V8.00.000.2025.06.17
All checks were successful
🛡️ Shell Script Linting / 🛡️ Shell Script Linting (push) Successful in 1m54s

Signed-off-by: Marc S. Weidner <msw@coresecret.dev>
This commit is contained in:
2025-10-12 18:58:03 +01:00
parent 5f36d27c62
commit 140f82829e
8 changed files with 67 additions and 24 deletions

View File

@@ -25,15 +25,16 @@ installation_masking() {
chroot_script "${TARGET}" "
systemctl mask ctrl-alt-del.target sleep.target suspend.target hibernate.target hybrid-sleep.target
"
do_log "info" "file_only" "4133() Masked: [ctrl-alt-del.target sleep.target suspend.target hibernate.target hybrid-sleep.target]"
chroot_script "${TARGET}" "
systemctl mask plymouth-start.service plymouth-quit.service plymouth-quit-wait.service plymouth-read-write.service
"
do_log "info" "file_only" "4133() Masked: [plymouth-start.service plymouth-quit.service plymouth-quit-wait.service plymouth-read-write.service]"
guard_dir && return 0
}
### Prevents accidental 'unset -f'.
# shellcheck disable=SC2034
readonly -f installation_masking
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh

View File

@@ -16,16 +16,13 @@ guard_sourcing
# Build Ultra Hardened dropbear-2025.88 from sources.
# Globals:
# DIR_TMP
# PATH
# PATH_SEPARATOR
# SHELLOPTS
# VAR_DEBUG_TRACE
# TARGET
# VAR_SETUP_PATH
# Arguments:
# None
# Returns:
# 0: on success
# ERR_PATH_NOT_VALID
# ERR_PATH_NOT_VALID: on failure
#######################################
dropbear_build() {
### Declare Arrays, HashMaps, and Variables.
@@ -76,4 +73,7 @@ dropbear_build() {
guard_dir && return 0
}
### Prevents accidental 'unset -f'.
# shellcheck disable=SC2034
readonly -f dropbear_build
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh

View File

@@ -31,10 +31,15 @@ dropbear_initramfs() {
chroot_script "${TARGET}" '
export INITRD=No
apt-get install -y --no-install-recommends --no-install-suggests dropbear-initramfs 2>&1 | tee -a '"${var_logfile}"'
apt-get install -y --no-install-recommends --no-install-suggests dropbear-initramfs dropbear-bin 2>&1 | tee -a '"${var_logfile}"'
echo ExitCode: $? >> '"${var_logfile}"'
'
chroot_script "${TARGET}" '
export INITRD=No
apt-get purge -y dropbear dropbear-run || true
echo ExitCode: $? >> '"${var_logfile}"'
'
chroot_script "${TARGET}" '
export INITRD=No
@@ -42,14 +47,12 @@ dropbear_initramfs() {
echo ExitCode: $? >> '"${var_logfile}"'
'
chroot_script "${TARGET}" '
export INITRD=No
apt-mark hold dropbear dropbear-initramfs 2>&1 | tee -a '"${var_logfile}"'
echo ExitCode: $? >> '"${var_logfile}"'
'
mv "${TARGET}/usr/sbin/dropbear" "${TARGET}/usr/sbin/dropbear.trixie"
install -D -m 0755 -o root -g root "${DIR_TMP}/build/dropbear-2025.88/dropbear" "${TARGET}/usr/sbin/"
do_log "debug" "file_only" "4311() Installation [dropbear] successful."
@@ -73,7 +76,6 @@ Pin-Priority: -1
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf
EOF
insert_header "${TARGET}/etc/apt/preferences.d/99-mask-dropbear-initramfs"
insert_comments "${TARGET}/etc/apt/preferences.d/99-mask-dropbear-initramfs"
cat << 'EOF' >> "${TARGET}/etc/apt/preferences.d/99-mask-dropbear-initramfs"
@@ -85,10 +87,12 @@ Pin-Priority: -1
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf
EOF
chroot_script "${TARGET}" "systemctl mask dropbear.service dropbear.socket"
do_log "info" "file_only" "4311() Masked: [dropbear.service dropbear.socket]"
guard_dir && return 0
}
### Prevents accidental 'unset -f'.
# shellcheck disable=SC2034
readonly -f dropbear_initramfs
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh

View File

@@ -46,6 +46,8 @@ update_initramfs() {
echo ExitCode: \$? >> ${var_logfile}
"
chmod 0400 "${TARGET}/boot/grub/grub.cfg"
guard_dir && return 0
}
### Prevents accidental 'unset -f'.

View File

@@ -37,6 +37,20 @@ installation_ssh() {
chroot_exec "${TARGET}" apt-get install -y --no-install-recommends --no-install-suggests ssh
mkdir -p "${TARGET}/etc/systemd/system/ssh.service.d"
cat << EOF >| "${TARGET}/etc/systemd/system/ssh.service.d/override.conf"
[Unit]
After=network-online.target
Wants=network-online.target
[Service]
### If anything named 'dropbear' survived, kill it before binding.
ExecStartPre=/usr/bin/pkill -x dropbear || :
Restart=on-failure
RestartSec=3s
EOF
install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/banner" "${TARGET}/etc/"
install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/motd" "${TARGET}/etc/"
do_log "info" "file_only" "4420() Installed SSH '/etc/banner' and '/etc/motd'."
@@ -156,4 +170,7 @@ EOF
guard_dir && return 0
}
### Prevents accidental 'unset -f'.
# shellcheck disable=SC2034
readonly -f installation_ssh
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh

View File

@@ -22,17 +22,34 @@ guard_sourcing
# 0: on success
#######################################
hardening_files() {
declare var_bin="" var_binary=""
chmod 0700 "${TARGET}/etc/cron.d" "${TARGET}/etc/cron.daily" "${TARGET}/etc/cron.hourly" "${TARGET}/etc/cron.monthly" \
"${TARGET}/etc/cron.weekly"
chmod 0700 "${TARGET}/etc/sudoers.d"
chmod 0700 "${TARGET}/etc/crontab"
[[ -f "${TARGET}/etc/cron.deny" ]] && rm "${TARGET}/etc/cron.deny"
rm -f "${TARGET}/etc/issue" "${TARGET}/etc/issue.net"
install -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/issue" "${TARGET}/etc/issue"
install -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/issue.net" "${TARGET}/etc/issue.net"
install -d -m 0700 -o root -g root "${TARGET}/root/.ansible"
for var_bin in as gcc g++ cc clang; do
var_binary=$(readlink -f "${TARGET}/usr/bin/${var_bin}") || {
do_log "info" "file_only" "4430() Binary: '${var_bin}' not found, skipping."
continue
}
chmod 0700 "${var_binary}" || {
do_log "info" "file_only" "4430() Binary chmod 0700: '${var_bin}' failed, skipping."
}
done
guard_dir && return 0
}
### Prevents accidental 'unset -f'.
# shellcheck disable=SC2034
readonly -f hardening_files
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh

View File

@@ -46,7 +46,7 @@ install_verification() {
## Increase the buffers to survive stress events.
## Make this bigger for busy systems
-b 8192
-b 16384
## This determine how long to wait in burst of events
--backlog_wait_time 60000