freedombone-sec 38KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Alters the security settings
  12. #
  13. # License
  14. # =======
  15. #
  16. # Copyright (C) 2015-2016 Bob Mottram <bob@freedombone.net>
  17. #
  18. # This program is free software: you can redistribute it and/or modify
  19. # it under the terms of the GNU Affero General Public License as published by
  20. # the Free Software Foundation, either version 3 of the License, or
  21. # (at your option) any later version.
  22. #
  23. # This program is distributed in the hope that it will be useful,
  24. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. # GNU Affero General Public License for more details.
  27. #
  28. # You should have received a copy of the GNU Affero General Public License
  29. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  30. PROJECT_NAME='freedombone'
  31. export TEXTDOMAIN=${PROJECT_NAME}-sec
  32. export TEXTDOMAINDIR="/usr/share/locale"
  33. CONFIGURATION_FILE=$HOME/${PROJECT_NAME}.cfg
  34. COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt
  35. UTILS_FILES=/usr/share/${PROJECT_NAME}/utils/${PROJECT_NAME}-utils-*
  36. for f in $UTILS_FILES
  37. do
  38. source $f
  39. done
  40. SSL_PROTOCOLS=
  41. SSL_CIPHERS=
  42. SSH_CIPHERS=
  43. SSH_MACS=
  44. SSH_KEX=
  45. SSH_HOST_KEY_ALGORITHMS=
  46. SSH_PASSWORDS=
  47. XMPP_CIPHERS=
  48. XMPP_ECC_CURVE=
  49. WEBSITES_DIRECTORY='/etc/nginx/sites-available'
  50. DOVECOT_CIPHERS='/etc/dovecot/conf.d/10-ssl.conf'
  51. SSH_CONFIG='/etc/ssh/sshd_config'
  52. XMPP_CONFIG='/etc/prosody/conf.avail/xmpp.cfg.lua'
  53. MINIMUM_LENGTH=6
  54. IMPORT_FILE=
  55. EXPORT_FILE=
  56. CURRENT_DIR=$(pwd)
  57. DH_KEYLENGTH=2048
  58. LETSENCRYPT_SERVER='https://acme-v01.api.letsencrypt.org/directory'
  59. MY_USERNAME=
  60. function export_passwords {
  61. detect_usb_drive
  62. data=$(tempfile 2>/dev/null)
  63. trap "rm -f $data" 0 1 2 5 15
  64. dialog --title $"Export passwords to USB drive $USB_DRIVE" \
  65. --backtitle $"Security Settings" \
  66. --defaultno \
  67. --yesno $"\nPlease confirm that you wish to export passwords to a LUKS formatted USB drive. The drive should be plugged in." 10 60
  68. sel=$?
  69. case $sel in
  70. 1) return;;
  71. 255) return;;
  72. esac
  73. data=$(tempfile 2>/dev/null)
  74. trap "rm -f $data" 0 1 2 5 15
  75. dialog --title $"Export passwords to USB drive $USB_DRIVE" \
  76. --backtitle $"Security Settings" \
  77. --defaultno \
  78. --yesno $"\nDo you need to format the drive as LUKS encrypted?" 12 60
  79. sel=$?
  80. case $sel in
  81. 0) ${PROJECT_NAME}-format $USB_DRIVE;;
  82. esac
  83. clear
  84. backup_mount_drive ${USB_DRIVE}
  85. ${PROJECT_NAME}-pass --export ${USB_MOUNT}/${PROJECT_NAME}-passwords.xml
  86. backup_unmount_drive ${USB_DRIVE}
  87. }
  88. function get_protocols_from_website {
  89. if [ ! -f $WEBSITES_DIRECTORY/$1 ]; then
  90. return
  91. fi
  92. SSL_PROTOCOLS=$(cat $WEBSITES_DIRECTORY/$1 | grep 'ssl_protocols ' | awk -F "ssl_protocols " '{print $2}' | awk -F ';' '{print $1}')
  93. }
  94. function get_ciphers_from_website {
  95. if [ ! -f $WEBSITES_DIRECTORY/$1 ]; then
  96. return
  97. fi
  98. SSL_CIPHERS=$(cat $WEBSITES_DIRECTORY/$1 | grep 'ssl_ciphers ' | awk -F "ssl_ciphers " '{print $2}' | awk -F "'" '{print $2}')
  99. }
  100. function get_imap_settings {
  101. if [ ! -f $DOVECOT_CIPHERS ]; then
  102. return
  103. fi
  104. # clear commented out cipher list
  105. sed -i "s|#ssl_cipher_list.*||g" $DOVECOT_CIPHERS
  106. if [ $SSL_CIPHERS ]; then
  107. return
  108. fi
  109. if [ ${#SSL_CIPHERS} -gt $MINIMUM_LENGTH ]; then
  110. return
  111. fi
  112. SSL_CIPHERS=$(cat $DOVECOT_CIPHERS | grep 'ssl_cipher_list' | awk -F '=' '{print $2}' | awk -F "'" '{print $2}')
  113. }
  114. function get_xmpp_settings {
  115. if [ ! -f $XMPP_CONFIG ]; then
  116. return
  117. fi
  118. XMPP_CIPHERS=$(cat $XMPP_CONFIG | grep 'ciphers ' | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  119. XMPP_ECC_CURVE=$(cat $XMPP_CONFIG | grep 'curve ' | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  120. }
  121. function get_ssh_settings {
  122. if [ -f $SSH_CONFIG ]; then
  123. SSH_PASSWORDS=$(cat $SSH_CONFIG | grep 'PasswordAuthentication ' | awk -F 'PasswordAuthentication ' '{print $2}')
  124. fi
  125. if [ -f /etc/ssh/ssh_config ]; then
  126. SSH_HOST_KEY_ALGORITHMS=$(cat /etc/ssh/ssh_config | grep 'HostKeyAlgorithms ' | awk -F 'HostKeyAlgorithms ' '{print $2}')
  127. fi
  128. }
  129. function change_website_settings {
  130. if [ ! "$SSL_PROTOCOLS" ]; then
  131. return
  132. fi
  133. if [ ! $SSL_CIPHERS ]; then
  134. return
  135. fi
  136. if [ ${#SSL_PROTOCOLS} -lt $MINIMUM_LENGTH ]; then
  137. return
  138. fi
  139. if [ ${#SSL_CIPHERS} -lt $MINIMUM_LENGTH ]; then
  140. return
  141. fi
  142. if [ ! -d $WEBSITES_DIRECTORY ]; then
  143. return
  144. fi
  145. cd $WEBSITES_DIRECTORY
  146. for file in `dir -d *` ; do
  147. sed -i "s|ssl_protocols .*|ssl_protocols $SSL_PROTOCOLS;|g" $WEBSITES_DIRECTORY/$file
  148. sed -i "s|ssl_ciphers .*|ssl_ciphers '$SSL_CIPHERS';|g" $WEBSITES_DIRECTORY/$file
  149. done
  150. systemctl restart nginx
  151. echo $'Web security settings changed'
  152. }
  153. function change_imap_settings {
  154. if [ ! -f $DOVECOT_CIPHERS ]; then
  155. return
  156. fi
  157. if [ ! $SSL_CIPHERS ]; then
  158. return
  159. fi
  160. if [ ${#SSL_CIPHERS} -lt $MINIMUM_LENGTH ]; then
  161. return
  162. fi
  163. sed -i "s|ssl_cipher_list.*|ssl_cipher_list = '$SSL_CIPHERS'|g" $DOVECOT_CIPHERS
  164. sed -i "s|ssl_protocols.*|ssl_protocols = '$SSL_PROTOCOLS'|g" $DOVECOT_CIPHERS
  165. systemctl restart dovecot
  166. echo $'imap security settings changed'
  167. }
  168. function change_ssh_settings {
  169. if [ -f /etc/ssh/ssh_config ]; then
  170. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  171. sed -i "s|HostKeyAlgorithms .*|HostKeyAlgorithms $SSH_HOST_KEY_ALGORITHMS|g" /etc/ssh/ssh_config
  172. echo $'ssh client security settings changed'
  173. fi
  174. fi
  175. if [ -f $SSH_CONFIG ]; then
  176. if [ ! $SSH_CIPHERS ]; then
  177. return
  178. fi
  179. if [ ! $SSH_MACS ]; then
  180. return
  181. fi
  182. if [ ! $SSH_KEX ]; then
  183. return
  184. fi
  185. if [ ! $SSH_PASSWORDS ]; then
  186. SSH_PASSWORDS='yes'
  187. fi
  188. sed -i "s|Ciphers .*|Ciphers $SSH_CIPHERS|g" $SSH_CONFIG
  189. sed -i "s|MACs .*|MACs $SSH_MACS|g" $SSH_CONFIG
  190. sed -i "s|KexAlgorithms .*|KexAlgorithms $SSH_KEX|g" $SSH_CONFIG
  191. sed -i "s|#PasswordAuthentication .*|PasswordAuthentication $SSH_PASSWORDS|g" $SSH_CONFIG
  192. sed -i "s|PasswordAuthentication .*|PasswordAuthentication $SSH_PASSWORDS|g" $SSH_CONFIG
  193. systemctl restart ssh
  194. echo $'ssh server security settings changed'
  195. fi
  196. }
  197. function change_xmpp_settings {
  198. if [ ! -f $XMPP_CONFIG ]; then
  199. return
  200. fi
  201. if [ ! $XMPP_CIPHERS ]; then
  202. return
  203. fi
  204. if [ ! $XMPP_ECC_CURVE ]; then
  205. return
  206. fi
  207. sed -i "s|ciphers =.*|ciphers = \"$XMPP_CIPHERS\";|g" $XMPP_CONFIG
  208. sed -i "s|curve =.*|curve = \"$XMPP_ECC_CURVE\";|g" $XMPP_CONFIG
  209. systemctl restart prosody
  210. echo $'xmpp security settings changed'
  211. }
  212. function allow_ssh_passwords {
  213. dialog --title $"SSH Passwords" \
  214. --backtitle $"Freedombone Security Configuration" \
  215. --yesno $"\nAllow SSH login using passwords?" 7 60
  216. sel=$?
  217. case $sel in
  218. 0) SSH_PASSWORDS="yes";;
  219. 1) SSH_PASSWORDS="no";;
  220. 255) exit 0;;
  221. esac
  222. }
  223. function interactive_setup {
  224. if [ $SSL_CIPHERS ]; then
  225. data=$(tempfile 2>/dev/null)
  226. trap "rm -f $data" 0 1 2 5 15
  227. dialog --backtitle $"Freedombone Security Configuration" \
  228. --form $"\nWeb/IMAP Ciphers:" 10 95 2 \
  229. $"Protocols:" 1 1 "$SSL_PROTOCOLS" 1 15 90 90 \
  230. $"Ciphers:" 2 1 "$SSL_CIPHERS" 2 15 90 512 \
  231. 2> $data
  232. sel=$?
  233. case $sel in
  234. 1) SSL_PROTOCOLS=$(cat $data | sed -n 1p)
  235. SSL_CIPHERS=$(cat $data | sed -n 2p)
  236. ;;
  237. 255) exit 0;;
  238. esac
  239. fi
  240. data=$(tempfile 2>/dev/null)
  241. trap "rm -f $data" 0 1 2 5 15
  242. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  243. dialog --backtitle $"Freedombone Security Configuration" \
  244. --form $"\nSecure Shell Ciphers:" 13 95 4 \
  245. $"Ciphers:" 1 1 "$SSH_CIPHERS" 1 15 90 512 \
  246. $"MACs:" 2 1 "$SSH_MACS" 2 15 90 512 \
  247. $"KEX:" 3 1 "$SSH_KEX" 3 15 90 512 \
  248. $"Host key algorithms:" 4 1 "$SSH_HOST_KEY_ALGORITHMS" 4 15 90 512 \
  249. 2> $data
  250. sel=$?
  251. case $sel in
  252. 1) SSH_CIPHERS=$(cat $data | sed -n 1p)
  253. SSH_MACS=$(cat $data | sed -n 2p)
  254. SSH_KEX=$(cat $data | sed -n 3p)
  255. SSH_HOST_KEY_ALGORITHMS=$(cat $data | sed -n 4p)
  256. ;;
  257. 255) exit 0;;
  258. esac
  259. else
  260. dialog --backtitle $"Freedombone Security Configuration" \
  261. --form $"\nSecure Shell Ciphers:" 11 95 3 \
  262. $"Ciphers:" 1 1 "$SSH_CIPHERS" 1 15 90 512 \
  263. $"MACs:" 2 1 "$SSH_MACS" 2 15 90 512 \
  264. $"KEX:" 3 1 "$SSH_KEX" 3 15 90 512 \
  265. 2> $data
  266. sel=$?
  267. case $sel in
  268. 1) SSH_CIPHERS=$(cat $data | sed -n 1p)
  269. SSH_MACS=$(cat $data | sed -n 2p)
  270. SSH_KEX=$(cat $data | sed -n 3p)
  271. ;;
  272. 255) exit 0;;
  273. esac
  274. fi
  275. if [ $XMPP_CIPHERS ]; then
  276. data=$(tempfile 2>/dev/null)
  277. trap "rm -f $data" 0 1 2 5 15
  278. dialog --backtitle $"Freedombone Security Configuration" \
  279. --form $"\nXMPP Ciphers:" 10 95 2 \
  280. $"Ciphers:" 1 1 "$XMPP_CIPHERS" 1 15 90 512 \
  281. $"ECC Curve:" 2 1 "$XMPP_ECC_CURVE" 2 15 50 50 \
  282. 2> $data
  283. sel=$?
  284. case $sel in
  285. 1) XMPP_CIPHERS=$(cat $data | sed -n 1p)
  286. XMPP_ECC_CURVE=$(cat $data | sed -n 2p)
  287. ;;
  288. 255) exit 0;;
  289. esac
  290. fi
  291. dialog --title $"Final Confirmation" \
  292. --backtitle $"Freedombone Security Configuration" \
  293. --defaultno \
  294. --yesno $"\nPlease confirm that you wish your security settings to be changed?\n\nWARNING: any mistakes made in the security settings could compromise your system, so be extra careful when answering 'yes'." 12 60
  295. sel=$?
  296. case $sel in
  297. 1) clear
  298. echo $'Exiting without changing security settings'
  299. exit 0;;
  300. 255) clear
  301. echo $'Exiting without changing security settings'
  302. exit 0;;
  303. esac
  304. clear
  305. }
  306. function send_monkeysphere_server_keys_to_users {
  307. monkeysphere_server_keys=$(monkeysphere-host show-key | grep $"OpenPGP fingerprint" | awk -F ' ' '{print $3}')
  308. for d in /home/*/ ; do
  309. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  310. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  311. if [ ! -d /home/$USERNAME/.monkeysphere ]; then
  312. mkdir /home/$USERNAME/.monkeysphere
  313. fi
  314. echo $monkeysphere_server_keys > /home/$USERNAME/.monkeysphere/server_keys
  315. chown -R $USERNAME:$USERNAME /home/$USERNAME/.monkeysphere
  316. fi
  317. done
  318. }
  319. function regenerate_ssh_host_keys {
  320. rm -f /etc/ssh/ssh_host_*
  321. dpkg-reconfigure openssh-server
  322. echo $'ssh host keys regenerated'
  323. # remove small moduli
  324. awk '$5 > 2000' /etc/ssh/moduli > ~/moduli
  325. mv ~/moduli /etc/ssh/moduli
  326. echo $'ssh small moduli removed'
  327. # update monkeysphere
  328. DEFAULT_DOMAIN_NAME=
  329. read_config_param "DEFAULT_DOMAIN_NAME"
  330. monkeysphere-host import-key /etc/ssh/ssh_host_rsa_key ssh://$DEFAULT_DOMAIN_NAME
  331. SSH_ONION_HOSTNAME=$(cat ${COMPLETION_FILE} | grep 'ssh onion domain' | awk -F ':' '{print $2}')
  332. monkeysphere-host import-key /etc/ssh/ssh_host_rsa_key ssh://$SSH_ONION_HOSTNAME
  333. monkeysphere-host publish-key
  334. send_monkeysphere_server_keys_to_users
  335. echo $'updated monkeysphere ssh host key'
  336. systemctl restart ssh
  337. }
  338. function regenerate_dh_keys {
  339. if [ ! -d /etc/ssl/mycerts ]; then
  340. echo $'No dhparam certificates were found'
  341. return
  342. fi
  343. data=$(tempfile 2>/dev/null)
  344. trap "rm -f $data" 0 1 2 5 15
  345. dialog --backtitle "Freedombone Security Configuration" \
  346. --title "Diffie-Hellman key length" \
  347. --radiolist "The smaller length is better suited to low power embedded systems:" 12 40 3 \
  348. 1 "2048 bits" off \
  349. 2 "3072 bits" on \
  350. 3 "4096 bits" off 2> $data
  351. sel=$?
  352. case $sel in
  353. 1) exit 1;;
  354. 255) exit 1;;
  355. esac
  356. case $(cat $data) in
  357. 1) DH_KEYLENGTH=2048;;
  358. 2) DH_KEYLENGTH=3072;;
  359. 3) DH_KEYLENGTH=4096;;
  360. esac
  361. ${PROJECT_NAME}-dhparam --recalc yes -l ${DH_KEYLENGTH}
  362. }
  363. function renew_startssl {
  364. renew_domain=
  365. data=$(tempfile 2>/dev/null)
  366. trap "rm -f $data" 0 1 2 5 15
  367. dialog --title $"Renew a StartSSL certificate" \
  368. --backtitle $"Freedombone Security Settings" \
  369. --inputbox $"Enter the domain name" 8 60 2>$data
  370. sel=$?
  371. case $sel in
  372. 0)
  373. renew_domain=$(<$data)
  374. ;;
  375. esac
  376. if [ ! $renew_domain ]; then
  377. return
  378. fi
  379. if [[ $renew_domain == "http"* ]]; then
  380. dialog --title $"Renew a StartSSL certificate" \
  381. --msgbox $"Don't include the https://" 6 40
  382. return
  383. fi
  384. if [ ! -f /etc/ssl/certs/${renew_domain}.dhparam ]; then
  385. dialog --title $"Renew a StartSSL certificate" \
  386. --msgbox $"An existing certificate for $renew_domain was not found" 6 40
  387. return
  388. fi
  389. if [[ $renew_domain != *"."* ]]; then
  390. dialog --title $"Renew a StartSSL certificate" \
  391. --msgbox $"Invalid domain name: $renew_domain" 6 40
  392. return
  393. fi
  394. ${PROJECT_NAME}-renew-cert -h $renew_domain -p startssl
  395. exit 0
  396. }
  397. function renew_letsencrypt {
  398. renew_domain=
  399. data=$(tempfile 2>/dev/null)
  400. trap "rm -f $data" 0 1 2 5 15
  401. dialog --title $"Renew a Let's Encrypt certificate" \
  402. --backtitle $"Freedombone Security Settings" \
  403. --inputbox $"Enter the domain name" 8 60 2>$data
  404. sel=$?
  405. case $sel in
  406. 0)
  407. renew_domain=$(<$data)
  408. ;;
  409. esac
  410. if [ ! $renew_domain ]; then
  411. return
  412. fi
  413. if [[ $renew_domain == "http"* ]]; then
  414. dialog --title $"Renew a Let's Encrypt certificate" \
  415. --msgbox $"Don't include the https://" 6 40
  416. return
  417. fi
  418. if [ ! -f /etc/ssl/certs/${renew_domain}.dhparam ]; then
  419. dialog --title $"Renew a Let's Encrypt certificate" \
  420. --msgbox $"An existing certificate for $renew_domain was not found" 6 40
  421. return
  422. fi
  423. if [[ $renew_domain != *"."* ]]; then
  424. dialog --title $"Renew a Let's Encrypt certificate" \
  425. --msgbox $"Invalid domain name: $renew_domain" 6 40
  426. return
  427. fi
  428. ${PROJECT_NAME}-renew-cert -h $renew_domain -p 'letsencrypt'
  429. exit 0
  430. }
  431. function create_letsencrypt {
  432. new_domain=
  433. data=$(tempfile 2>/dev/null)
  434. trap "rm -f $data" 0 1 2 5 15
  435. dialog --title $"Create a new Let's Encrypt certificate" \
  436. --backtitle $"Freedombone Security Settings" \
  437. --inputbox $"Enter the domain name" 8 60 2>$data
  438. sel=$?
  439. case $sel in
  440. 0)
  441. new_domain=$(<$data)
  442. ;;
  443. esac
  444. if [ ! $new_domain ]; then
  445. return
  446. fi
  447. if [[ $new_domain == "http"* ]]; then
  448. dialog --title $"Create a new Let's Encrypt certificate" \
  449. --msgbox $"Don't include the https://" 6 40
  450. return
  451. fi
  452. if [[ $new_domain != *"."* ]]; then
  453. dialog --title $"Create a new Let's Encrypt certificate" \
  454. --msgbox $"Invalid domain name: $new_domain" 6 40
  455. return
  456. fi
  457. if [ ! -d /var/www/${new_domain} ]; then
  458. domain_found=
  459. if [ -f /etc/nginx/sites-available/radicale ]; then
  460. if grep "${new_domain}" /etc/nginx/sites-available/radicale; then
  461. domain_found=1
  462. fi
  463. fi
  464. if [ -f /etc/nginx/sites-available/${new_domain} ]; then
  465. domain_found=1
  466. fi
  467. if [[ "${new_domain}" == "jitsi"* || "${new_domain}" == "meet"* ]]; then
  468. domain_found=1
  469. fi
  470. if [ ! $domain_found ]; then
  471. dialog --title $"Create a new Let's Encrypt certificate" \
  472. --msgbox $'Domain not found within /var/www' 6 40
  473. return
  474. fi
  475. fi
  476. ${PROJECT_NAME}-addcert -e $new_domain -s $LETSENCRYPT_SERVER --dhkey $DH_KEYLENGTH
  477. exit 0
  478. }
  479. function update_ciphersuite {
  480. RECOMMENDED_SSL_CIPHERS="$SSL_CIPHERS"
  481. if [ ${#RECOMMENDED_SSL_CIPHERS} -lt 5 ]; then
  482. return
  483. fi
  484. RECOMMENDED_SSL_PROTOCOLS="$SSL_PROTOCOLS"
  485. if [ ${#RECOMMENDED_SSL_PROTOCOLS} -lt 5 ]; then
  486. return
  487. fi
  488. RECOMMENDED_SSH_CIPHERS="$SSH_CIPHERS"
  489. if [ ${#RECOMMENDED_SSH_CIPHERS} -lt 5 ]; then
  490. return
  491. fi
  492. RECOMMENDED_SSH_MACS="$SSH_MACS"
  493. if [ ${#RECOMMENDED_SSH_MACS} -lt 5 ]; then
  494. return
  495. fi
  496. RECOMMENDED_SSH_KEX="$SSH_KEX"
  497. if [ ${#RECOMMENDED_SSH_KEX} -lt 5 ]; then
  498. return
  499. fi
  500. cd $WEBSITES_DIRECTORY
  501. for file in `dir -d *` ; do
  502. sed -i "s|ssl_protocols .*|ssl_protocols $RECOMMENDED_SSL_PROTOCOLS;|g" $WEBSITES_DIRECTORY/$file
  503. sed -i "s|ssl_ciphers .*|ssl_ciphers '$RECOMMENDED_SSL_CIPHERS';|g" $WEBSITES_DIRECTORY/$file
  504. done
  505. systemctl restart nginx
  506. write_config_param "SSL_PROTOCOLS" "$RECOMMENDED_SSL_PROTOCOLS"
  507. write_config_param "SSL_CIPHERS" "$RECOMMENDED_SSL_CIPHERS"
  508. sed -i "s|Ciphers .*|Ciphers $RECOMMENDED_SSH_CIPHERS|g" $SSH_CONFIG
  509. sed -i "s|MACs .*|MACs $RECOMMENDED_SSH_MACS|g" $SSH_CONFIG
  510. sed -i "s|KexAlgorithms .*|KexAlgorithms $RECOMMENDED_SSH_KEX|g" $SSH_CONFIG
  511. systemctl restart ssh
  512. write_config_param "SSH_CIPHERS" "$RECOMMENDED_SSH_CIPHERS"
  513. write_config_param "SSH_MACS" "$RECOMMENDED_SSH_MACS"
  514. write_config_param "SSH_KEX" "$RECOMMENDED_SSH_KEX"
  515. dialog --title $"Update ciphersuite" \
  516. --msgbox $"The ciphersuite has been updated to recommended versions" 6 40
  517. exit 0
  518. }
  519. function gpg_pubkey_from_email {
  520. key_owner_username=$1
  521. key_email_address=$2
  522. key_id=
  523. if [[ $key_owner_username != "root" ]]; then
  524. key_id=$(su -c "gpg --list-keys $key_email_address | grep 'pub '" - $key_owner_username | awk -F ' ' '{print $2}' | awk -F '/' '{print $2}')
  525. else
  526. key_id=$(gpg --list-keys $key_email_address | grep 'pub ' | awk -F ' ' '{print $2}' | awk -F '/' '{print $2}')
  527. fi
  528. echo $key_id
  529. }
  530. function enable_monkeysphere {
  531. monkey=
  532. dialog --title $"GPG based authentication" \
  533. --backtitle $"Freedombone Security Configuration" \
  534. --defaultno \
  535. --yesno $"\nEnable GPG based authentication with monkeysphere ?" 7 60
  536. sel=$?
  537. case $sel in
  538. 0) monkey='yes';;
  539. 255) exit 0;;
  540. esac
  541. if [ $monkey ]; then
  542. read_config_param "MY_USERNAME"
  543. if [ ! -f /home/$MY_USERNAME/.monkeysphere/authorized_user_ids ]; then
  544. dialog --title $"GPG based authentication" \
  545. --msgbox $"$MY_USERNAME does not currently have any ids within ~/.monkeysphere/authorized_user_ids" 6 40
  546. exit 0
  547. fi
  548. MY_GPG_PUBLIC_KEY_ID=$(gpg_pubkey_from_email "$MY_USERNAME" "$MY_USERNAME@$HOSTNAME")
  549. if [ ${#MY_GPG_PUBLIC_KEY_ID} -lt 4 ]; then
  550. echo $'monkeysphere unable to get GPG key ID for user $MY_USERNAME'
  551. exit 52825
  552. fi
  553. sed -i 's|#AuthorizedKeysFile|AuthorizedKeysFile|g' /etc/ssh/sshd_config
  554. sed -i 's|AuthorizedKeysFile.*|AuthorizedKeysFile /var/lib/monkeysphere/authorized_keys/%u|g' /etc/ssh/sshd_config
  555. monkeysphere-authentication update-users
  556. # The admin user is the identity certifier
  557. fpr=$(gpg --with-colons --fingerprint $MY_GPG_PUBLIC_KEY_ID | grep fpr | head -n 1 | awk -F ':' '{print $10}')
  558. monkeysphere-authentication add-identity-certifier $fpr
  559. monkeysphere-host publish-key
  560. send_monkeysphere_server_keys_to_users
  561. else
  562. sed -i 's|#AuthorizedKeysFile|AuthorizedKeysFile|g' /etc/ssh/sshd_config
  563. sed -i 's|AuthorizedKeysFile.*|AuthorizedKeysFile %h/.ssh/authorized_keys|g' /etc/ssh/sshd_config
  564. fi
  565. systemctl restart ssh
  566. if [ $monkey ]; then
  567. dialog --title $"GPG based authentication" \
  568. --msgbox $"GPG based authentication was enabled" 6 40
  569. else
  570. dialog --title $"GPG based authentication" \
  571. --msgbox $"GPG based authentication was disabled" 6 40
  572. fi
  573. exit 0
  574. }
  575. function register_website {
  576. domain="$1"
  577. if [[ ${domain} == *".local" ]]; then
  578. echo $"Can't register local domains"
  579. return
  580. fi
  581. if [ ! -f /etc/ssl/private/${domain}.key ]; then
  582. echo $"No SSL/TLS private key found for ${domain}"
  583. return
  584. fi
  585. if [ ! -f /etc/nginx/sites-available/${domain} ]; then
  586. echo $"No virtual host found for ${domain}"
  587. return
  588. fi
  589. monkeysphere-host import-key /etc/ssl/private/${domain}.key https://${domain}
  590. monkeysphere-host publish-key
  591. echo "0"
  592. }
  593. function register_website_interactive {
  594. data=$(tempfile 2>/dev/null)
  595. trap "rm -f $data" 0 1 2 5 15
  596. dialog --title $"Register a website with monkeysphere" \
  597. --backtitle $"Freedombone Security Settings" \
  598. --inputbox $"Enter the website domain name (without https://)" 8 60 2>$data
  599. sel=$?
  600. case $sel in
  601. 0)
  602. domain=$(<$data)
  603. register_website "$domain"
  604. if [ ! "$?" = "0" ]; then
  605. dialog --title $"Register a website with monkeysphere" \
  606. --msgbox "$?" 6 40
  607. else
  608. dialog --title $"Register a website with monkeysphere" \
  609. --msgbox $"$domain has been registered" 6 40
  610. fi
  611. ;;
  612. esac
  613. }
  614. function pin_all_tls_certs {
  615. ${PROJECT_NAME}-pin-cert all
  616. }
  617. function remove_pinning {
  618. data=$(tempfile 2>/dev/null)
  619. trap "rm -f $data" 0 1 2 5 15
  620. dialog --title $"Remove pinning for a domain" \
  621. --backtitle $"Freedombone Security Settings" \
  622. --inputbox $"Enter the website domain name (without https://)" 8 60 2>$data
  623. sel=$?
  624. case $sel in
  625. 0)
  626. domain=$(<$data)
  627. ${PROJECT_NAME}-pin-cert "$domain" remove
  628. if [ ! "$?" = "0" ]; then
  629. dialog --title $"Removed pinning from $domain" \
  630. --msgbox "$?" 6 40
  631. fi
  632. ;;
  633. esac
  634. }
  635. function store_passwords {
  636. dialog --title $"Store Passwords" \
  637. --backtitle $"Freedombone Security Configuration" \
  638. --yesno $"\nDo you wish to store passwords on the system? Stored passwords are convenient but carry some additional security risk." 10 60
  639. sel=$?
  640. case $sel in
  641. 0)
  642. if [ -f /root/.nostore ]; then
  643. read_config_param "MY_USERNAME"
  644. if [ ! -f /home/$MY_USERNAME/.ssh/authorized_keys ]; then
  645. dialog --title $"Store Passwords" \
  646. --msgbox $"\nYou should first enable key based ssh login to improve security" 8 60
  647. return
  648. fi
  649. if [[ $SSH_PASSWORDS == 'yes' ]]; then
  650. dialog --title $"Store Passwords" \
  651. --msgbox $"\nYou should disable ssh passwords to improve security" 8 60
  652. return
  653. fi
  654. ${PROJECT_NAME}-pass --enable yes
  655. dialog --title $"Store Passwords" \
  656. --msgbox $"\nUser passwords will now be stored on the system" 8 60
  657. fi
  658. return
  659. ;;
  660. 1)
  661. ${PROJECT_NAME}-pass --clear yes
  662. dialog --title $"Passwords were removed and will not be stored" \
  663. --msgbox $"\nFor the best security you should now manually change passwords via web interfaces so that there is no possibility of them being recovered from the disk" 9 60
  664. return
  665. ;;
  666. 255) return;;
  667. esac
  668. }
  669. function show_tor_bridges {
  670. clear
  671. bridges_list=$(grep "Bridge " /etc/tor/torrc | grep -v '##')
  672. if [ ${#bridges_list} -eq 0 ]; then
  673. echo $'No Tor bridges have been added'
  674. return
  675. fi
  676. echo "${bridges_list}"
  677. }
  678. function add_tor_bridge {
  679. data=$(tempfile 2>/dev/null)
  680. trap "rm -f $data" 0 1 2 5 15
  681. dialog --backtitle $"Freedombone Control Panel" \
  682. --title $"Add obfs4 Tor bridge" \
  683. --form "\n" 9 60 4 \
  684. $"IP address:" 1 1 " . . . " 1 15 16 16 \
  685. $"Port: " 2 1 "" 2 15 5 5 \
  686. $"Key: " 3 1 "" 3 15 250 250 \
  687. 2> $data
  688. sel=$?
  689. case $sel in
  690. 1) return;;
  691. 255) return;;
  692. esac
  693. bridge_ip_address=$(cat $data | sed -n 1p)
  694. bridge_port=$(cat $data | sed -n 2p)
  695. bridge_key=$(cat $data | sed -n 3p)
  696. if [[ "${bridge_ip_address}" == *" "* ]]; then
  697. return
  698. fi
  699. if [[ "${bridge_ip_address}" != *"."* ]]; then
  700. return
  701. fi
  702. if [ ${#bridge_port} -eq 0 ]; then
  703. return
  704. fi
  705. if [ ${#bridge_key} -eq 0 ]; then
  706. return
  707. fi
  708. tor_add_bridge "${bridge_ip_address}" "${bridge_port}" "${bridge_key}"
  709. dialog --title $"Add obfs4 Tor bridge" \
  710. --msgbox $"Bridge added" 6 40
  711. }
  712. function remove_tor_bridge {
  713. data=$(tempfile 2>/dev/null)
  714. trap "rm -f $data" 0 1 2 5 15
  715. dialog --backtitle $"Freedombone Control Panel" \
  716. --title $"Remove obfs4 Tor bridge" \
  717. --form "\n" 7 60 1 \
  718. $"IP address:" 1 1 " . . . " 1 15 16 16 \
  719. 2> $data
  720. sel=$?
  721. case $sel in
  722. 1) return;;
  723. 255) return;;
  724. esac
  725. bridge_ip_address=$(cat $data | sed -n 1p)
  726. if [[ "${bridge_ip_address}" == *" "* ]]; then
  727. return
  728. fi
  729. if [[ "${bridge_ip_address}" != *"."* ]]; then
  730. return
  731. fi
  732. tor_remove_bridge "${bridge_ip_address}"
  733. dialog --title $"Remove obfs4 Tor bridge" \
  734. --msgbox $"Bridge removed" 6 40
  735. }
  736. function menu_tor_bridges {
  737. data=$(tempfile 2>/dev/null)
  738. trap "rm -f $data" 0 1 2 5 15
  739. dialog --backtitle $"Freedombone Control Panel" \
  740. --title $"Tor Bridges" \
  741. --radiolist $"Choose an operation:" 12 50 4 \
  742. 1 $"Show bridges" off \
  743. 2 $"Add a bridge" off \
  744. 3 $"Remove a bridge" off \
  745. 4 $"Go Back/Exit" on 2> $data
  746. sel=$?
  747. case $sel in
  748. 1) exit 1;;
  749. 255) exit 1;;
  750. esac
  751. case $(cat $data) in
  752. 1)
  753. show_tor_bridges
  754. exit 0
  755. ;;
  756. 2)
  757. add_tor_bridge
  758. exit 0
  759. ;;
  760. 3)
  761. remove_tor_bridge
  762. exit 0
  763. ;;
  764. 4)
  765. exit 0
  766. ;;
  767. esac
  768. }
  769. function menu_security_settings {
  770. data=$(tempfile 2>/dev/null)
  771. trap "rm -f $data" 0 1 2 5 15
  772. dialog --backtitle $"Freedombone Control Panel" \
  773. --title $"Security Settings" \
  774. --radiolist $"Choose an operation:" 21 76 21 \
  775. 1 $"Run STIG tests" off \
  776. 2 $"Show ssh host public key" off \
  777. 3 $"Tor bridges" off \
  778. 4 $"Password storage" off \
  779. 5 $"Export passwords" off \
  780. 6 $"Regenerate ssh host keys" off \
  781. 7 $"Regenerate Diffie-Hellman keys" off \
  782. 8 $"Update cipersuite" off \
  783. 9 $"Create a new Let's Encrypt certificate" off \
  784. 10 $"Renew Let's Encrypt certificate" off \
  785. 11 $"Enable GPG based authentication (monkeysphere)" off \
  786. 12 $"Register a website with monkeysphere" off \
  787. 13 $"Allow ssh login with passwords" off \
  788. 14 $"Go Back/Exit" on 2> $data
  789. sel=$?
  790. case $sel in
  791. 1) exit 1;;
  792. 255) exit 1;;
  793. esac
  794. clear
  795. read_config_param SSL_CIPHERS
  796. read_config_param SSL_PROTOCOLS
  797. read_config_param SSH_CIPHERS
  798. read_config_param SSH_MACS
  799. read_config_param SSH_KEX
  800. get_imap_settings
  801. get_ssh_settings
  802. get_xmpp_settings
  803. import_settings
  804. export_settings
  805. case $(cat $data) in
  806. 1)
  807. clear
  808. echo $'Running STIG tests...'
  809. echo ''
  810. ${PROJECT_NAME}-tests --stig showall
  811. exit 0
  812. ;;
  813. 2)
  814. dialog --title $"SSH host public keys" \
  815. --msgbox "\n$(get_ssh_server_key)" 12 60
  816. exit 0
  817. ;;
  818. 3)
  819. menu_tor_bridges
  820. exit 0
  821. ;;
  822. 4)
  823. store_passwords
  824. exit 0
  825. ;;
  826. 5)
  827. export_passwords
  828. exit 0
  829. ;;
  830. 6)
  831. regenerate_ssh_host_keys
  832. ;;
  833. 7)
  834. regenerate_dh_keys
  835. ;;
  836. 8)
  837. interactive_setup
  838. update_ciphersuite
  839. ;;
  840. 9)
  841. create_letsencrypt
  842. ;;
  843. 10)
  844. renew_letsencrypt
  845. ;;
  846. 11)
  847. enable_monkeysphere
  848. ;;
  849. 12)
  850. register_website
  851. ;;
  852. 13)
  853. allow_ssh_passwords
  854. change_ssh_settings
  855. exit 0
  856. ;;
  857. 14)
  858. exit 0
  859. ;;
  860. esac
  861. change_website_settings
  862. change_imap_settings
  863. change_ssh_settings
  864. change_xmpp_settings
  865. }
  866. function import_settings {
  867. cd $CURRENT_DIR
  868. if [ ! $IMPORT_FILE ]; then
  869. return
  870. fi
  871. if [ ! -f $IMPORT_FILE ]; then
  872. echo $"Import file $IMPORT_FILE not found"
  873. exit 6393
  874. fi
  875. if grep -q "SSL_PROTOCOLS" $IMPORT_FILE; then
  876. TEMP_VALUE=$(grep "SSL_PROTOCOLS" $IMPORT_FILE | awk -F '=' '{print $2}')
  877. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  878. SSL_PROTOCOLS=$TEMP_VALUE
  879. fi
  880. fi
  881. if grep -q "SSL_CIPHERS" $IMPORT_FILE; then
  882. TEMP_VALUE=$(grep "SSL_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  883. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  884. SSL_CIPHERS=$TEMP_VALUE
  885. fi
  886. fi
  887. if grep -q "SSH_CIPHERS" $IMPORT_FILE; then
  888. TEMP_VALUE=$(grep "SSH_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  889. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  890. SSH_CIPHERS=$TEMP_VALUE
  891. fi
  892. fi
  893. if grep -q "SSH_MACS" $IMPORT_FILE; then
  894. TEMP_VALUE=$(grep "SSH_MACS" $IMPORT_FILE | awk -F '=' '{print $2}')
  895. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  896. SSH_MACS=$TEMP_VALUE
  897. fi
  898. fi
  899. if grep -q "SSH_KEX" $IMPORT_FILE; then
  900. TEMP_VALUE=$(grep "SSH_KEX" $IMPORT_FILE | awk -F '=' '{print $2}')
  901. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  902. SSH_KEX=$TEMP_VALUE
  903. fi
  904. fi
  905. if grep -q "SSH_HOST_KEY_ALGORITHMS" $IMPORT_FILE; then
  906. TEMP_VALUE=$(grep "SSH_HOST_KEY_ALGORITHMS" $IMPORT_FILE | awk -F '=' '{print $2}')
  907. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  908. SSH_HOST_KEY_ALGORITHMS=$TEMP_VALUE
  909. fi
  910. fi
  911. if grep -q "SSH_PASSWORDS" $IMPORT_FILE; then
  912. TEMP_VALUE=$(grep "SSH_PASSWORDS" $IMPORT_FILE | awk -F '=' '{print $2}')
  913. if [[ $TEMP_VALUE == "yes" || $TEMP_VALUE == "no" ]]; then
  914. SSH_PASSWORDS=$TEMP_VALUE
  915. fi
  916. fi
  917. if grep -q "XMPP_CIPHERS" $IMPORT_FILE; then
  918. TEMP_VALUE=$(grep "XMPP_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  919. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  920. XMPP_CIPHERS=$TEMP_VALUE
  921. fi
  922. fi
  923. if grep -q "XMPP_ECC_CURVE" $IMPORT_FILE; then
  924. TEMP_VALUE=$(grep "XMPP_ECC_CURVE" $IMPORT_FILE | awk -F '=' '{print $2}')
  925. if [ ${#TEMP_VALUE} -gt 3 ]; then
  926. XMPP_ECC_CURVE=$TEMP_VALUE
  927. fi
  928. fi
  929. }
  930. function export_settings {
  931. if [ ! $EXPORT_FILE ]; then
  932. return
  933. fi
  934. cd $CURRENT_DIR
  935. if [ ! -f $EXPORT_FILE ]; then
  936. if [ "$SSL_PROTOCOLS" ]; then
  937. echo "SSL_PROTOCOLS=$SSL_PROTOCOLS" >> $EXPORT_FILE
  938. fi
  939. if [ $SSL_CIPHERS ]; then
  940. echo "SSL_CIPHERS=$SSL_CIPHERS" >> $EXPORT_FILE
  941. fi
  942. if [ $SSH_CIPHERS ]; then
  943. echo "SSH_CIPHERS=$SSH_CIPHERS" >> $EXPORT_FILE
  944. fi
  945. if [ $SSH_MACS ]; then
  946. echo "SSH_MACS=$SSH_MACS" >> $EXPORT_FILE
  947. fi
  948. if [ $SSH_KEX ]; then
  949. echo "SSH_KEX=$SSH_KEX" >> $EXPORT_FILE
  950. fi
  951. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  952. echo "SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS" >> $EXPORT_FILE
  953. fi
  954. if [ $SSH_PASSWORDS ]; then
  955. echo "SSH_PASSWORDS=$SSH_PASSWORDS" >> $EXPORT_FILE
  956. fi
  957. if [ $XMPP_CIPHERS ]; then
  958. echo "XMPP_CIPHERS=$XMPP_CIPHERS" >> $EXPORT_FILE
  959. fi
  960. if [ $XMPP_ECC_CURVE ]; then
  961. echo "XMPP_ECC_CURVE=$XMPP_ECC_CURVE" >> $EXPORT_FILE
  962. fi
  963. echo "Security settings exported to $EXPORT_FILE"
  964. exit 0
  965. fi
  966. if [ "$SSL_PROTOCOLS" ]; then
  967. if grep -q "SSL_PROTOCOLS" $EXPORT_FILE; then
  968. sed -i "s|SSL_PROTOCOLS=.*|SSL_PROTOCOLS=$SSL_PROTOCOLS|g" $EXPORT_FILE
  969. else
  970. echo "SSL_PROTOCOLS=$SSL_PROTOCOLS" >> $EXPORT_FILE
  971. fi
  972. fi
  973. if [ $SSL_CIPHERS ]; then
  974. if grep -q "SSL_CIPHERS" $EXPORT_FILE; then
  975. sed -i "s|SSL_CIPHERS=.*|SSL_CIPHERS=$SSL_CIPHERS|g" $EXPORT_FILE
  976. else
  977. echo "SSL_CIPHERS=$SSL_CIPHERS" >> $EXPORT_FILE
  978. fi
  979. fi
  980. if [ $SSH_CIPHERS ]; then
  981. if grep -q "SSH_CIPHERS" $EXPORT_FILE; then
  982. sed -i "s|SSH_CIPHERS=.*|SSH_CIPHERS=$SSH_CIPHERS|g" $EXPORT_FILE
  983. else
  984. echo "SSH_CIPHERS=$SSH_CIPHERS" >> $EXPORT_FILE
  985. fi
  986. fi
  987. if [ $SSH_MACS ]; then
  988. if grep -q "SSH_MACS" $EXPORT_FILE; then
  989. sed -i "s|SSH_MACS=.*|SSH_MACS=$SSH_MACS|g" $EXPORT_FILE
  990. else
  991. echo "SSH_MACS=$SSH_MACS" >> $EXPORT_FILE
  992. fi
  993. fi
  994. if [ $SSH_KEX ]; then
  995. if grep -q "SSH_KEX" $EXPORT_FILE; then
  996. sed -i "s|SSH_KEX=.*|SSH_KEX=$SSH_KEX|g" $EXPORT_FILE
  997. else
  998. echo "SSH_KEX=$SSH_KEX" >> $EXPORT_FILE
  999. fi
  1000. fi
  1001. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  1002. if grep -q "SSH_HOST_KEY_ALGORITHMS" $EXPORT_FILE; then
  1003. sed -i "s|SSH_HOST_KEY_ALGORITHMS=.*|SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS|g" $EXPORT_FILE
  1004. else
  1005. echo "SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS" >> $EXPORT_FILE
  1006. fi
  1007. fi
  1008. if [ $SSH_PASSWORDS ]; then
  1009. if grep -q "SSH_PASSWORDS" $EXPORT_FILE; then
  1010. sed -i "s|SSH_PASSWORDS=.*|SSH_PASSWORDS=$SSH_PASSWORDS|g" $EXPORT_FILE
  1011. else
  1012. echo "SSH_PASSWORDS=$SSH_PASSWORDS" >> $EXPORT_FILE
  1013. fi
  1014. fi
  1015. if [ $XMPP_CIPHERS ]; then
  1016. if grep -q "XMPP_CIPHERS" $EXPORT_FILE; then
  1017. sed -i "s|XMPP_CIPHERS=.*|XMPP_CIPHERS=$XMPP_CIPHERS|g" $EXPORT_FILE
  1018. else
  1019. echo "XMPP_CIPHERS=$XMPP_CIPHERS" >> $EXPORT_FILE
  1020. fi
  1021. fi
  1022. if [ $XMPP_ECC_CURVE ]; then
  1023. if grep -q "XMPP_ECC_CURVE" $EXPORT_FILE; then
  1024. sed -i "s|XMPP_ECC_CURVE=.*|XMPP_ECC_CURVE=$XMPP_ECC_CURVE|g" $EXPORT_FILE
  1025. else
  1026. echo "XMPP_ECC_CURVE=$XMPP_ECC_CURVE" >> $EXPORT_FILE
  1027. fi
  1028. fi
  1029. echo $"Security settings exported to $EXPORT_FILE"
  1030. exit 0
  1031. }
  1032. function refresh_gpg_keys {
  1033. for d in /home/*/ ; do
  1034. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  1035. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  1036. su -c 'gpg --refresh-keys' - $USERNAME
  1037. fi
  1038. done
  1039. exit 0
  1040. }
  1041. function monkeysphere_sign_server_keys {
  1042. server_keys_file=/home/$USER/.monkeysphere/server_keys
  1043. if [ ! -f $server_keys_file ]; then
  1044. exit 0
  1045. fi
  1046. keys_signed=
  1047. while read line; do
  1048. echo $line
  1049. if [ ${#line} -gt 2 ]; then
  1050. fpr=$(gpg --with-colons --fingerprint "$line" | grep fpr | head -n 1 | awk -F ':' '{print $10}')
  1051. if [ ${#fpr} -gt 2 ]; then
  1052. gpg --sign-key $fpr
  1053. if [ "$?" = "0" ]; then
  1054. gpg --update-trustdb
  1055. keys_signed=1
  1056. fi
  1057. fi
  1058. fi
  1059. done <$server_keys_file
  1060. if [ $keys_signed ]; then
  1061. rm $server_keys_file
  1062. fi
  1063. exit 0
  1064. }
  1065. function htmly_hash {
  1066. # produces a hash corresponding to a htmly password
  1067. pass="$1"
  1068. HTMLYHASH_FILENAME=/usr/bin/htmlyhash
  1069. echo '<?php' > $HTMLYHASH_FILENAME
  1070. echo 'parse_str(implode("&", array_slice($argv, 1)), $_GET);' >> $HTMLYHASH_FILENAME
  1071. echo '$password = $_GET["password"];' >> $HTMLYHASH_FILENAME
  1072. echo '$hash = password_hash($password, PASSWORD_BCRYPT);' >> $HTMLYHASH_FILENAME
  1073. echo 'if (password_verify($password, $hash)) {' >> $HTMLYHASH_FILENAME
  1074. echo ' echo $hash;' >> $HTMLYHASH_FILENAME
  1075. echo '}' >> $HTMLYHASH_FILENAME
  1076. echo '?>' >> $HTMLYHASH_FILENAME
  1077. php $HTMLYHASH_FILENAME password="$pass"
  1078. }
  1079. function show_help {
  1080. echo ''
  1081. echo "${PROJECT_NAME}-sec"
  1082. echo ''
  1083. echo $'Alters the security settings'
  1084. echo ''
  1085. echo ''
  1086. echo $' -h --help Show help'
  1087. echo $' -e --export Export security settings to a file'
  1088. echo $' -i --import Import security settings from a file'
  1089. echo $' -r --refresh Refresh GPG keys for all users'
  1090. echo $' -s --sign Sign monkeysphere server keys'
  1091. echo $' --register [domain] Register a https domain with monkeysphere'
  1092. echo $' -b --htmlyhash [password] Returns the hash of a password for a htmly blog'
  1093. echo ''
  1094. exit 0
  1095. }
  1096. # Get the commandline options
  1097. while [[ $# > 1 ]]
  1098. do
  1099. key="$1"
  1100. case $key in
  1101. -h|--help)
  1102. show_help
  1103. ;;
  1104. # Export settings
  1105. -e|--export)
  1106. shift
  1107. EXPORT_FILE="$1"
  1108. ;;
  1109. # Export settings
  1110. -i|--import)
  1111. shift
  1112. IMPORT_FILE="$1"
  1113. ;;
  1114. # Refresh GPG keys
  1115. -r|--refresh)
  1116. shift
  1117. refresh_gpg_keys
  1118. ;;
  1119. # register a website
  1120. --register|--reg|--site)
  1121. shift
  1122. register_website "$1"
  1123. ;;
  1124. # user signs monkeysphere server keys
  1125. -s|--sign)
  1126. shift
  1127. monkeysphere_sign_server_keys
  1128. ;;
  1129. # get a hash of the given htmly password
  1130. -b|--htmlyhash)
  1131. shift
  1132. htmly_hash "$1"
  1133. exit 0
  1134. ;;
  1135. *)
  1136. # unknown option
  1137. ;;
  1138. esac
  1139. shift
  1140. done
  1141. menu_security_settings
  1142. exit 0