##// END OF EJS Templates
0
0

Fichier de la dernière révision:

r338:5dd9ea36ae5f
r527:71446b4553f8
Show More
32-sshd.sh
115 lines | 4.1 KiB | application/x-sh | BashLexer
drtyhlpr
Added: SSH public key auth, other fixes
r120 #
# Setup SSH settings and public keys
#
# Load utility functions
. ./functions.sh
if [ "$ENABLE_SSHD" = true ] ; then
drtyhlpr
Updated: Dropping privileges, chroot compiler install, dropbear sshd config
r142 DROPBEAR_ARGS=""
drtyhlpr
Added: SSH public key auth, other fixes
r120 if [ "$SSH_ENABLE_ROOT" = false ] ; then
drtyhlpr
Updated: Dropping privileges, chroot compiler install, dropbear sshd config
r142 if [ "$ENABLE_REDUCE" = false ] || [ "$REDUCE_SSHD" = false ] ; then
# User root is not allowed to log in
sed -i "s|[#]*PermitRootLogin.*|PermitRootLogin no|g" "${ETC_DIR}/ssh/sshd_config"
else
# User root is not allowed to log in
DROPBEAR_ARGS="-w"
fi
drtyhlpr
Added: SSH public key auth, other fixes
r120 fi
if [ "$ENABLE_ROOT" = true ] && [ "$SSH_ENABLE_ROOT" = true ] ; then
drtyhlpr
Updated: Dropping privileges, chroot compiler install, dropbear sshd config
r142 if [ "$ENABLE_REDUCE" = false ] || [ "$REDUCE_SSHD" = false ] ; then
# Permit SSH root login
sed -i "s|[#]*PermitRootLogin.*|PermitRootLogin yes|g" "${ETC_DIR}/ssh/sshd_config"
else
# Permit SSH root login
DROPBEAR_ARGS=""
fi
drtyhlpr
Added: SSH public key auth, other fixes
r120
# Add SSH (v2) public key for user root
Unknown
fixes...
r338 if [ -n "$SSH_ROOT_PUB_KEY" ] ; then
drtyhlpr
Fixed: Remove SSH_*_AUTHORIZED_KEYS, works with SSH_*_PUB_KEY only
r126 # Create root SSH config directory
mkdir -p "${R}/root/.ssh"
# Set permissions of root SSH config directory
chroot_exec chmod 700 "/root/.ssh"
chroot_exec chown root:root "/root/.ssh"
# Add SSH (v2) public key(s) to authorized_keys file
drtyhlpr
Fixed: Use authorized_keys file instead of authorized_keys2
r123 cat "$SSH_ROOT_PUB_KEY" >> "${R}/root/.ssh/authorized_keys"
drtyhlpr
Added: SSH public key auth, other fixes
r120
drtyhlpr
Fixed: Remove SSH_*_AUTHORIZED_KEYS, works with SSH_*_PUB_KEY only
r126 # Set permissions of root SSH authorized_keys file
drtyhlpr
Fixed: Use authorized_keys file instead of authorized_keys2
r123 chroot_exec chmod 600 "/root/.ssh/authorized_keys"
chroot_exec chown root:root "/root/.ssh/authorized_keys"
drtyhlpr
Added: SSH public key auth, other fixes
r120
drtyhlpr
Updated: Dropping privileges, chroot compiler install, dropbear sshd config
r142 if [ "$ENABLE_REDUCE" = false ] || [ "$REDUCE_SSHD" = false ] ; then
# Allow SSH public key authentication
sed -i "s|[#]*PubkeyAuthentication.*|PubkeyAuthentication yes|g" "${ETC_DIR}/ssh/sshd_config"
fi
drtyhlpr
Added: SSH public key auth, other fixes
r120 fi
fi
drtyhlpr
Fixed: ssh public key and AllowUsers for ENABLE_USER=false
r122 if [ "$ENABLE_USER" = true ] ; then
# Add SSH (v2) public key for user $USER_NAME
Unknown
fixes...
r338 if [ -n "$SSH_USER_PUB_KEY" ] ; then
drtyhlpr
Fixed: Remove SSH_*_AUTHORIZED_KEYS, works with SSH_*_PUB_KEY only
r126 # Create $USER_NAME SSH config directory
mkdir -p "${R}/home/${USER_NAME}/.ssh"
# Set permissions of $USER_NAME SSH config directory
chroot_exec chmod 700 "/home/${USER_NAME}/.ssh"
Unknown
fixes...
r338 chroot_exec chown "${USER_NAME}":"${USER_NAME}" "/home/${USER_NAME}/.ssh"
drtyhlpr
Fixed: Remove SSH_*_AUTHORIZED_KEYS, works with SSH_*_PUB_KEY only
r126
# Add SSH (v2) public key(s) to authorized_keys file
drtyhlpr
Fixed: Use authorized_keys file instead of authorized_keys2
r123 cat "$SSH_USER_PUB_KEY" >> "${R}/home/${USER_NAME}/.ssh/authorized_keys"
drtyhlpr
Added: SSH public key auth, other fixes
r120
drtyhlpr
Fixed: Remove SSH_*_AUTHORIZED_KEYS, works with SSH_*_PUB_KEY only
r126 # Set permissions of $USER_NAME SSH config directory
drtyhlpr
Fixed: Use authorized_keys file instead of authorized_keys2
r123 chroot_exec chmod 600 "/home/${USER_NAME}/.ssh/authorized_keys"
Unknown
fixes...
r338 chroot_exec chown "${USER_NAME}":"${USER_NAME}" "/home/${USER_NAME}/.ssh/authorized_keys"
drtyhlpr
Added: SSH public key auth, other fixes
r120
drtyhlpr
Updated: Dropping privileges, chroot compiler install, dropbear sshd config
r142 if [ "$ENABLE_REDUCE" = false ] || [ "$REDUCE_SSHD" = false ] ; then
# Allow SSH public key authentication
sed -i "s|[#]*PubkeyAuthentication.*|PubkeyAuthentication yes|g" "${ETC_DIR}/ssh/sshd_config"
fi
drtyhlpr
Fixed: ssh public key and AllowUsers for ENABLE_USER=false
r122 fi
drtyhlpr
Added: SSH public key auth, other fixes
r120 fi
# Limit the users that are allowed to login via SSH
drtyhlpr
Updated: Dropping privileges, chroot compiler install, dropbear sshd config
r142 if [ "$SSH_LIMIT_USERS" = true ] && [ "$ENABLE_REDUCE" = false ] ; then
drtyhlpr
Fixed: ssh public key and AllowUsers for ENABLE_USER=false
r122 allowed_users=""
drtyhlpr
Added: SSH public key auth, other fixes
r120 if [ "$ENABLE_ROOT" = true ] && [ "$SSH_ENABLE_ROOT" = true ] ; then
drtyhlpr
Fixed: ssh public key and AllowUsers for ENABLE_USER=false
r122 allowed_users="root"
fi
if [ "$ENABLE_USER" = true ] ; then
allowed_users="${allowed_users} ${USER_NAME}"
fi
Unknown
fixes...
r338 if [ -n "$allowed_users" ] ; then
drtyhlpr
Fixed: ssh public key and AllowUsers for ENABLE_USER=false
r122 echo "AllowUsers ${allowed_users}" >> "${ETC_DIR}/ssh/sshd_config"
drtyhlpr
Added: SSH public key auth, other fixes
r120 fi
fi
# Disable password-based authentication
if [ "$SSH_DISABLE_PASSWORD_AUTH" = true ] ; then
if [ "$ENABLE_ROOT" = true ] && [ "$SSH_ENABLE_ROOT" = true ] ; then
drtyhlpr
Updated: Dropping privileges, chroot compiler install, dropbear sshd config
r142 if [ "$ENABLE_REDUCE" = false ] || [ "$REDUCE_SSHD" = false ] ; then
sed -i "s|[#]*PermitRootLogin.*|PermitRootLogin without-password|g" "${ETC_DIR}/ssh/sshd_config"
else
DROPBEAR_ARGS="-g"
fi
drtyhlpr
Added: SSH public key auth, other fixes
r120 fi
drtyhlpr
Updated: Dropping privileges, chroot compiler install, dropbear sshd config
r142 if [ "$ENABLE_REDUCE" = false ] || [ "$REDUCE_SSHD" = false ] ; then
sed -i "s|[#]*PasswordAuthentication.*|PasswordAuthentication no|g" "${ETC_DIR}/ssh/sshd_config"
sed -i "s|[#]*ChallengeResponseAuthentication no.*|ChallengeResponseAuthentication no|g" "${ETC_DIR}/ssh/sshd_config"
sed -i "s|[#]*UsePAM.*|UsePAM no|g" "${ETC_DIR}/ssh/sshd_config"
else
DROPBEAR_ARGS="${DROPBEAR_ARGS} -s"
fi
fi
# Update dropbear SSH configuration
if [ "$ENABLE_REDUCE" = true ] && [ "$REDUCE_SSHD" = true ] ; then
sed "s|^DROPBEAR_EXTRA_ARGS=.*|DROPBEAR_EXTRA_ARGS=\"${DROPBEAR_ARGS}\"|g" "${ETC_DIR}/default/dropbear"
drtyhlpr
Added: SSH public key auth, other fixes
r120 fi
Unknown
fixes...
r338 fi