-premount/"
|
"${TARGET}/usr/share/initramfs-tools/scripts/init-premount/"
|
||||||
|
|||||||
@@ -30,7 +30,6 @@ guard_sourcing
|
|||||||
#######################################
|
#######################################
|
||||||
hardening_fail2ban() {
|
hardening_fail2ban() {
|
||||||
### Declare Arrays, HashMaps, and Variables.
|
### Declare Arrays, HashMaps, and Variables.
|
||||||
declare
|
|
||||||
declare -r var_logfile="/root/.ciss/cdi/log/4420_hardening_fail2ban.log"
|
declare -r var_logfile="/root/.ciss/cdi/log/4420_hardening_fail2ban.log"
|
||||||
|
|
||||||
chroot_logger "${TARGET}${var_logfile}"
|
chroot_logger "${TARGET}${var_logfile}"
|
||||||
@@ -95,6 +94,7 @@ findtime = 1d
|
|||||||
bantime = 1d
|
bantime = 1d
|
||||||
protocol = tcp,udp
|
protocol = tcp,udp
|
||||||
|
|
||||||
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
else
|
else
|
||||||
@@ -139,6 +139,7 @@ findtime = 1d
|
|||||||
bantime = 1d
|
bantime = 1d
|
||||||
protocol = tcp,udp
|
protocol = tcp,udp
|
||||||
|
|
||||||
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -40,8 +40,6 @@ nuke_passphrase() {
|
|||||||
' "${DIR_CNF}/partitioning.yaml" | head -n1
|
' "${DIR_CNF}/partitioning.yaml" | head -n1
|
||||||
)"
|
)"
|
||||||
|
|
||||||
do_log "debug" "file_only" "0105() var_nuke_rounds: ${var_nuke_rounds}"
|
|
||||||
|
|
||||||
[[ ! -f "${var_nuke_pwd_file}" ]] && return 0
|
[[ ! -f "${var_nuke_pwd_file}" ]] && return 0
|
||||||
|
|
||||||
guard_trace on
|
guard_trace on
|
||||||
|
|||||||
Reference in New Issue
Block a user