V8.00.000.2025.06.17
Signed-off-by: Marc S. Weidner <msw@coresecret.dev>
This commit is contained in:
@@ -12,6 +12,9 @@
|
|||||||
|
|
||||||
### Contributions so far see ./docs/CREDITS.md
|
### Contributions so far see ./docs/CREDITS.md
|
||||||
|
|
||||||
|
# TODO: Move this command later than 4131_installation_systemd.sh
|
||||||
|
### Set the X11 keyboard layout (for graphical environments).
|
||||||
|
#do_in_target "${TARGET}" localectl set-x11-keymap "${locale_keyboard_xkb_keymap}"
|
||||||
# TODO: Update preseed.yaml for pgp signing key AND / OR implementation of presigned unlock_wrapper.sh
|
# TODO: Update preseed.yaml for pgp signing key AND / OR implementation of presigned unlock_wrapper.sh
|
||||||
# TODO: Implement Clang Build Chain and Secure Boot PK CISS.ROOT.CA Signing Workflow
|
# TODO: Implement Clang Build Chain and Secure Boot PK CISS.ROOT.CA Signing Workflow
|
||||||
# TODO: Update preseed.yaml for pgp signing key OR implementation of presigned unlock_wrapper.sh
|
# TODO: Update preseed.yaml for pgp signing key OR implementation of presigned unlock_wrapper.sh
|
||||||
@@ -290,7 +293,7 @@ update_initramfs
|
|||||||
|
|
||||||
### CDI_4400
|
### CDI_4400
|
||||||
echo "MAIN PROGRAM SEQUENCE: 4400_kernel_modules.sh ..."
|
echo "MAIN PROGRAM SEQUENCE: 4400_kernel_modules.sh ..."
|
||||||
kernel_modules
|
kernel_modules && kernel_modprobe
|
||||||
echo "MAIN PROGRAM SEQUENCE: 4410_kernel_sysctl.sh ..."
|
echo "MAIN PROGRAM SEQUENCE: 4410_kernel_sysctl.sh ..."
|
||||||
kernel_sysctl
|
kernel_sysctl
|
||||||
echo "MAIN PROGRAM SEQUENCE: 4420_installation_ssh.sh ..."
|
echo "MAIN PROGRAM SEQUENCE: 4420_installation_ssh.sh ..."
|
||||||
|
|||||||
@@ -302,6 +302,6 @@ partitioning() {
|
|||||||
printf "%s\n" "${ary_paths_unsorted[@]}" >| "${DIR_LOG}/mount_paths_unsorted.log"
|
printf "%s\n" "${ary_paths_unsorted[@]}" >| "${DIR_LOG}/mount_paths_unsorted.log"
|
||||||
printf "%s\n" "${ARY_PATHS_SORTED[@]}" >| "${DIR_LOG}/mount_paths_sorted.log"
|
printf "%s\n" "${ARY_PATHS_SORTED[@]}" >| "${DIR_LOG}/mount_paths_sorted.log"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -53,6 +53,6 @@ benchmarking_encryption() {
|
|||||||
# shellcheck disable=SC2155
|
# shellcheck disable=SC2155
|
||||||
declare -girx VAR_KDF_MEMORY=$(awk -F'[ ,]+' '{print $4}' <<<"${var_result}")
|
declare -girx VAR_KDF_MEMORY=$(awk -F'[ ,]+' '{print $4}' <<<"${var_result}")
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -202,6 +202,6 @@ partition_encryption() {
|
|||||||
|
|
||||||
done
|
done
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -137,6 +137,6 @@ partition_formatting() {
|
|||||||
|
|
||||||
done
|
done
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -363,6 +363,6 @@ mount_partition() {
|
|||||||
|
|
||||||
done
|
done
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -53,6 +53,6 @@ uuid_logger() {
|
|||||||
printf '%-63sUUID=%s\n' "${var_mountpoint}" "${var_uuid}" >> "${LOG_UID}"
|
printf '%-63sUUID=%s\n' "${var_mountpoint}" "${var_uuid}" >> "${LOG_UID}"
|
||||||
done
|
done
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -52,7 +52,7 @@ func_debootstrap() {
|
|||||||
install -d -m 0700 -o root -g root "${var_target}/root/.ciss/cdi/backup"
|
install -d -m 0700 -o root -g root "${var_target}/root/.ciss/cdi/backup"
|
||||||
install -d -m 0700 -o root -g root "${var_target}/root/.ciss/cdi/log"
|
install -d -m 0700 -o root -g root "${var_target}/root/.ciss/cdi/log"
|
||||||
install -d -m 0700 -o root -g root "${var_target}/root/.ciss/cdi/hooks"
|
install -d -m 0700 -o root -g root "${var_target}/root/.ciss/cdi/hooks"
|
||||||
return 0
|
guard_dir && return 0
|
||||||
|
|
||||||
else
|
else
|
||||||
|
|
||||||
|
|||||||
@@ -112,6 +112,6 @@ prepare_mounts() {
|
|||||||
declare -gx VAR_CHROOT_ACTIVATED="system"
|
declare -gx VAR_CHROOT_ACTIVATED="system"
|
||||||
do_log "info" "file_only" "4010() Command: [declare -gx VAR_CHROOT_ACTIVATED=system]"
|
do_log "info" "file_only" "4010() Command: [declare -gx VAR_CHROOT_ACTIVATED=system]"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -38,6 +38,6 @@ remove_x509() {
|
|||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -72,6 +72,6 @@ EOF
|
|||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -100,6 +100,6 @@ EOF
|
|||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -34,8 +34,6 @@ EOF
|
|||||||
|
|
||||||
do_in_target "${TARGET}" dpkg-reconfigure -f noninteractive tzdata
|
do_in_target "${TARGET}" dpkg-reconfigure -f noninteractive tzdata
|
||||||
|
|
||||||
do_log "info" "file_only" "4040() Timezone updated successfully."
|
guard_dir && return 0
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -150,6 +150,6 @@ EOF
|
|||||||
### Set the X11 keyboard layout (for graphical environments).
|
### Set the X11 keyboard layout (for graphical environments).
|
||||||
#do_in_target "${TARGET}" localectl set-x11-keymap "${locale_keyboard_xkb_keymap}"
|
#do_in_target "${TARGET}" localectl set-x11-keymap "${locale_keyboard_xkb_keymap}"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -178,8 +178,6 @@ EOF
|
|||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
do_log "info" "file_only" "4100() Sources lists: generated successfully."
|
guard_dir && return 0
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -69,6 +69,6 @@ update_sources() {
|
|||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -42,7 +42,7 @@ installation_kernel() {
|
|||||||
|
|
||||||
do_log "info" "file_only" "4120() Kernel image: '${VAR_KERNEL}' installed successfully."
|
do_log "info" "file_only" "4120() Kernel image: '${VAR_KERNEL}' installed successfully."
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
|
|
||||||
else
|
else
|
||||||
|
|
||||||
@@ -54,7 +54,7 @@ installation_kernel() {
|
|||||||
|
|
||||||
do_log "info" "file_only" "4120() Kernel image: '${image}' installed successfully."
|
do_log "info" "file_only" "4120() Kernel image: '${image}' installed successfully."
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|||||||
@@ -127,6 +127,6 @@ installation_toolset() {
|
|||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -49,6 +49,6 @@ installation_systemd() {
|
|||||||
systemctl --version 2>&1 | tee -a ${var_logfile} | grep -qi 'systemd' || echo '[WARN]: systemd not verifiable' >> ${var_logfile}
|
systemctl --version 2>&1 | tee -a ${var_logfile} | grep -qi 'systemd' || echo '[WARN]: systemd not verifiable' >> ${var_logfile}
|
||||||
"
|
"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -33,6 +33,6 @@ installation_machineid() {
|
|||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -28,6 +28,6 @@ installation_masking() {
|
|||||||
|
|
||||||
do_log "info" "file_only" "4133() Masked: [ctrl-alt-del.target sleep.target suspend.target hibernate.target hybrid-sleep.target]."
|
do_log "info" "file_only" "4133() Masked: [ctrl-alt-del.target sleep.target suspend.target hibernate.target hybrid-sleep.target]."
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -76,6 +76,6 @@ installation_microcode() {
|
|||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -78,7 +78,7 @@ installation_chrony() {
|
|||||||
|
|
||||||
rm -f "${var_of}"
|
rm -f "${var_of}"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
|
|||||||
@@ -199,8 +199,6 @@ tmpfs /run tmpfs
|
|||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=200 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=200 ft=sh
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
do_log "info" "file_only" "4200() fstab generated successfully."
|
guard_dir && return 0
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -104,12 +104,12 @@ EOF
|
|||||||
mkdir -p "${TARGET}/usr/lib/cryptsetup/scripts"
|
mkdir -p "${TARGET}/usr/lib/cryptsetup/scripts"
|
||||||
|
|
||||||
### Install the script to be called inside initramfs environment for unlocking LUKS and NUKE Devices.
|
### Install the script to be called inside initramfs environment for unlocking LUKS and NUKE Devices.
|
||||||
install -m 0755 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/initramfs-tools/files/unlock-wrapper.sh" \
|
install -m 0755 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/initramfs-tools/files/unlock_wrapper.sh" \
|
||||||
"${TARGET}/etc/initramfs-tools/files/"
|
"${TARGET}/etc/initramfs-tools/files/"
|
||||||
install -m 0755 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/initramfs-tools/files/unlock-wrapper.sh" \
|
install -m 0755 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/initramfs-tools/files/unlock_wrapper.sh" \
|
||||||
"${TARGET}/lib/cryptsetup/scripts/"
|
"${TARGET}/lib/cryptsetup/scripts/"
|
||||||
|
|
||||||
write_crypttab "${var_encryption_label}" "UUID=${var_luks_uuid}" "none" "luks,discard,initramfs,keyscript=/lib/cryptsetup/scripts/unlock-wrapper.sh"
|
write_crypttab "${var_encryption_label}" "UUID=${var_luks_uuid}" "none" "luks,discard,initramfs,keyscript=/lib/cryptsetup/scripts/unlock_wrapper.sh"
|
||||||
|
|
||||||
else
|
else
|
||||||
|
|
||||||
@@ -155,8 +155,6 @@ EOF
|
|||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=200 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=200 ft=sh
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
do_log "info" "file_only" "4210() crypttab generated successfully."
|
guard_dir && return 0
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -38,6 +38,6 @@ installation_cryptsetup() {
|
|||||||
|
|
||||||
do_log "info" "file_only" "4220() Installation [cryptsetup cryptsetup-initramfs] successful."
|
do_log "info" "file_only" "4220() Installation [cryptsetup cryptsetup-initramfs] successful."
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -227,7 +227,7 @@ EOF
|
|||||||
fi
|
fi
|
||||||
chmod -R 0700 "${TARGET}/etc/grub.d"
|
chmod -R 0700 "${TARGET}/etc/grub.d"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
|
|||||||
@@ -51,9 +51,8 @@ update_grub_password() {
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
do_in_target "${TARGET}" update-grub
|
do_in_target "${TARGET}" update-grub
|
||||||
do_log "info" "file_only" "4240() GRUB Password installed successfully."
|
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
|
|||||||
@@ -72,6 +72,6 @@ update_grub_bootparameter() {
|
|||||||
do_log "info" "file_only" "4250() Setting GRUB_CMDLINE_LINUX_DEFAULT: [${VAR_GRUB_CMDLINE_LINUX_DEFAULT}]."
|
do_log "info" "file_only" "4250() Setting GRUB_CMDLINE_LINUX_DEFAULT: [${VAR_GRUB_CMDLINE_LINUX_DEFAULT}]."
|
||||||
do_log "info" "file_only" "4250() Setting GRUB_CMDLINE_LINUX: [${VAR_GRUB_CMDLINE_LINUX}]."
|
do_log "info" "file_only" "4250() Setting GRUB_CMDLINE_LINUX: [${VAR_GRUB_CMDLINE_LINUX}]."
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -280,6 +280,6 @@ EOF
|
|||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -74,11 +74,6 @@ dropbear_build() {
|
|||||||
' 2>&1 | tee -a "${TARGET}${var_logfile}"
|
' 2>&1 | tee -a "${TARGET}${var_logfile}"
|
||||||
[[ "${VAR_DEBUG_TRACE,,}" == "true" ]] && set -x
|
[[ "${VAR_DEBUG_TRACE,,}" == "true" ]] && set -x
|
||||||
|
|
||||||
# shellcheck disable=SC2164
|
|
||||||
#cd "${VAR_SETUP_PATH}"
|
|
||||||
|
|
||||||
#do_log "info" "file_only" "4310() Ultra Hardened [dropbear-${var_dropbear_version}] build successfully from sources."
|
|
||||||
|
|
||||||
guard_dir && return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -51,8 +51,6 @@ dropbear_initramfs() {
|
|||||||
do_log "debug" "file_only" "4311() Installation [${var_file}] successful."
|
do_log "debug" "file_only" "4311() Installation [${var_file}] successful."
|
||||||
done
|
done
|
||||||
|
|
||||||
do_log "info" "file_only" "4311() Installation [dropbear-initramfs] successful."
|
guard_dir && return 0
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -137,7 +137,7 @@ EOF
|
|||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
|
|||||||
@@ -38,6 +38,6 @@ update_initramfs() {
|
|||||||
echo ExitCode: \$? >> ${var_logfile}
|
echo ExitCode: \$? >> ${var_logfile}
|
||||||
"
|
"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -39,7 +39,7 @@ jitterentropy_rng
|
|||||||
EOF
|
EOF
|
||||||
chmod 0644 "${TARGET}/usr/lib/modules-load.d/30_security-misc.conf"
|
chmod 0644 "${TARGET}/usr/lib/modules-load.d/30_security-misc.conf"
|
||||||
do_log "info" "file_only" "4400() Installed: '/usr/lib/modules-load.d/30_security-misc.conf'."
|
do_log "info" "file_only" "4400() Installed: '/usr/lib/modules-load.d/30_security-misc.conf'."
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
@@ -52,10 +52,10 @@ EOF
|
|||||||
# Returns:
|
# Returns:
|
||||||
# 0: on success
|
# 0: on success
|
||||||
#######################################
|
#######################################
|
||||||
setup_modprobe() {
|
kernel_modprobe() {
|
||||||
install -D -m 0755 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/modprobe.d/0000_ciss_debian_installer.cnf" \
|
install -D -m 0755 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/modprobe.d/0000_ciss_debian_installer.cnf" \
|
||||||
"${TARGET}/etc/modprobe.d/0000_ciss_debian_installer.conf"
|
"${TARGET}/etc/modprobe.d/0000_ciss_debian_installer.conf"
|
||||||
do_log "info" "file_only" "4400() Installed: '/etc/modprobe.d/0000_ciss_debian_installer.conf'."
|
do_log "info" "file_only" "4400() Installed: '/etc/modprobe.d/0000_ciss_debian_installer.conf'."
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -26,6 +26,6 @@ kernel_sysctl() {
|
|||||||
install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/sysctl.d/99_local.hardened" \
|
install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/sysctl.d/99_local.hardened" \
|
||||||
"${TARGET}/etc/sysctl.d/99_local.hardened"
|
"${TARGET}/etc/sysctl.d/99_local.hardened"
|
||||||
do_log "info" "file_only" "4410() Installed: '/etc/sysctl.d/99_local.hardened'."
|
do_log "info" "file_only" "4410() Installed: '/etc/sysctl.d/99_local.hardened'."
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -105,8 +105,6 @@ installation_ssh() {
|
|||||||
#echo "readonly HISTFILE" >> "${TARGET}/etc/profile.d/idle-users.sh"
|
#echo "readonly HISTFILE" >> "${TARGET}/etc/profile.d/idle-users.sh"
|
||||||
chmod +x "${TARGET}/etc/profile.d/idle-users.sh"
|
chmod +x "${TARGET}/etc/profile.d/idle-users.sh"
|
||||||
|
|
||||||
do_log "info" "file_only" "4420() Installed: [ssh] successfully."
|
guard_dir && return 0
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -35,8 +35,6 @@ installation_skel() {
|
|||||||
echo 'set clipboard=unnamed' >| "${TARGET}/etc/skel/.vimrc"
|
echo 'set clipboard=unnamed' >| "${TARGET}/etc/skel/.vimrc"
|
||||||
chmod 0644 "${TARGET}/etc/skel/.vimrc"
|
chmod 0644 "${TARGET}/etc/skel/.vimrc"
|
||||||
|
|
||||||
do_log "info" "file_only" "4430() Installed: [/etc/skel]-Files successfully."
|
guard_dir && return 0
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -22,6 +22,6 @@ guard_sourcing
|
|||||||
# 0: on success
|
# 0: on success
|
||||||
###########################################################################################
|
###########################################################################################
|
||||||
hardening_files() {
|
hardening_files() {
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -159,6 +159,6 @@ installation_accounts() {
|
|||||||
|
|
||||||
done
|
done
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -40,6 +40,6 @@ minimal_checks() {
|
|||||||
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -26,6 +26,6 @@ setup_locales() {
|
|||||||
### Set the X11 keyboard layout (for graphical environments).
|
### Set the X11 keyboard layout (for graphical environments).
|
||||||
do_in_target "${TARGET}" localectl set-x11-keymap "${locale_keyboard_xkb_keymap}"
|
do_in_target "${TARGET}" localectl set-x11-keymap "${locale_keyboard_xkb_keymap}"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -86,6 +86,6 @@ do_log "info" "file_only" "4100() Starting system integrity verification..."
|
|||||||
do_log "warning" "file_only" "4100() apt-get check reported errors."
|
do_log "warning" "file_only" "4100() apt-get check reported errors."
|
||||||
|
|
||||||
do_log "info" "file_only" "4100() Verification completed. Output stored in: ${LOG_FILE}."
|
do_log "info" "file_only" "4100() Verification completed. Output stored in: ${LOG_FILE}."
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -71,4 +71,4 @@ fi
|
|||||||
rm -f "${TMP_SSHD_T}"
|
rm -f "${TMP_SSHD_T}"
|
||||||
echo
|
echo
|
||||||
bold "✔ SSH config integrity check completed."
|
bold "✔ SSH config integrity check completed."
|
||||||
exit 0
|
guard_dir && return 0
|
||||||
|
|||||||
@@ -31,6 +31,6 @@ setup_packages() {
|
|||||||
do_in_target "${TARGET}" apt-get install -y "${var_install_candidate}"
|
do_in_target "${TARGET}" apt-get install -y "${var_install_candidate}"
|
||||||
done
|
done
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
@@ -43,6 +43,6 @@ exiting_chroot_system() {
|
|||||||
|
|
||||||
declare -gx VAR_CHROOT_ACTIVATED="false"
|
declare -gx VAR_CHROOT_ACTIVATED="false"
|
||||||
|
|
||||||
return 0
|
guard_dir && return 0
|
||||||
}
|
}
|
||||||
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
|
||||||
|
|||||||
Reference in New Issue
Block a user