2015-12-07 13:45:59 +00:00
|
|
|
source /etc/mailinabox.conf
|
2014-06-03 11:12:38 +00:00
|
|
|
source setup/functions.sh # load our functions
|
2014-05-01 19:13:00 +00:00
|
|
|
|
2014-10-04 21:57:26 +00:00
|
|
|
# Basic System Configuration
|
2014-09-21 17:43:21 +00:00
|
|
|
# -------------------------
|
|
|
|
|
2015-06-02 01:04:20 +00:00
|
|
|
# ### Add Mail-in-a-Box's PPA.
|
|
|
|
|
|
|
|
# We've built several .deb packages on our own that we want to include.
|
|
|
|
# One is a replacement for Ubuntu's stock postgrey package that makes
|
|
|
|
# some enhancements. The other is dovecot-lucene, a Lucene-based full
|
|
|
|
# text search plugin for (and by) dovecot, which is not available in
|
|
|
|
# Ubuntu currently.
|
|
|
|
#
|
2015-06-30 01:39:19 +00:00
|
|
|
# Add that to the system's list of repositories using add-apt-repository.
|
|
|
|
# But add-apt-repository may not be installed. If it's not available,
|
|
|
|
# then install it. But we have to run apt-get update before we try to
|
|
|
|
# install anything so the package index is up to date. After adding the
|
|
|
|
# PPA, we have to run apt-get update *again* to load the PPA's index,
|
|
|
|
# so this must precede the apt-get update line below.
|
|
|
|
|
|
|
|
if [ ! -f /usr/bin/add-apt-repository ]; then
|
|
|
|
echo "Installing add-apt-repository..."
|
|
|
|
hide_output apt-get update
|
|
|
|
apt_install software-properties-common
|
|
|
|
fi
|
2015-06-02 01:04:20 +00:00
|
|
|
|
|
|
|
hide_output add-apt-repository -y ppa:mail-in-a-box/ppa
|
|
|
|
|
|
|
|
# ### Update Packages
|
2014-09-21 17:43:21 +00:00
|
|
|
|
2014-10-04 21:57:26 +00:00
|
|
|
# Update system packages to make sure we have the latest upstream versions of things from Ubuntu.
|
2013-08-21 02:27:32 +00:00
|
|
|
|
2014-07-16 13:06:45 +00:00
|
|
|
echo Updating system packages...
|
|
|
|
hide_output apt-get update
|
2015-02-13 13:41:52 +00:00
|
|
|
apt_get_quiet upgrade
|
2013-08-21 02:27:32 +00:00
|
|
|
|
2015-06-02 01:04:20 +00:00
|
|
|
# ### Install System Packages
|
|
|
|
|
2014-05-02 18:23:56 +00:00
|
|
|
# Install basic utilities.
|
2014-07-21 11:12:59 +00:00
|
|
|
#
|
2014-09-21 17:43:21 +00:00
|
|
|
# * haveged: Provides extra entropy to /dev/random so it doesn't stall
|
2014-07-21 11:12:59 +00:00
|
|
|
# when generating random numbers for private keys (e.g. during
|
|
|
|
# ldns-keygen).
|
2014-09-21 17:43:21 +00:00
|
|
|
# * unattended-upgrades: Apt tool to install security updates automatically.
|
2015-01-11 20:00:11 +00:00
|
|
|
# * cron: Runs background processes periodically.
|
2014-09-21 17:43:21 +00:00
|
|
|
# * ntp: keeps the system time correct
|
|
|
|
# * fail2ban: scans log files for repeated failed login attempts and blocks the remote IP at the firewall
|
2015-04-04 15:44:14 +00:00
|
|
|
# * netcat-openbsd: `nc` command line networking tool
|
2015-02-12 19:53:17 +00:00
|
|
|
# * git: we install some things directly from github
|
2014-11-25 15:36:34 +00:00
|
|
|
# * sudo: allows privileged users to execute commands as root without being root
|
2015-08-16 23:46:23 +00:00
|
|
|
# * coreutils: includes `nproc` tool to report number of processors, mktemp
|
2015-01-02 23:22:33 +00:00
|
|
|
# * bc: allows us to do math to compute sane defaults
|
2014-05-02 18:23:56 +00:00
|
|
|
|
2015-08-19 19:58:35 +00:00
|
|
|
echo Installing system packages...
|
2014-09-17 21:56:09 +00:00
|
|
|
apt_install python3 python3-dev python3-pip \
|
2015-04-04 15:44:14 +00:00
|
|
|
netcat-openbsd wget curl git sudo coreutils bc \
|
2015-11-17 21:55:14 +00:00
|
|
|
haveged pollinate \
|
|
|
|
unattended-upgrades cron ntp fail2ban
|
2014-03-16 20:50:24 +00:00
|
|
|
|
2015-11-17 21:55:14 +00:00
|
|
|
# ### Seed /dev/urandom
|
|
|
|
#
|
|
|
|
# /dev/urandom is used by various components for generating random bytes for
|
|
|
|
# encryption keys and passwords:
|
|
|
|
#
|
|
|
|
# * TLS private key (see `ssl.sh`, which calls `openssl genrsa`)
|
2015-11-17 22:11:35 +00:00
|
|
|
# * DNSSEC signing keys (see `dns.sh`)
|
2015-11-17 21:55:14 +00:00
|
|
|
# * our management server's API key (via Python's os.urandom method)
|
2015-11-17 22:13:49 +00:00
|
|
|
# * Roundcube's SECRET_KEY (`webmail.sh`)
|
|
|
|
# * ownCloud's administrator account password (`owncloud.sh`)
|
2015-11-17 21:55:14 +00:00
|
|
|
#
|
|
|
|
# Why /dev/urandom? It's the same as /dev/random, except that it doesn't wait
|
|
|
|
# for a constant new stream of entropy. In practice, we only need a little
|
|
|
|
# entropy at the start to get going. After that, we can safely pull a random
|
|
|
|
# stream from /dev/urandom and not worry about how much entropy has been
|
|
|
|
# added to the stream. (http://www.2uo.de/myths-about-urandom/) So we need
|
|
|
|
# to worry about /dev/urandom being seeded properly (which is also an issue
|
|
|
|
# for /dev/random), but after that /dev/urandom is superior to /dev/random
|
|
|
|
# because it's faster and doesn't block indefinitely to wait for hardware
|
|
|
|
# entropy. Note that `openssl genrsa` even uses `/dev/urandom`, and if it's
|
|
|
|
# good enough for generating an RSA private key, it's good enough for anything
|
|
|
|
# else we may need.
|
|
|
|
#
|
|
|
|
# Now about that seeding issue....
|
|
|
|
#
|
|
|
|
# /dev/urandom is seeded from "the uninitialized contents of the pool buffers when
|
|
|
|
# the kernel starts, the startup clock time in nanosecond resolution,...and
|
|
|
|
# entropy saved across boots to a local file" as well as the order of
|
|
|
|
# execution of concurrent accesses to /dev/urandom. (Heninger et al 2012,
|
|
|
|
# https://factorable.net/weakkeys12.conference.pdf) But when memory is zeroed,
|
|
|
|
# the system clock is reset on boot, /etc/init.d/urandom has not yet run, or
|
|
|
|
# the machine is single CPU or has no concurrent accesses to /dev/urandom prior
|
|
|
|
# to this point, /dev/urandom may not be seeded well. After this, /dev/urandom
|
|
|
|
# draws from the same entropy sources as /dev/random, but it doesn't block or
|
|
|
|
# issue any warnings if no entropy is actually available. (http://www.2uo.de/myths-about-urandom/)
|
|
|
|
# Entropy might not be readily available because this machine has no user input
|
|
|
|
# devices (common on servers!) and either no hard disk or not enough IO has
|
|
|
|
# ocurred yet --- although haveged tries to mitigate this. So there's a good chance
|
|
|
|
# that accessing /dev/urandom will not be drawing from any hardware entropy and under
|
|
|
|
# a perfect-storm circumstance where the other seeds are meaningless, /dev/urandom
|
|
|
|
# may not be seeded at all.
|
|
|
|
#
|
|
|
|
# The first thing we'll do is block until we can seed /dev/urandom with enough
|
|
|
|
# hardware entropy to get going, by drawing from /dev/random. haveged makes this
|
|
|
|
# less likely to stall for very long.
|
|
|
|
|
|
|
|
echo Initializing system random number generator...
|
|
|
|
dd if=/dev/random of=/dev/urandom bs=1 count=32 2> /dev/null
|
|
|
|
|
|
|
|
# This is supposedly sufficient. But because we're not sure if hardware entropy
|
|
|
|
# is really any good on virtualized systems, we'll also seed from Ubuntu's
|
|
|
|
# pollinate servers:
|
|
|
|
|
|
|
|
pollinate -q -r
|
|
|
|
|
|
|
|
# Between these two, we really ought to be all set.
|
|
|
|
|
|
|
|
# ### Package maintenance
|
|
|
|
#
|
2014-08-23 12:31:33 +00:00
|
|
|
# Allow apt to install system updates automatically every day.
|
2013-08-21 02:27:32 +00:00
|
|
|
|
2014-08-23 12:31:33 +00:00
|
|
|
cat > /etc/apt/apt.conf.d/02periodic <<EOF;
|
|
|
|
APT::Periodic::MaxAge "7";
|
|
|
|
APT::Periodic::Update-Package-Lists "1";
|
|
|
|
APT::Periodic::Unattended-Upgrade "1";
|
|
|
|
APT::Periodic::Verbose "1";
|
|
|
|
EOF
|
2013-08-21 02:27:32 +00:00
|
|
|
|
2014-09-21 17:43:21 +00:00
|
|
|
# ### Firewall
|
2014-09-20 12:25:54 +00:00
|
|
|
|
2014-09-21 17:43:21 +00:00
|
|
|
# Various virtualized environments like Docker and some VPSs don't provide #NODOC
|
|
|
|
# a kernel that supports iptables. To avoid error-like output in these cases, #NODOC
|
|
|
|
# we skip this if the user sets DISABLE_FIREWALL=1. #NODOC
|
|
|
|
if [ -z "$DISABLE_FIREWALL" ]; then
|
|
|
|
# Install `ufw` which provides a simple firewall configuration.
|
2014-05-02 02:39:45 +00:00
|
|
|
apt_install ufw
|
2014-09-20 12:25:54 +00:00
|
|
|
|
2014-09-21 17:43:21 +00:00
|
|
|
# Allow incoming connections to SSH.
|
2014-05-02 02:39:45 +00:00
|
|
|
ufw_allow ssh;
|
2014-09-20 12:25:54 +00:00
|
|
|
|
2014-10-04 21:57:26 +00:00
|
|
|
# ssh might be running on an alternate port. Use sshd -T to dump sshd's #NODOC
|
|
|
|
# settings, find the port it is supposedly running on, and open that port #NODOC
|
|
|
|
# too. #NODOC
|
|
|
|
SSH_PORT=$(sshd -T 2>/dev/null | grep "^port " | sed "s/port //") #NODOC
|
2014-09-20 12:25:54 +00:00
|
|
|
if [ ! -z "$SSH_PORT" ]; then
|
2014-09-21 17:43:21 +00:00
|
|
|
if [ "$SSH_PORT" != "22" ]; then
|
|
|
|
|
2014-10-04 21:57:26 +00:00
|
|
|
echo Opening alternate SSH port $SSH_PORT. #NODOC
|
|
|
|
ufw_allow $SSH_PORT #NODOC
|
2014-09-21 17:43:21 +00:00
|
|
|
|
|
|
|
fi
|
2014-09-20 12:25:54 +00:00
|
|
|
fi
|
|
|
|
|
2014-05-02 02:39:45 +00:00
|
|
|
ufw --force enable;
|
2014-09-21 17:43:21 +00:00
|
|
|
fi #NODOC
|
2014-06-18 23:41:35 +00:00
|
|
|
|
2014-09-21 17:43:21 +00:00
|
|
|
# ### Local DNS Service
|
|
|
|
|
|
|
|
# Install a local DNS server, rather than using the DNS server provided by the
|
|
|
|
# ISP's network configuration.
|
|
|
|
#
|
|
|
|
# We do this to ensure that DNS queries
|
2014-06-18 23:41:35 +00:00
|
|
|
# that *we* make (i.e. looking up other external domains) perform DNSSEC checks.
|
|
|
|
# We could use Google's Public DNS, but we don't want to create a dependency on
|
2014-09-21 17:43:21 +00:00
|
|
|
# Google per our goals of decentralization. `bind9`, as packaged for Ubuntu, has
|
2014-06-18 23:41:35 +00:00
|
|
|
# DNSSEC enabled by default via "dnssec-validation auto".
|
|
|
|
#
|
2014-09-21 17:43:21 +00:00
|
|
|
# So we'll be running `bind9` bound to 127.0.0.1 for locally-issued DNS queries
|
|
|
|
# and `nsd` bound to the public ethernet interface for remote DNS queries asking
|
|
|
|
# about our domain names. `nsd` is configured later.
|
2014-06-18 23:41:35 +00:00
|
|
|
#
|
|
|
|
# About the settings:
|
|
|
|
#
|
2014-09-21 17:43:21 +00:00
|
|
|
# * RESOLVCONF=yes will have `bind9` take over /etc/resolv.conf to tell
|
2014-06-18 23:41:35 +00:00
|
|
|
# local services that DNS queries are handled on localhost.
|
2014-09-21 17:43:21 +00:00
|
|
|
# * Adding -4 to OPTIONS will have `bind9` not listen on IPv6 addresses
|
2014-06-18 23:41:35 +00:00
|
|
|
# so that we're sure there's no conflict with nsd, our public domain
|
|
|
|
# name server, on IPV6.
|
2014-09-21 17:43:21 +00:00
|
|
|
# * The listen-on directive in named.conf.options restricts `bind9` to
|
2014-06-18 23:41:35 +00:00
|
|
|
# binding to the loopback interface instead of all interfaces.
|
2014-08-07 13:49:14 +00:00
|
|
|
apt_install bind9 resolvconf
|
2014-06-18 23:41:35 +00:00
|
|
|
tools/editconf.py /etc/default/bind9 \
|
|
|
|
RESOLVCONF=yes \
|
|
|
|
"OPTIONS=\"-u bind -4\""
|
|
|
|
if ! grep -q "listen-on " /etc/bind/named.conf.options; then
|
|
|
|
# Add a listen-on directive if it doesn't exist inside the options block.
|
|
|
|
sed -i "s/^}/\n\tlisten-on { 127.0.0.1; };\n}/" /etc/bind/named.conf.options
|
|
|
|
fi
|
2014-08-07 13:49:14 +00:00
|
|
|
if [ -f /etc/resolvconf/resolv.conf.d/original ]; then
|
2014-09-21 17:43:21 +00:00
|
|
|
echo "Archiving old resolv.conf (was /etc/resolvconf/resolv.conf.d/original, now /etc/resolvconf/resolv.conf.original)." #NODOC
|
|
|
|
mv /etc/resolvconf/resolv.conf.d/original /etc/resolvconf/resolv.conf.original #NODOC
|
2014-08-07 13:49:14 +00:00
|
|
|
fi
|
2014-06-18 23:41:35 +00:00
|
|
|
|
2014-09-21 17:43:21 +00:00
|
|
|
# Restart the DNS services.
|
|
|
|
|
2014-07-16 13:06:45 +00:00
|
|
|
restart_service bind9
|
2014-08-07 13:49:14 +00:00
|
|
|
restart_service resolvconf
|
2015-03-08 00:13:55 +00:00
|
|
|
|
|
|
|
# ### Fail2Ban Service
|
|
|
|
|
|
|
|
# Configure the Fail2Ban installation to prevent dumb bruce-force attacks against dovecot, postfix and ssh
|
2015-12-07 13:45:59 +00:00
|
|
|
cat conf/fail2ban/jail.local \
|
|
|
|
| sed "s/PUBLIC_IP/$PUBLIC_IP/g" \
|
|
|
|
> /etc/fail2ban/jail.local
|
2015-03-08 00:13:55 +00:00
|
|
|
cp conf/fail2ban/dovecotimap.conf /etc/fail2ban/filter.d/dovecotimap.conf
|
|
|
|
|
|
|
|
restart_service fail2ban
|