freedombone-sec 42KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Alters the security settings
  12. #
  13. # License
  14. # =======
  15. #
  16. # Copyright (C) 2015-2016 Bob Mottram <bob@freedombone.net>
  17. #
  18. # This program is free software: you can redistribute it and/or modify
  19. # it under the terms of the GNU Affero General Public License as published by
  20. # the Free Software Foundation, either version 3 of the License, or
  21. # (at your option) any later version.
  22. #
  23. # This program is distributed in the hope that it will be useful,
  24. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. # GNU Affero General Public License for more details.
  27. #
  28. # You should have received a copy of the GNU Affero General Public License
  29. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  30. PROJECT_NAME='freedombone'
  31. export TEXTDOMAIN=${PROJECT_NAME}-sec
  32. export TEXTDOMAINDIR="/usr/share/locale"
  33. CONFIGURATION_FILE=$HOME/${PROJECT_NAME}.cfg
  34. COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt
  35. UTILS_FILES=/usr/share/${PROJECT_NAME}/utils/${PROJECT_NAME}-utils-*
  36. for f in $UTILS_FILES
  37. do
  38. source $f
  39. done
  40. SSL_PROTOCOLS=
  41. SSL_CIPHERS=
  42. SSH_CIPHERS=
  43. SSH_MACS=
  44. SSH_KEX=
  45. SSH_HOST_KEY_ALGORITHMS=
  46. SSH_PASSWORDS=
  47. XMPP_CIPHERS=
  48. XMPP_ECC_CURVE=
  49. WEBSITES_DIRECTORY='/etc/nginx/sites-available'
  50. DOVECOT_CIPHERS='/etc/dovecot/conf.d/10-ssl.conf'
  51. SSH_CONFIG='/etc/ssh/sshd_config'
  52. XMPP_CONFIG='/etc/prosody/conf.avail/xmpp.cfg.lua'
  53. MINIMUM_LENGTH=6
  54. IMPORT_FILE=
  55. EXPORT_FILE=
  56. CURRENT_DIR=$(pwd)
  57. DH_KEYLENGTH=2048
  58. LETSENCRYPT_SERVER='https://acme-v01.api.letsencrypt.org/directory'
  59. MY_USERNAME=
  60. function export_passwords {
  61. detect_usb_drive
  62. data=$(tempfile 2>/dev/null)
  63. trap "rm -f $data" 0 1 2 5 15
  64. dialog --title $"Export passwords to USB drive $USB_DRIVE" \
  65. --backtitle $"Security Settings" \
  66. --defaultno \
  67. --yesno $"\nPlease confirm that you wish to export passwords to a LUKS formatted USB drive. The drive should be plugged in." 10 60
  68. sel=$?
  69. case $sel in
  70. 1) return;;
  71. 255) return;;
  72. esac
  73. data=$(tempfile 2>/dev/null)
  74. trap "rm -f $data" 0 1 2 5 15
  75. dialog --title $"Export passwords to USB drive $USB_DRIVE" \
  76. --backtitle $"Security Settings" \
  77. --defaultno \
  78. --yesno $"\nDo you need to format the drive as LUKS encrypted?" 12 60
  79. sel=$?
  80. case $sel in
  81. 0) ${PROJECT_NAME}-format $USB_DRIVE;;
  82. esac
  83. clear
  84. backup_mount_drive ${USB_DRIVE}
  85. ${PROJECT_NAME}-pass --export ${USB_MOUNT}/${PROJECT_NAME}-passwords.xml
  86. backup_unmount_drive ${USB_DRIVE}
  87. }
  88. function get_protocols_from_website {
  89. if [ ! -f $WEBSITES_DIRECTORY/$1 ]; then
  90. return
  91. fi
  92. SSL_PROTOCOLS=$(cat $WEBSITES_DIRECTORY/$1 | grep 'ssl_protocols ' | awk -F "ssl_protocols " '{print $2}' | awk -F ';' '{print $1}')
  93. }
  94. function get_ciphers_from_website {
  95. if [ ! -f $WEBSITES_DIRECTORY/$1 ]; then
  96. return
  97. fi
  98. SSL_CIPHERS=$(cat $WEBSITES_DIRECTORY/$1 | grep 'ssl_ciphers ' | awk -F "ssl_ciphers " '{print $2}' | awk -F "'" '{print $2}')
  99. }
  100. function get_imap_settings {
  101. if [ ! -f $DOVECOT_CIPHERS ]; then
  102. return
  103. fi
  104. # clear commented out cipher list
  105. sed -i "s|#ssl_cipher_list.*||g" $DOVECOT_CIPHERS
  106. if [ $SSL_CIPHERS ]; then
  107. return
  108. fi
  109. if [ ${#SSL_CIPHERS} -gt $MINIMUM_LENGTH ]; then
  110. return
  111. fi
  112. SSL_CIPHERS=$(cat $DOVECOT_CIPHERS | grep 'ssl_cipher_list' | awk -F '=' '{print $2}' | awk -F "'" '{print $2}')
  113. }
  114. function get_xmpp_settings {
  115. if [ ! -f $XMPP_CONFIG ]; then
  116. return
  117. fi
  118. XMPP_CIPHERS=$(cat $XMPP_CONFIG | grep 'ciphers ' | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  119. XMPP_ECC_CURVE=$(cat $XMPP_CONFIG | grep 'curve ' | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  120. }
  121. function get_ssh_settings {
  122. if [ -f $SSH_CONFIG ]; then
  123. SSH_PASSWORDS=$(cat $SSH_CONFIG | grep 'PasswordAuthentication ' | awk -F 'PasswordAuthentication ' '{print $2}')
  124. fi
  125. if [ -f /etc/ssh/ssh_config ]; then
  126. SSH_HOST_KEY_ALGORITHMS=$(cat /etc/ssh/ssh_config | grep 'HostKeyAlgorithms ' | awk -F 'HostKeyAlgorithms ' '{print $2}')
  127. fi
  128. }
  129. function change_website_settings {
  130. if [ ! "$SSL_PROTOCOLS" ]; then
  131. return
  132. fi
  133. if [ ! $SSL_CIPHERS ]; then
  134. return
  135. fi
  136. if [ ${#SSL_PROTOCOLS} -lt $MINIMUM_LENGTH ]; then
  137. return
  138. fi
  139. if [ ${#SSL_CIPHERS} -lt $MINIMUM_LENGTH ]; then
  140. return
  141. fi
  142. if [ ! -d $WEBSITES_DIRECTORY ]; then
  143. return
  144. fi
  145. cd $WEBSITES_DIRECTORY
  146. for file in `dir -d *` ; do
  147. sed -i "s|ssl_protocols .*|ssl_protocols $SSL_PROTOCOLS;|g" $WEBSITES_DIRECTORY/$file
  148. if ! grep -q "Mobile compatible ciphers" $WEBSITES_DIRECTORY/$file; then
  149. sed -i "s|ssl_ciphers .*|ssl_ciphers '$SSL_CIPHERS';|g" $WEBSITES_DIRECTORY/$file
  150. else
  151. sed -i "s|ssl_ciphers .*|ssl_ciphers '$SSL_CIPHERS_MOBILE';|g" $WEBSITES_DIRECTORY/$file
  152. fi
  153. done
  154. systemctl restart nginx
  155. echo $'Web security settings changed'
  156. }
  157. function change_imap_settings {
  158. if [ ! -f $DOVECOT_CIPHERS ]; then
  159. return
  160. fi
  161. if [ ! $SSL_CIPHERS ]; then
  162. return
  163. fi
  164. if [ ${#SSL_CIPHERS} -lt $MINIMUM_LENGTH ]; then
  165. return
  166. fi
  167. sed -i "s|ssl_cipher_list.*|ssl_cipher_list = '$SSL_CIPHERS'|g" $DOVECOT_CIPHERS
  168. sed -i "s|ssl_protocols.*|ssl_protocols = '$SSL_PROTOCOLS'|g" $DOVECOT_CIPHERS
  169. systemctl restart dovecot
  170. echo $'imap security settings changed'
  171. }
  172. function change_ssh_settings {
  173. if [ -f /etc/ssh/ssh_config ]; then
  174. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  175. sed -i "s|HostKeyAlgorithms .*|HostKeyAlgorithms $SSH_HOST_KEY_ALGORITHMS|g" /etc/ssh/ssh_config
  176. echo $'ssh client security settings changed'
  177. fi
  178. fi
  179. if [ -f $SSH_CONFIG ]; then
  180. if [ ! $SSH_CIPHERS ]; then
  181. return
  182. fi
  183. if [ ! $SSH_MACS ]; then
  184. return
  185. fi
  186. if [ ! $SSH_KEX ]; then
  187. return
  188. fi
  189. if [ ! $SSH_PASSWORDS ]; then
  190. SSH_PASSWORDS='yes'
  191. fi
  192. sed -i "s|Ciphers .*|Ciphers $SSH_CIPHERS|g" $SSH_CONFIG
  193. sed -i "s|MACs .*|MACs $SSH_MACS|g" $SSH_CONFIG
  194. sed -i "s|KexAlgorithms .*|KexAlgorithms $SSH_KEX|g" $SSH_CONFIG
  195. sed -i "s|#PasswordAuthentication .*|PasswordAuthentication $SSH_PASSWORDS|g" $SSH_CONFIG
  196. sed -i "s|PasswordAuthentication .*|PasswordAuthentication $SSH_PASSWORDS|g" $SSH_CONFIG
  197. systemctl restart ssh
  198. echo $'ssh server security settings changed'
  199. fi
  200. }
  201. function change_xmpp_settings {
  202. if [ ! -f $XMPP_CONFIG ]; then
  203. return
  204. fi
  205. if [ ! $XMPP_CIPHERS ]; then
  206. return
  207. fi
  208. if [ ! $XMPP_ECC_CURVE ]; then
  209. return
  210. fi
  211. sed -i "s|ciphers =.*|ciphers = \"$XMPP_CIPHERS\";|g" $XMPP_CONFIG
  212. sed -i "s|curve =.*|curve = \"$XMPP_ECC_CURVE\";|g" $XMPP_CONFIG
  213. systemctl restart prosody
  214. echo $'xmpp security settings changed'
  215. }
  216. function allow_ssh_passwords {
  217. dialog --title $"SSH Passwords" \
  218. --backtitle $"Freedombone Security Configuration" \
  219. --yesno $"\nAllow SSH login using passwords?" 7 60
  220. sel=$?
  221. case $sel in
  222. 0) SSH_PASSWORDS="yes";;
  223. 1) SSH_PASSWORDS="no";;
  224. 255) exit 0;;
  225. esac
  226. }
  227. function interactive_setup {
  228. if [ $SSL_CIPHERS ]; then
  229. data=$(tempfile 2>/dev/null)
  230. trap "rm -f $data" 0 1 2 5 15
  231. dialog --backtitle $"Freedombone Security Configuration" \
  232. --form $"\nWeb/IMAP Ciphers:" 10 95 2 \
  233. $"Protocols:" 1 1 "$SSL_PROTOCOLS" 1 15 90 90 \
  234. $"Ciphers:" 2 1 "$SSL_CIPHERS" 2 15 90 512 \
  235. 2> $data
  236. sel=$?
  237. case $sel in
  238. 1) SSL_PROTOCOLS=$(cat $data | sed -n 1p)
  239. SSL_CIPHERS=$(cat $data | sed -n 2p)
  240. ;;
  241. 255) exit 0;;
  242. esac
  243. fi
  244. data=$(tempfile 2>/dev/null)
  245. trap "rm -f $data" 0 1 2 5 15
  246. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  247. dialog --backtitle $"Freedombone Security Configuration" \
  248. --form $"\nSecure Shell Ciphers:" 13 95 4 \
  249. $"Ciphers:" 1 1 "$SSH_CIPHERS" 1 15 90 512 \
  250. $"MACs:" 2 1 "$SSH_MACS" 2 15 90 512 \
  251. $"KEX:" 3 1 "$SSH_KEX" 3 15 90 512 \
  252. $"Host key algorithms:" 4 1 "$SSH_HOST_KEY_ALGORITHMS" 4 15 90 512 \
  253. 2> $data
  254. sel=$?
  255. case $sel in
  256. 1) SSH_CIPHERS=$(cat $data | sed -n 1p)
  257. SSH_MACS=$(cat $data | sed -n 2p)
  258. SSH_KEX=$(cat $data | sed -n 3p)
  259. SSH_HOST_KEY_ALGORITHMS=$(cat $data | sed -n 4p)
  260. ;;
  261. 255) exit 0;;
  262. esac
  263. else
  264. dialog --backtitle $"Freedombone Security Configuration" \
  265. --form $"\nSecure Shell Ciphers:" 11 95 3 \
  266. $"Ciphers:" 1 1 "$SSH_CIPHERS" 1 15 90 512 \
  267. $"MACs:" 2 1 "$SSH_MACS" 2 15 90 512 \
  268. $"KEX:" 3 1 "$SSH_KEX" 3 15 90 512 \
  269. 2> $data
  270. sel=$?
  271. case $sel in
  272. 1) SSH_CIPHERS=$(cat $data | sed -n 1p)
  273. SSH_MACS=$(cat $data | sed -n 2p)
  274. SSH_KEX=$(cat $data | sed -n 3p)
  275. ;;
  276. 255) exit 0;;
  277. esac
  278. fi
  279. if [ $XMPP_CIPHERS ]; then
  280. data=$(tempfile 2>/dev/null)
  281. trap "rm -f $data" 0 1 2 5 15
  282. dialog --backtitle $"Freedombone Security Configuration" \
  283. --form $"\nXMPP Ciphers:" 10 95 2 \
  284. $"Ciphers:" 1 1 "$XMPP_CIPHERS" 1 15 90 512 \
  285. $"ECC Curve:" 2 1 "$XMPP_ECC_CURVE" 2 15 50 50 \
  286. 2> $data
  287. sel=$?
  288. case $sel in
  289. 1) XMPP_CIPHERS=$(cat $data | sed -n 1p)
  290. XMPP_ECC_CURVE=$(cat $data | sed -n 2p)
  291. ;;
  292. 255) exit 0;;
  293. esac
  294. fi
  295. dialog --title $"Final Confirmation" \
  296. --backtitle $"Freedombone Security Configuration" \
  297. --defaultno \
  298. --yesno $"\nPlease confirm that you wish your security settings to be changed?\n\nWARNING: any mistakes made in the security settings could compromise your system, so be extra careful when answering 'yes'." 12 60
  299. sel=$?
  300. case $sel in
  301. 1) clear
  302. echo $'Exiting without changing security settings'
  303. exit 0;;
  304. 255) clear
  305. echo $'Exiting without changing security settings'
  306. exit 0;;
  307. esac
  308. clear
  309. }
  310. function send_monkeysphere_server_keys_to_users {
  311. monkeysphere_server_keys=$(monkeysphere-host show-key | grep $"OpenPGP fingerprint" | awk -F ' ' '{print $3}')
  312. for d in /home/*/ ; do
  313. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  314. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  315. if [ ! -d /home/$USERNAME/.monkeysphere ]; then
  316. mkdir /home/$USERNAME/.monkeysphere
  317. fi
  318. echo $monkeysphere_server_keys > /home/$USERNAME/.monkeysphere/server_keys
  319. chown -R $USERNAME:$USERNAME /home/$USERNAME/.monkeysphere
  320. fi
  321. done
  322. }
  323. function regenerate_ssh_host_keys {
  324. rm -f /etc/ssh/ssh_host_*
  325. dpkg-reconfigure openssh-server
  326. echo $'ssh host keys regenerated'
  327. # remove small moduli
  328. awk '$5 > 2000' /etc/ssh/moduli > ~/moduli
  329. mv ~/moduli /etc/ssh/moduli
  330. echo $'ssh small moduli removed'
  331. # update monkeysphere
  332. DEFAULT_DOMAIN_NAME=
  333. read_config_param "DEFAULT_DOMAIN_NAME"
  334. monkeysphere-host import-key /etc/ssh/ssh_host_rsa_key ssh://$DEFAULT_DOMAIN_NAME
  335. SSH_ONION_HOSTNAME=$(cat ${COMPLETION_FILE} | grep 'ssh onion domain' | awk -F ':' '{print $2}')
  336. monkeysphere-host import-key /etc/ssh/ssh_host_rsa_key ssh://$SSH_ONION_HOSTNAME
  337. monkeysphere-host publish-key
  338. send_monkeysphere_server_keys_to_users
  339. echo $'updated monkeysphere ssh host key'
  340. systemctl restart ssh
  341. }
  342. function regenerate_dh_keys {
  343. if [ ! -d /etc/ssl/mycerts ]; then
  344. echo $'No dhparam certificates were found'
  345. return
  346. fi
  347. data=$(tempfile 2>/dev/null)
  348. trap "rm -f $data" 0 1 2 5 15
  349. dialog --backtitle "Freedombone Security Configuration" \
  350. --title "Diffie-Hellman key length" \
  351. --radiolist "The smaller length is better suited to low power embedded systems:" 12 40 3 \
  352. 1 "2048 bits" off \
  353. 2 "3072 bits" on \
  354. 3 "4096 bits" off 2> $data
  355. sel=$?
  356. case $sel in
  357. 1) exit 1;;
  358. 255) exit 1;;
  359. esac
  360. case $(cat $data) in
  361. 1) DH_KEYLENGTH=2048;;
  362. 2) DH_KEYLENGTH=3072;;
  363. 3) DH_KEYLENGTH=4096;;
  364. esac
  365. ${PROJECT_NAME}-dhparam --recalc yes -l ${DH_KEYLENGTH}
  366. }
  367. function renew_startssl {
  368. renew_domain=
  369. data=$(tempfile 2>/dev/null)
  370. trap "rm -f $data" 0 1 2 5 15
  371. dialog --title $"Renew a StartSSL certificate" \
  372. --backtitle $"Freedombone Security Settings" \
  373. --inputbox $"Enter the domain name" 8 60 2>$data
  374. sel=$?
  375. case $sel in
  376. 0)
  377. renew_domain=$(<$data)
  378. ;;
  379. esac
  380. if [ ! $renew_domain ]; then
  381. return
  382. fi
  383. if [[ $renew_domain == "http"* ]]; then
  384. dialog --title $"Renew a StartSSL certificate" \
  385. --msgbox $"Don't include the https://" 6 40
  386. return
  387. fi
  388. if [ ! -f /etc/ssl/certs/${renew_domain}.dhparam ]; then
  389. dialog --title $"Renew a StartSSL certificate" \
  390. --msgbox $"An existing certificate for $renew_domain was not found" 6 40
  391. return
  392. fi
  393. if [[ $renew_domain != *"."* ]]; then
  394. dialog --title $"Renew a StartSSL certificate" \
  395. --msgbox $"Invalid domain name: $renew_domain" 6 40
  396. return
  397. fi
  398. ${PROJECT_NAME}-renew-cert -h $renew_domain -p startssl
  399. exit 0
  400. }
  401. function renew_letsencrypt {
  402. renew_domain=
  403. data=$(tempfile 2>/dev/null)
  404. trap "rm -f $data" 0 1 2 5 15
  405. dialog --title $"Renew a Let's Encrypt certificate" \
  406. --backtitle $"Freedombone Security Settings" \
  407. --inputbox $"Enter the domain name" 8 60 2>$data
  408. sel=$?
  409. case $sel in
  410. 0)
  411. renew_domain=$(<$data)
  412. ;;
  413. esac
  414. if [ ! $renew_domain ]; then
  415. return
  416. fi
  417. if [[ $renew_domain == "http"* ]]; then
  418. dialog --title $"Renew a Let's Encrypt certificate" \
  419. --msgbox $"Don't include the https://" 6 40
  420. return
  421. fi
  422. if [ ! -f /etc/ssl/certs/${renew_domain}.dhparam ]; then
  423. dialog --title $"Renew a Let's Encrypt certificate" \
  424. --msgbox $"An existing certificate for $renew_domain was not found" 6 40
  425. return
  426. fi
  427. if [[ $renew_domain != *"."* ]]; then
  428. dialog --title $"Renew a Let's Encrypt certificate" \
  429. --msgbox $"Invalid domain name: $renew_domain" 6 40
  430. return
  431. fi
  432. ${PROJECT_NAME}-renew-cert -h $renew_domain -p 'letsencrypt'
  433. exit 0
  434. }
  435. function delete_letsencrypt {
  436. delete_domain=
  437. data=$(tempfile 2>/dev/null)
  438. trap "rm -f $data" 0 1 2 5 15
  439. dialog --title $"Delete a Let's Encrypt certificate" \
  440. --backtitle $"Freedombone Security Settings" \
  441. --inputbox $"Enter the domain name" 8 60 2>$data
  442. sel=$?
  443. case $sel in
  444. 0)
  445. delete_domain=$(<$data)
  446. ;;
  447. esac
  448. if [ ! $delete_domain ]; then
  449. return
  450. fi
  451. if [[ $delete_domain == "http"* ]]; then
  452. dialog --title $"Delete a Let's Encrypt certificate" \
  453. --msgbox $"Don't include the https://" 6 40
  454. return
  455. fi
  456. if [ ! -f /etc/ssl/certs/${delete_domain}.dhparam ]; then
  457. dialog --title $"Delete a Let's Encrypt certificate" \
  458. --msgbox $"An existing certificate for $renew_domain was not found" 6 40
  459. return
  460. fi
  461. if [[ $delete_domain != *"."* ]]; then
  462. dialog --title $"Delete a Let's Encrypt certificate" \
  463. --msgbox $"Invalid domain name: $delete_domain" 6 40
  464. return
  465. fi
  466. dialog --title $"Delete a Let's Encrypt certificate" \
  467. --backtitle $"Freedombone Security Settings" \
  468. --defaultno \
  469. --yesno $"\nConfirm deletion of the TLS certificate for $delete_domain ?" 7 60
  470. sel=$?
  471. case $sel in
  472. 0) ${PROJECT_NAME}-addcert -r $delete_domain;;
  473. 255) exit 0;;
  474. esac
  475. exit 0
  476. }
  477. function create_letsencrypt {
  478. new_domain=
  479. data=$(tempfile 2>/dev/null)
  480. trap "rm -f $data" 0 1 2 5 15
  481. dialog --title $"Create a new Let's Encrypt certificate" \
  482. --backtitle $"Freedombone Security Settings" \
  483. --inputbox $"Enter the domain name" 8 60 2>$data
  484. sel=$?
  485. case $sel in
  486. 0)
  487. new_domain=$(<$data)
  488. ;;
  489. esac
  490. if [ ! $new_domain ]; then
  491. return
  492. fi
  493. if [[ $new_domain == "http"* ]]; then
  494. dialog --title $"Create a new Let's Encrypt certificate" \
  495. --msgbox $"Don't include the https://" 6 40
  496. return
  497. fi
  498. if [[ $new_domain != *"."* ]]; then
  499. dialog --title $"Create a new Let's Encrypt certificate" \
  500. --msgbox $"Invalid domain name: $new_domain" 6 40
  501. return
  502. fi
  503. if [ ! -d /var/www/${new_domain} ]; then
  504. domain_found=
  505. if [ -f /etc/nginx/sites-available/radicale ]; then
  506. if grep -q "${new_domain}" /etc/nginx/sites-available/radicale; then
  507. domain_found=1
  508. fi
  509. fi
  510. if [ -f /etc/nginx/sites-available/${new_domain} ]; then
  511. domain_found=1
  512. fi
  513. if [[ "${new_domain}" == "jitsi"* || "${new_domain}" == "meet"* ]]; then
  514. domain_found=1
  515. fi
  516. if [ ! $domain_found ]; then
  517. dialog --title $"Create a new Let's Encrypt certificate" \
  518. --msgbox $'Domain not found within /var/www' 6 40
  519. return
  520. fi
  521. fi
  522. ${PROJECT_NAME}-addcert -e $new_domain -s $LETSENCRYPT_SERVER --dhkey $DH_KEYLENGTH
  523. exit 0
  524. }
  525. function update_ciphersuite {
  526. RECOMMENDED_SSL_CIPHERS="$SSL_CIPHERS"
  527. if [ ${#RECOMMENDED_SSL_CIPHERS} -lt 5 ]; then
  528. return
  529. fi
  530. RECOMMENDED_SSL_PROTOCOLS="$SSL_PROTOCOLS"
  531. if [ ${#RECOMMENDED_SSL_PROTOCOLS} -lt 5 ]; then
  532. return
  533. fi
  534. RECOMMENDED_SSH_CIPHERS="$SSH_CIPHERS"
  535. if [ ${#RECOMMENDED_SSH_CIPHERS} -lt 5 ]; then
  536. return
  537. fi
  538. RECOMMENDED_SSH_MACS="$SSH_MACS"
  539. if [ ${#RECOMMENDED_SSH_MACS} -lt 5 ]; then
  540. return
  541. fi
  542. RECOMMENDED_SSH_KEX="$SSH_KEX"
  543. if [ ${#RECOMMENDED_SSH_KEX} -lt 5 ]; then
  544. return
  545. fi
  546. cd $WEBSITES_DIRECTORY
  547. for file in `dir -d *` ; do
  548. sed -i "s|ssl_protocols .*|ssl_protocols $RECOMMENDED_SSL_PROTOCOLS;|g" $WEBSITES_DIRECTORY/$file
  549. if ! grep -q "Mobile compatible ciphers" $WEBSITES_DIRECTORY/$file; then
  550. sed -i "s|ssl_ciphers .*|ssl_ciphers '$RECOMMENDED_SSL_CIPHERS';|g" $WEBSITES_DIRECTORY/$file
  551. else
  552. sed -i "s|ssl_ciphers .*|ssl_ciphers '$SSL_CIPHERS_MOBILE';|g" $WEBSITES_DIRECTORY/$file
  553. fi
  554. done
  555. systemctl restart nginx
  556. write_config_param "SSL_PROTOCOLS" "$RECOMMENDED_SSL_PROTOCOLS"
  557. write_config_param "SSL_CIPHERS" "$RECOMMENDED_SSL_CIPHERS"
  558. sed -i "s|Ciphers .*|Ciphers $RECOMMENDED_SSH_CIPHERS|g" $SSH_CONFIG
  559. sed -i "s|MACs .*|MACs $RECOMMENDED_SSH_MACS|g" $SSH_CONFIG
  560. sed -i "s|KexAlgorithms .*|KexAlgorithms $RECOMMENDED_SSH_KEX|g" $SSH_CONFIG
  561. systemctl restart ssh
  562. write_config_param "SSH_CIPHERS" "$RECOMMENDED_SSH_CIPHERS"
  563. write_config_param "SSH_MACS" "$RECOMMENDED_SSH_MACS"
  564. write_config_param "SSH_KEX" "$RECOMMENDED_SSH_KEX"
  565. dialog --title $"Update ciphersuite" \
  566. --msgbox $"The ciphersuite has been updated to recommended versions" 6 40
  567. exit 0
  568. }
  569. function enable_monkeysphere {
  570. monkey=
  571. dialog --title $"GPG based authentication" \
  572. --backtitle $"Freedombone Security Configuration" \
  573. --defaultno \
  574. --yesno $"\nEnable GPG based authentication with monkeysphere ?" 7 60
  575. sel=$?
  576. case $sel in
  577. 0) monkey='yes';;
  578. 255) exit 0;;
  579. esac
  580. if [ $monkey ]; then
  581. read_config_param "MY_USERNAME"
  582. if [ ! -f /home/$MY_USERNAME/.monkeysphere/authorized_user_ids ]; then
  583. dialog --title $"GPG based authentication" \
  584. --msgbox $"$MY_USERNAME does not currently have any ids within ~/.monkeysphere/authorized_user_ids" 6 40
  585. exit 0
  586. fi
  587. MY_GPG_PUBLIC_KEY_ID=$(gpg_pubkey_from_email "$MY_USERNAME" "$MY_USERNAME@$HOSTNAME")
  588. if [ ${#MY_GPG_PUBLIC_KEY_ID} -lt 4 ]; then
  589. echo $"monkeysphere unable to get GPG key ID for user $MY_USERNAME@$HOSTNAME"
  590. exit 52825
  591. fi
  592. sed -i 's|#AuthorizedKeysFile|AuthorizedKeysFile|g' /etc/ssh/sshd_config
  593. sed -i 's|AuthorizedKeysFile.*|AuthorizedKeysFile /var/lib/monkeysphere/authorized_keys/%u|g' /etc/ssh/sshd_config
  594. monkeysphere-authentication update-users
  595. # The admin user is the identity certifier
  596. fpr=$(gpg --with-colons --fingerprint $MY_GPG_PUBLIC_KEY_ID | grep fpr | head -n 1 | awk -F ':' '{print $10}')
  597. monkeysphere-authentication add-identity-certifier $fpr
  598. monkeysphere-host publish-key
  599. send_monkeysphere_server_keys_to_users
  600. else
  601. sed -i 's|#AuthorizedKeysFile|AuthorizedKeysFile|g' /etc/ssh/sshd_config
  602. sed -i 's|AuthorizedKeysFile.*|AuthorizedKeysFile %h/.ssh/authorized_keys|g' /etc/ssh/sshd_config
  603. fi
  604. systemctl restart ssh
  605. if [ $monkey ]; then
  606. dialog --title $"GPG based authentication" \
  607. --msgbox $"GPG based authentication was enabled" 6 40
  608. else
  609. dialog --title $"GPG based authentication" \
  610. --msgbox $"GPG based authentication was disabled" 6 40
  611. fi
  612. exit 0
  613. }
  614. function register_website {
  615. domain="$1"
  616. if [[ ${domain} == *".local" ]]; then
  617. echo $"Can't register local domains"
  618. return
  619. fi
  620. if [ ! -f /etc/ssl/private/${domain}.key ]; then
  621. echo $"No SSL/TLS private key found for ${domain}"
  622. return
  623. fi
  624. if [ ! -f /etc/nginx/sites-available/${domain} ]; then
  625. echo $"No virtual host found for ${domain}"
  626. return
  627. fi
  628. monkeysphere-host import-key /etc/ssl/private/${domain}.key https://${domain}
  629. monkeysphere-host publish-key
  630. echo "0"
  631. }
  632. function register_website_interactive {
  633. data=$(tempfile 2>/dev/null)
  634. trap "rm -f $data" 0 1 2 5 15
  635. dialog --title $"Register a website with monkeysphere" \
  636. --backtitle $"Freedombone Security Settings" \
  637. --inputbox $"Enter the website domain name (without https://)" 8 60 2>$data
  638. sel=$?
  639. case $sel in
  640. 0)
  641. domain=$(<$data)
  642. register_website "$domain"
  643. if [ ! "$?" = "0" ]; then
  644. dialog --title $"Register a website with monkeysphere" \
  645. --msgbox "$?" 6 40
  646. else
  647. dialog --title $"Register a website with monkeysphere" \
  648. --msgbox $"$domain has been registered" 6 40
  649. fi
  650. ;;
  651. esac
  652. }
  653. function pin_all_tls_certs {
  654. ${PROJECT_NAME}-pin-cert all
  655. }
  656. function remove_pinning {
  657. data=$(tempfile 2>/dev/null)
  658. trap "rm -f $data" 0 1 2 5 15
  659. dialog --title $"Remove pinning for a domain" \
  660. --backtitle $"Freedombone Security Settings" \
  661. --inputbox $"Enter the website domain name (without https://)" 8 60 2>$data
  662. sel=$?
  663. case $sel in
  664. 0)
  665. domain=$(<$data)
  666. ${PROJECT_NAME}-pin-cert "$domain" remove
  667. if [ ! "$?" = "0" ]; then
  668. dialog --title $"Removed pinning from $domain" \
  669. --msgbox "$?" 6 40
  670. fi
  671. ;;
  672. esac
  673. }
  674. function store_passwords {
  675. dialog --title $"Store Passwords" \
  676. --backtitle $"Freedombone Security Configuration" \
  677. --yesno $"\nDo you wish to store passwords on the system? Stored passwords are convenient but carry some additional security risk." 10 60
  678. sel=$?
  679. case $sel in
  680. 0)
  681. if [ -f /root/.nostore ]; then
  682. read_config_param "MY_USERNAME"
  683. if [ ! -f /home/$MY_USERNAME/.ssh/authorized_keys ]; then
  684. dialog --title $"Store Passwords" \
  685. --msgbox $"\nYou should first enable key based ssh login to improve security" 8 60
  686. return
  687. fi
  688. if [[ $SSH_PASSWORDS == 'yes' ]]; then
  689. dialog --title $"Store Passwords" \
  690. --msgbox $"\nYou should disable ssh passwords to improve security" 8 60
  691. return
  692. fi
  693. ${PROJECT_NAME}-pass --enable yes
  694. dialog --title $"Store Passwords" \
  695. --msgbox $"\nUser passwords will now be stored on the system" 8 60
  696. fi
  697. return
  698. ;;
  699. 1)
  700. ${PROJECT_NAME}-pass --clear yes
  701. dialog --title $"Passwords were removed and will not be stored" \
  702. --msgbox $"\nFor the best security you should now manually change passwords via web interfaces so that there is no possibility of them being recovered from the disk" 9 60
  703. return
  704. ;;
  705. 255) return;;
  706. esac
  707. }
  708. function show_tor_bridges {
  709. clear
  710. bridges_list=$(grep "Bridge " /etc/tor/torrc | grep -v '##')
  711. if [ ${#bridges_list} -eq 0 ]; then
  712. echo $'No Tor bridges have been added'
  713. return
  714. fi
  715. echo "${bridges_list}"
  716. }
  717. function add_tor_bridge {
  718. data=$(tempfile 2>/dev/null)
  719. trap "rm -f $data" 0 1 2 5 15
  720. dialog --backtitle $"Freedombone Control Panel" \
  721. --title $"Add obfs4 Tor bridge" \
  722. --form "\n" 9 60 4 \
  723. $"IP address: " 1 1 " . . . " 1 17 16 16 \
  724. $"Port: " 2 1 "" 2 17 8 8 \
  725. $"Key/Nickname: " 3 1 "" 3 17 250 250 \
  726. 2> $data
  727. sel=$?
  728. case $sel in
  729. 1) return;;
  730. 255) return;;
  731. esac
  732. bridge_ip_address=$(cat $data | sed -n 1p)
  733. bridge_port=$(cat $data | sed -n 2p)
  734. bridge_key=$(cat $data | sed -n 3p)
  735. if [[ "${bridge_ip_address}" == *" "* ]]; then
  736. return
  737. fi
  738. if [[ "${bridge_ip_address}" != *"."* ]]; then
  739. return
  740. fi
  741. if [ ${#bridge_port} -eq 0 ]; then
  742. return
  743. fi
  744. if [ ${#bridge_key} -eq 0 ]; then
  745. return
  746. fi
  747. tor_add_bridge "${bridge_ip_address}" "${bridge_port}" "${bridge_key}"
  748. dialog --title $"Add obfs4 Tor bridge" \
  749. --msgbox $"Bridge added" 6 40
  750. }
  751. function remove_tor_bridge {
  752. bridge_removed=
  753. data=$(tempfile 2>/dev/null)
  754. trap "rm -f $data" 0 1 2 5 15
  755. dialog --title $"Remove obfs4 Tor bridge" \
  756. --backtitle $"Freedombone Control Panel" \
  757. --inputbox $"Enter the IP address, key or Nickname of the bridge" 8 65 2>$data
  758. sel=$?
  759. case $sel in
  760. 0)
  761. response=$(<$data)
  762. if [ ${#response} -gt 2 ]; then
  763. if [[ "${response}" != *" "* ]]; then
  764. if [[ "${response}" == *"."* ]]; then
  765. if grep -q "Bridge ${response}" /etc/tor/torrc; then
  766. tor_remove_bridge "${response}"
  767. bridge_removed=1
  768. fi
  769. else
  770. if grep -q " $response" /etc/tor/torrc; then
  771. tor_remove_bridge "${response}"
  772. bridge_removed=1
  773. fi
  774. fi
  775. fi
  776. fi
  777. ;;
  778. esac
  779. if [ $bridge_removed ]; then
  780. dialog --title $"Remove obfs4 Tor bridge" \
  781. --msgbox $"Bridge removed" 6 40
  782. fi
  783. }
  784. function add_tor_bridge_relay {
  785. read_config_param 'TOR_BRIDGE_NICKNAME'
  786. read_config_param 'TOR_BRIDGE_PORT'
  787. # remove any previous bridge port from the firewall
  788. if [ ${#TOR_BRIDGE_PORT} -gt 0 ]; then
  789. firewall_remove $TOR_BRIDGE_PORT tcp
  790. fi
  791. data=$(tempfile 2>/dev/null)
  792. trap "rm -f $data" 0 1 2 5 15
  793. dialog --backtitle $"Freedombone Control Panel" \
  794. --title $"Become an obfs4 Tor bridge relay" \
  795. --form "\n" 8 60 2 \
  796. $"Bridge Nickname: " 1 1 "$TOR_BRIDGE_NICKNAME" 1 20 250 250 \
  797. 2> $data
  798. sel=$?
  799. case $sel in
  800. 1) return;;
  801. 255) return;;
  802. esac
  803. bridge_nickname=$(cat $data | sed -n 1p)
  804. if [[ "${bridge_nickname}" == *" "* ]]; then
  805. return
  806. fi
  807. if [ ${#bridge_nickname} -eq 0 ]; then
  808. return
  809. fi
  810. TOR_BRIDGE_NICKNAME="$bridge_nickname"
  811. TOR_BRIDGE_PORT=$((20000 + RANDOM % 40000))
  812. write_config_param 'TOR_BRIDGE_NICKNAME' "$TOR_BRIDGE_NICKNAME"
  813. write_config_param 'TOR_BRIDGE_PORT' "$TOR_BRIDGE_PORT"
  814. tor_create_bridge_relay
  815. dialog --title $"You are now an obfs4 Tor bridge relay" \
  816. --msgbox $"\nIP address: $(get_ipv4_address)\n\nPort: ${TOR_BRIDGE_PORT}\n\nNickname: ${TOR_BRIDGE_NICKNAME}" 10 65
  817. }
  818. function remove_tor_bridge_relay {
  819. tor_remove_bridge_relay
  820. dialog --title $"Remove Tor bridge relay" \
  821. --msgbox $"Bridge relay removed" 10 60
  822. }
  823. function menu_tor_bridges {
  824. data=$(tempfile 2>/dev/null)
  825. trap "rm -f $data" 0 1 2 5 15
  826. dialog --backtitle $"Freedombone Control Panel" \
  827. --title $"Tor Bridges" \
  828. --radiolist $"Choose an operation:" 14 50 6 \
  829. 1 $"Show bridges" off \
  830. 2 $"Add a bridge" off \
  831. 3 $"Remove a bridge" off \
  832. 4 $"Make this system into a bridge" off \
  833. 5 $"Stop being a bridge" off \
  834. 6 $"Go Back/Exit" on 2> $data
  835. sel=$?
  836. case $sel in
  837. 1) exit 1;;
  838. 255) exit 1;;
  839. esac
  840. case $(cat $data) in
  841. 1)
  842. show_tor_bridges
  843. exit 0
  844. ;;
  845. 2)
  846. add_tor_bridge
  847. exit 0
  848. ;;
  849. 3)
  850. remove_tor_bridge
  851. exit 0
  852. ;;
  853. 4)
  854. add_tor_bridge_relay
  855. exit 0
  856. ;;
  857. 5)
  858. remove_tor_bridge_relay
  859. exit 0
  860. ;;
  861. 6)
  862. exit 0
  863. ;;
  864. esac
  865. }
  866. function menu_security_settings {
  867. data=$(tempfile 2>/dev/null)
  868. trap "rm -f $data" 0 1 2 5 15
  869. dialog --backtitle $"Freedombone Control Panel" \
  870. --title $"Security Settings" \
  871. --radiolist $"Choose an operation:" 23 76 23 \
  872. 1 $"Run STIG tests" off \
  873. 2 $"Fix STIG test failures" off \
  874. 3 $"Show ssh host public key" off \
  875. 4 $"Tor bridges" off \
  876. 5 $"Password storage" off \
  877. 6 $"Export passwords" off \
  878. 7 $"Regenerate ssh host keys" off \
  879. 8 $"Regenerate Diffie-Hellman keys" off \
  880. 9 $"Update cipersuite" off \
  881. 10 $"Create a new Let's Encrypt certificate" off \
  882. 11 $"Renew Let's Encrypt certificate" off \
  883. 12 $"Delete a Let's Encrypt certificate" off \
  884. 13 $"Enable GPG based authentication (monkeysphere)" off \
  885. 14 $"Register a website with monkeysphere" off \
  886. 15 $"Allow ssh login with passwords" off \
  887. 16 $"Go Back/Exit" on 2> $data
  888. sel=$?
  889. case $sel in
  890. 1) exit 1;;
  891. 255) exit 1;;
  892. esac
  893. clear
  894. read_config_param SSL_CIPHERS
  895. read_config_param SSL_PROTOCOLS
  896. read_config_param SSH_CIPHERS
  897. read_config_param SSH_MACS
  898. read_config_param SSH_KEX
  899. get_imap_settings
  900. get_ssh_settings
  901. get_xmpp_settings
  902. import_settings
  903. export_settings
  904. case $(cat $data) in
  905. 1)
  906. clear
  907. echo $'Running STIG tests...'
  908. echo ''
  909. ${PROJECT_NAME}-tests --stig showall
  910. exit 0
  911. ;;
  912. 2)
  913. clear
  914. echo $'Fixing any STIG failures...'
  915. echo ''
  916. ${PROJECT_NAME}-tests --stig fix
  917. echo $'Fixes applied. You will need to run the STIG tests again to be sure that they were all fixed.'
  918. exit 0
  919. ;;
  920. 3)
  921. dialog --title $"SSH host public keys" \
  922. --msgbox "\n$(get_ssh_server_key)" 12 60
  923. exit 0
  924. ;;
  925. 4)
  926. menu_tor_bridges
  927. exit 0
  928. ;;
  929. 5)
  930. store_passwords
  931. exit 0
  932. ;;
  933. 6)
  934. export_passwords
  935. exit 0
  936. ;;
  937. 7)
  938. regenerate_ssh_host_keys
  939. ;;
  940. 8)
  941. regenerate_dh_keys
  942. ;;
  943. 9)
  944. interactive_setup
  945. update_ciphersuite
  946. ;;
  947. 10)
  948. create_letsencrypt
  949. ;;
  950. 11)
  951. renew_letsencrypt
  952. ;;
  953. 12)
  954. delete_letsencrypt
  955. ;;
  956. 13)
  957. enable_monkeysphere
  958. ;;
  959. 14)
  960. register_website
  961. ;;
  962. 15)
  963. allow_ssh_passwords
  964. change_ssh_settings
  965. exit 0
  966. ;;
  967. 16)
  968. exit 0
  969. ;;
  970. esac
  971. change_website_settings
  972. change_imap_settings
  973. change_ssh_settings
  974. change_xmpp_settings
  975. }
  976. function import_settings {
  977. cd $CURRENT_DIR
  978. if [ ! $IMPORT_FILE ]; then
  979. return
  980. fi
  981. if [ ! -f $IMPORT_FILE ]; then
  982. echo $"Import file $IMPORT_FILE not found"
  983. exit 6393
  984. fi
  985. if grep -q "SSL_PROTOCOLS" $IMPORT_FILE; then
  986. TEMP_VALUE=$(grep "SSL_PROTOCOLS" $IMPORT_FILE | awk -F '=' '{print $2}')
  987. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  988. SSL_PROTOCOLS=$TEMP_VALUE
  989. fi
  990. fi
  991. if grep -q "SSL_CIPHERS" $IMPORT_FILE; then
  992. TEMP_VALUE=$(grep "SSL_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  993. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  994. SSL_CIPHERS=$TEMP_VALUE
  995. fi
  996. fi
  997. if grep -q "SSH_CIPHERS" $IMPORT_FILE; then
  998. TEMP_VALUE=$(grep "SSH_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  999. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  1000. SSH_CIPHERS=$TEMP_VALUE
  1001. fi
  1002. fi
  1003. if grep -q "SSH_MACS" $IMPORT_FILE; then
  1004. TEMP_VALUE=$(grep "SSH_MACS" $IMPORT_FILE | awk -F '=' '{print $2}')
  1005. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  1006. SSH_MACS=$TEMP_VALUE
  1007. fi
  1008. fi
  1009. if grep -q "SSH_KEX" $IMPORT_FILE; then
  1010. TEMP_VALUE=$(grep "SSH_KEX" $IMPORT_FILE | awk -F '=' '{print $2}')
  1011. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  1012. SSH_KEX=$TEMP_VALUE
  1013. fi
  1014. fi
  1015. if grep -q "SSH_HOST_KEY_ALGORITHMS" $IMPORT_FILE; then
  1016. TEMP_VALUE=$(grep "SSH_HOST_KEY_ALGORITHMS" $IMPORT_FILE | awk -F '=' '{print $2}')
  1017. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  1018. SSH_HOST_KEY_ALGORITHMS=$TEMP_VALUE
  1019. fi
  1020. fi
  1021. if grep -q "SSH_PASSWORDS" $IMPORT_FILE; then
  1022. TEMP_VALUE=$(grep "SSH_PASSWORDS" $IMPORT_FILE | awk -F '=' '{print $2}')
  1023. if [[ $TEMP_VALUE == "yes" || $TEMP_VALUE == "no" ]]; then
  1024. SSH_PASSWORDS=$TEMP_VALUE
  1025. fi
  1026. fi
  1027. if grep -q "XMPP_CIPHERS" $IMPORT_FILE; then
  1028. TEMP_VALUE=$(grep "XMPP_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  1029. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  1030. XMPP_CIPHERS=$TEMP_VALUE
  1031. fi
  1032. fi
  1033. if grep -q "XMPP_ECC_CURVE" $IMPORT_FILE; then
  1034. TEMP_VALUE=$(grep "XMPP_ECC_CURVE" $IMPORT_FILE | awk -F '=' '{print $2}')
  1035. if [ ${#TEMP_VALUE} -gt 3 ]; then
  1036. XMPP_ECC_CURVE=$TEMP_VALUE
  1037. fi
  1038. fi
  1039. }
  1040. function export_settings {
  1041. if [ ! $EXPORT_FILE ]; then
  1042. return
  1043. fi
  1044. cd $CURRENT_DIR
  1045. if [ ! -f $EXPORT_FILE ]; then
  1046. if [ "$SSL_PROTOCOLS" ]; then
  1047. echo "SSL_PROTOCOLS=$SSL_PROTOCOLS" >> $EXPORT_FILE
  1048. fi
  1049. if [ $SSL_CIPHERS ]; then
  1050. echo "SSL_CIPHERS=$SSL_CIPHERS" >> $EXPORT_FILE
  1051. fi
  1052. if [ $SSH_CIPHERS ]; then
  1053. echo "SSH_CIPHERS=$SSH_CIPHERS" >> $EXPORT_FILE
  1054. fi
  1055. if [ $SSH_MACS ]; then
  1056. echo "SSH_MACS=$SSH_MACS" >> $EXPORT_FILE
  1057. fi
  1058. if [ $SSH_KEX ]; then
  1059. echo "SSH_KEX=$SSH_KEX" >> $EXPORT_FILE
  1060. fi
  1061. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  1062. echo "SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS" >> $EXPORT_FILE
  1063. fi
  1064. if [ $SSH_PASSWORDS ]; then
  1065. echo "SSH_PASSWORDS=$SSH_PASSWORDS" >> $EXPORT_FILE
  1066. fi
  1067. if [ $XMPP_CIPHERS ]; then
  1068. echo "XMPP_CIPHERS=$XMPP_CIPHERS" >> $EXPORT_FILE
  1069. fi
  1070. if [ $XMPP_ECC_CURVE ]; then
  1071. echo "XMPP_ECC_CURVE=$XMPP_ECC_CURVE" >> $EXPORT_FILE
  1072. fi
  1073. echo "Security settings exported to $EXPORT_FILE"
  1074. exit 0
  1075. fi
  1076. if [ "$SSL_PROTOCOLS" ]; then
  1077. if grep -q "SSL_PROTOCOLS" $EXPORT_FILE; then
  1078. sed -i "s|SSL_PROTOCOLS=.*|SSL_PROTOCOLS=$SSL_PROTOCOLS|g" $EXPORT_FILE
  1079. else
  1080. echo "SSL_PROTOCOLS=$SSL_PROTOCOLS" >> $EXPORT_FILE
  1081. fi
  1082. fi
  1083. if [ $SSL_CIPHERS ]; then
  1084. if grep -q "SSL_CIPHERS" $EXPORT_FILE; then
  1085. sed -i "s|SSL_CIPHERS=.*|SSL_CIPHERS=$SSL_CIPHERS|g" $EXPORT_FILE
  1086. else
  1087. echo "SSL_CIPHERS=$SSL_CIPHERS" >> $EXPORT_FILE
  1088. fi
  1089. fi
  1090. if [ $SSH_CIPHERS ]; then
  1091. if grep -q "SSH_CIPHERS" $EXPORT_FILE; then
  1092. sed -i "s|SSH_CIPHERS=.*|SSH_CIPHERS=$SSH_CIPHERS|g" $EXPORT_FILE
  1093. else
  1094. echo "SSH_CIPHERS=$SSH_CIPHERS" >> $EXPORT_FILE
  1095. fi
  1096. fi
  1097. if [ $SSH_MACS ]; then
  1098. if grep -q "SSH_MACS" $EXPORT_FILE; then
  1099. sed -i "s|SSH_MACS=.*|SSH_MACS=$SSH_MACS|g" $EXPORT_FILE
  1100. else
  1101. echo "SSH_MACS=$SSH_MACS" >> $EXPORT_FILE
  1102. fi
  1103. fi
  1104. if [ $SSH_KEX ]; then
  1105. if grep -q "SSH_KEX" $EXPORT_FILE; then
  1106. sed -i "s|SSH_KEX=.*|SSH_KEX=$SSH_KEX|g" $EXPORT_FILE
  1107. else
  1108. echo "SSH_KEX=$SSH_KEX" >> $EXPORT_FILE
  1109. fi
  1110. fi
  1111. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  1112. if grep -q "SSH_HOST_KEY_ALGORITHMS" $EXPORT_FILE; then
  1113. sed -i "s|SSH_HOST_KEY_ALGORITHMS=.*|SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS|g" $EXPORT_FILE
  1114. else
  1115. echo "SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS" >> $EXPORT_FILE
  1116. fi
  1117. fi
  1118. if [ $SSH_PASSWORDS ]; then
  1119. if grep -q "SSH_PASSWORDS" $EXPORT_FILE; then
  1120. sed -i "s|SSH_PASSWORDS=.*|SSH_PASSWORDS=$SSH_PASSWORDS|g" $EXPORT_FILE
  1121. else
  1122. echo "SSH_PASSWORDS=$SSH_PASSWORDS" >> $EXPORT_FILE
  1123. fi
  1124. fi
  1125. if [ $XMPP_CIPHERS ]; then
  1126. if grep -q "XMPP_CIPHERS" $EXPORT_FILE; then
  1127. sed -i "s|XMPP_CIPHERS=.*|XMPP_CIPHERS=$XMPP_CIPHERS|g" $EXPORT_FILE
  1128. else
  1129. echo "XMPP_CIPHERS=$XMPP_CIPHERS" >> $EXPORT_FILE
  1130. fi
  1131. fi
  1132. if [ $XMPP_ECC_CURVE ]; then
  1133. if grep -q "XMPP_ECC_CURVE" $EXPORT_FILE; then
  1134. sed -i "s|XMPP_ECC_CURVE=.*|XMPP_ECC_CURVE=$XMPP_ECC_CURVE|g" $EXPORT_FILE
  1135. else
  1136. echo "XMPP_ECC_CURVE=$XMPP_ECC_CURVE" >> $EXPORT_FILE
  1137. fi
  1138. fi
  1139. echo $"Security settings exported to $EXPORT_FILE"
  1140. exit 0
  1141. }
  1142. function refresh_gpg_keys {
  1143. for d in /home/*/ ; do
  1144. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  1145. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  1146. su -c 'gpg --refresh-keys' - $USERNAME
  1147. fi
  1148. done
  1149. exit 0
  1150. }
  1151. function monkeysphere_sign_server_keys {
  1152. server_keys_file=/home/$USER/.monkeysphere/server_keys
  1153. if [ ! -f $server_keys_file ]; then
  1154. exit 0
  1155. fi
  1156. keys_signed=
  1157. while read line; do
  1158. echo $line
  1159. if [ ${#line} -gt 2 ]; then
  1160. fpr=$(gpg --with-colons --fingerprint "$line" | grep fpr | head -n 1 | awk -F ':' '{print $10}')
  1161. if [ ${#fpr} -gt 2 ]; then
  1162. gpg --sign-key $fpr
  1163. if [ "$?" = "0" ]; then
  1164. gpg --update-trustdb
  1165. keys_signed=1
  1166. fi
  1167. fi
  1168. fi
  1169. done <$server_keys_file
  1170. if [ $keys_signed ]; then
  1171. rm $server_keys_file
  1172. fi
  1173. exit 0
  1174. }
  1175. function htmly_hash {
  1176. # produces a hash corresponding to a htmly password
  1177. pass="$1"
  1178. HTMLYHASH_FILENAME=/usr/bin/htmlyhash
  1179. echo '<?php' > $HTMLYHASH_FILENAME
  1180. echo 'parse_str(implode("&", array_slice($argv, 1)), $_GET);' >> $HTMLYHASH_FILENAME
  1181. echo '$password = $_GET["password"];' >> $HTMLYHASH_FILENAME
  1182. echo '$hash = password_hash($password, PASSWORD_BCRYPT);' >> $HTMLYHASH_FILENAME
  1183. echo 'if (password_verify($password, $hash)) {' >> $HTMLYHASH_FILENAME
  1184. echo ' echo $hash;' >> $HTMLYHASH_FILENAME
  1185. echo '}' >> $HTMLYHASH_FILENAME
  1186. echo '?>' >> $HTMLYHASH_FILENAME
  1187. php $HTMLYHASH_FILENAME password="$pass"
  1188. }
  1189. function show_help {
  1190. echo ''
  1191. echo "${PROJECT_NAME}-sec"
  1192. echo ''
  1193. echo $'Alters the security settings'
  1194. echo ''
  1195. echo ''
  1196. echo $' -h --help Show help'
  1197. echo $' -e --export Export security settings to a file'
  1198. echo $' -i --import Import security settings from a file'
  1199. echo $' -r --refresh Refresh GPG keys for all users'
  1200. echo $' -s --sign Sign monkeysphere server keys'
  1201. echo $' --register [domain] Register a https domain with monkeysphere'
  1202. echo $' -b --htmlyhash [password] Returns the hash of a password for a htmly blog'
  1203. echo ''
  1204. exit 0
  1205. }
  1206. # Get the commandline options
  1207. while [[ $# > 1 ]]
  1208. do
  1209. key="$1"
  1210. case $key in
  1211. -h|--help)
  1212. show_help
  1213. ;;
  1214. # Export settings
  1215. -e|--export)
  1216. shift
  1217. EXPORT_FILE="$1"
  1218. ;;
  1219. # Export settings
  1220. -i|--import)
  1221. shift
  1222. IMPORT_FILE="$1"
  1223. ;;
  1224. # Refresh GPG keys
  1225. -r|--refresh)
  1226. shift
  1227. refresh_gpg_keys
  1228. ;;
  1229. # register a website
  1230. --register|--reg|--site)
  1231. shift
  1232. register_website "$1"
  1233. ;;
  1234. # user signs monkeysphere server keys
  1235. -s|--sign)
  1236. shift
  1237. monkeysphere_sign_server_keys
  1238. ;;
  1239. # get a hash of the given htmly password
  1240. -b|--htmlyhash)
  1241. shift
  1242. htmly_hash "$1"
  1243. exit 0
  1244. ;;
  1245. *)
  1246. # unknown option
  1247. ;;
  1248. esac
  1249. shift
  1250. done
  1251. menu_security_settings
  1252. exit 0