NetBSD/global-netbsd.sh

5666 lines
174 KiB
Bash

#!/bin/sh
# Check if dialog is present on the system (for graphical display).
# If not, install it.
if [ ! -x "/usr/pkg/bin/dialog" ]; then
echo "The dialog program is not installed. Installation in progress..."
pkgin -y in dialog
pkgin -y in pico
pkgin -y in curl
fi
checkInternetConnection () {
# Start background internet connection check
curl -m 3 http://example.com > /dev/null 2>&1 &
pid=$!
# Initialize the progress value
progress=0
# Loop to update the progress bar
while [ $progress -le 100 ]; do
# Check if curl is still running
if ! kill -0 "$pid" 2>/dev/null; then
# curl has finished
break
fi
# Update the progress bar
echo $progress
progress=$((progress + 33)) # Increase the progress without $/
sleep 1 # Wait 1 second
done | dialog --gauge "Checking Internet connection..." 6 35 0
# Check if the curl command was successful
wait $pid
exit_status=$?
if [ $exit_status -ne 0 ]; then
dialog --backtitle "Checking Internet connection" \
--title "Connection error" \
--msgbox "Internet access is not possible\nPlease check your connection" 6 35
NetworkMenu
fi
}
# checked
ItsOkInternet () {
dialog --backtitle "Internet OK !" \
--title " Result" \
--msgbox "Internet OK !" 5 17
}
# checked
InstallSudo () {
# Dialog window to get the username
user=$(dialog --title "Adding sudo user" --inputbox "Please enter the username to be added to the sudo group" 8 60 2>&1 1>/dev/tty)
# Check if the user exists using the 'getent passwd' command.
countus=$(getent passwd "$user" | cut -d: -f1)
case $countus in
"$user")
# The user exists, the script can continue.
# Installation of sudo in the background
if [ ! -x "/usr/pkg/bin/sudo" ]; then
checkInternetConnection
pkgin -y in sudo
fi
# Configuration of sudo after installation
groupadd sudo
# Check if the user is already in the sudo group
verifgroupsudo=$(getent group | grep sudo | grep -c "$user" | tr -d ' ')
if [ "$verifgroupsudo" -gt 0 ]; then
dialog --msgbox "The user is already a member of the sudo group" 5 50
else
# Adding the user to the sudo group
if ! usermod -G sudo "${user}"; then
dialog --msgbox "Adding the user to the sudo group failed" 7 44
return 1
fi
fi
# Uncomment the line for the sudo group.
sed -i "s/# %sudo/%sudo/" /usr/pkg/etc/sudoers
# Check if the user has been added to sudo group
verifgroupsudo=$(getent group | grep sudo | grep -c "$user" | tr -d ' ')
if [ "$verifgroupsudo" -gt 0 ]; then
dialog --msgbox "The user is now member of the sudo group" 5 45
fi
# Go back to Menu
UsersRightsMenu
;;
*)
# The user does not exist, display a message.
dialog --title "Erreur" --msgbox "This user does not exist" 5 28
InstallSudo
;;
esac
UsersRightsMenu
}
# checked
DesktopBundleApps () {
checkInternetConnection
# Menu Title
dialog --backtitle "Select programs" \
--title "Installing applications" \
--checklist "Select programs:" 30 70 20 \
firefox "Firefox web browser" off \
thunderbird "Thunderbird Mail Client" off \
keepassxc "KeePassXC password manager" off \
vlc "VLC multimedia player" off \
handbrake "HandBrake video encoder" off \
audacity "Audacity audio editor" off \
gimp "GIMP image editor" off \
ristretto "Ristretto image viewer" off \
youtube-dl "YouTube video downloader" off \
libreoffice "LibreOffice office suite" off \
unoconv "Unoconv document converter" off \
qpdfview "Qpdfview document viewer" off \
filezilla "FileZilla FTP client" off \
rclone "Rclone file transfer tool" off \
hexchat "HexChat IRC client" off \
pidgin "Pidgin messaging client" off \
psi "PSI messaging client" off \
wireshark "Wireshark network protocol analyzer" off \
nmap "Nmap network discovery tool" off \
zenmap "Nmap graphical interface (Zenmap)" off \
tor "Tor decentralized anonymous network" off \
openvpn "OpenVPN Virtual Private Network setup" off \
codeblocks "IDE for C/C++ development (Code::Blocks)" off \
EVERYTHING "Install every packages of the list" off 2>/tmp/choices
# Read the user choices from the temporary file.
choices=$(sed 's/"//g' < /tmp/choices)
# Count the number of selected programs.
num_choices=$(echo "$choices" | wc -w)
# Initialize the progress.
progress=0
(
# Install the selected programs.
for choice in $choices; do
# Calculate and update the progress.
progress=$((progress + 100 / num_choices))
echo $progress
if [ "$choice" = "EVERYTHING" ]; then
pkgin -y in firefox
echo 5
pkgin -y in thunderbird
echo 10
pkgin -y in keepassxc
echo 15
pkgin -y in vlc
echo 20
pkgin -y in handbrake
echo 25
pkgin -y in audacity
echo 30
pkgin -y in gimp
echo 35
pkgin -y in ristretto
echo 40
pkgin -y in youtube-dl
echo 45
pkgin -y in libreoffice
echo 50
pkgin -y in unoconv
echo 55
pkgin -y in qpdfview
echo 60
pkgin -y in filezilla
echo 65
pkgin -y in rclone
echo 70
pkgin -y in hexchat
echo 75
pkgin -y in pidgin
echo 80
pkgin -y in psi
echo 85
pkgin -y in wireshark
echo 90
pkgin -y in nmap
pkgin -y in zenmap
echo 95
pkgin -y in tor
pkgin -y in openvpn
pkgin -y in codeblocks
echo 100
else
pkgin -y in "$choice"
fi
done
) | dialog --gauge "Installation in progress..." 6 32 0
# Go back to InstallProgramsMenu
InstallProgramsMenu
}
# checked
UsualTools () {
checkInternetConnection
#user=$(dialog --title "User" --inputbox "Please enter the username (not root!)" 8 50 2>&1 1>/dev/tty)
# Menu Title
dialog --backtitle "Utilities Selection" \
--title "Installing Utilities" \
--checklist "Select utilities:" 30 70 20 \
xfce4-thunar "Thunar File Manager" off \
xfce4-thunar-archive-plugin "Thunar Plugins" off \
xfce4-thunar-media-tags-plugin "Thunar Plugins" off \
xfce4-thunar-vcs-plugin "Thunar Plugins" off \
wget "wget Download Tool" off \
w3m "Text-based Web Browser" off \
lynx "Text-based Web Browser" off \
links "Text-based Web Browser" off \
rsync "rsync Sync and Backup Tool" off \
cesium "Text Editor" off \
emacs "Text Editor" off \
nano "Text Editor" off \
fuse "Foreign Filesystem Management" off \
fuse-ntfs "Foreign Filesystem Management" off \
fuse-exfat "Foreign Filesystem Management" off \
fuse-ext2 "Foreign Filesystem Management" off \
fuse-httpfs "Foreign Filesystem Management" off \
fuse-sshfs "Foreign Filesystem Management" off \
ntfsprogs "NTFS Partition Management" off \
dvd+rw-tools "CD/DVD/BD Burner" off \
cdrtools "CD/DVD/BD Burner" off \
wpa_gui "Wi-Fi Graphical Interface" off \
cups "Printing Server" off \
cups-filters "Printing Tools" off \
zip "Compression Tools" off \
unzip "Compression Tools" off \
bzip2 "Compression Tools" off \
bzip3 "Compression Tools" off \
htop "Diagnostic Tools" off \
hw-probe "Diagnostic Tools" off \
dbus "D-Bus System Message Bus" off \
tree "Tree Structure Display Tool" off \
git "Github Tools" off \
gh "Github Tools" off \
xscreensaver "xscreensaver Screensaver" off \
rdesktop "RDP Remote Desktop Tool" off \
remmina "Remmina Remote Desktop Client" off \
tigervnc "TigerVNC VNC client/server" off \
megatools "Mega Management Tools" off \
rp-pppoe "PPPoE connections" off \
EVERYTHING "Install every packages of the list" off 2>/tmp/util_choices
# Read the user choices from the temporary file.
util_choices=$(sed 's/"//g' < /tmp/util_choices)
# Count the number of selected utilities.
num_choices=$(echo "$util_choices" | wc -w)
# Initialize the progress.
progress=0
(
# Install the selected utilities.
for choice in $util_choices; do
# Calculate and update the progress.
progress=$((progress + 100 / num_choices))
echo $progress
if [ "$choice" = "EVERYTHING" ]; then
pkgin -y in xfce4-thunar
echo 2
pkgin -y in xfce4-thunar-archive-plugin
echo 4
pkgin -y in xfce4-thunar-media-tags-plugin
echo 6
pkgin -y in xfce4-thunar-vcs-plugin
echo 8
pkgin -y in wget
echo 10
pkgin -y in w3m
echo 12
pkgin -y in lynx
echo 14
pkgin -y in links
echo 16
pkgin -y in rsync
echo 18
pkgin -y in cesium
echo 20
pkgin -y in emacs
echo 22
pkgin -y in nano
echo 24
pkgin -y in fuse
echo 26
pkgin -y in fuse-ntfs
echo 28
pkgin -y in fuse-exfat
echo 30
pkgin -y in fuse-ext2
echo 32
pkgin -y in fuse-httpfs
echo 34
pkgin -y in fuse-sshfs
echo 36
pkgin -y in ntfsprogs
echo 38
pkgin -y in dvd+rw-tools
echo 40
pkgin -y in cdrtools
echo 42
pkgin -y in wpa_gui
echo 44
pkgin -y in cups
echo 46
pkgin -y in cups-filters
echo 48
pkgin -y in zip
echo 50
pkgin -y in unzip
echo 52
pkgin -y in bzip2
echo 54
pkgin -y in bzip3
echo 56
pkgin -y in htop
echo 58
pkgin -y in hw-probe
echo 60
pkgin -y in dbus
echo 62
pkgin -y in tree
echo 64
pkgin -y in git
echo 66
pkgin -y in gh
echo 68
pkgin -y in xscreensaver
echo 70
pkgin -y in rdesktop
echo 72
pkgin -y in remmina
echo 74
pkgin -y in tigervnc
echo 76
pkgin -y in megatools
echo 78
pkgin -y in rp-pppoe
mkdir /etc/ppp
cp /usr/pkg/share/examples/rp-pppoe/pppoe.conf /etc/ppp/
echo 80
cp /usr/pkg/share/examples/rc.d/* /etc/rc.d/
check=$(grep -o "cupsd=" < /etc/rc.conf | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
echo cupsd=YES
service cupsd start
else
sed -i'' 's/cupsd=NO/cupsd=YES/' /etc/rc.conf
sed -i'' 's/#cupsd=NO/cupsd=YES/' /etc/rc.conf
sed -i'' 's/#cupsd=YES/cupsd=YES/' /etc/rc.conf
fi
check=$(grep -o "dbus=" < /etc/rc.conf | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
echo dbus=YES >> /etc/rc.conf
service dbus start
else
sed -i'' 's/dbus=NO/dbus=YES/' /etc/rc.conf
sed -i'' 's/#dbus=NO/dbus=YES/' /etc/rc.conf
sed -i'' 's/#dbus=YES/dbus=YES/' /etc/rc.conf
fi
echo 100
# Go back to InstallProgramsMenu
InstallProgramsMenu
else
pkgin -y in "$choice"
fi
if [ "$choice" = "cups" ]; then
check=$(grep -o "cupsd=" < /etc/rc.conf | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
echo cupsd=YES
service cupsd start
else
sed -i'' 's/cupsd=NO/cupsd=YES/' /etc/rc.conf
sed -i'' 's/#cupsd=NO/cupsd=YES/' /etc/rc.conf
sed -i'' 's/#cupsd=YES/cupsd=YES/' /etc/rc.conf
fi
fi
if [ "$choice" = "dbus" ]; then
check=$(grep -o "dbus=" < /etc/rc.conf | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
echo dbus=YES
service dbus start
else
sed -i'' 's/dbus=NO/dbus=YES/' /etc/rc.conf
sed -i'' 's/#dbus=NO/dbus=YES/' /etc/rc.conf
sed -i'' 's/#dbus=YES/dbus=YES/' /etc/rc.conf
fi
fi
if [ "$choice" = "rp-pppoe" ]; then
cp /usr/pkg/share/examples/rc.d/* /etc/rc.d/
mkdir /etc/ppp
cp /usr/pkg/share/examples/rp-pppoe/pppoe.conf /etc/ppp/
fi
done
) | dialog --gauge "Installation in progress..." 6 32 0
# Go back to InstallProgramsMenu
InstallProgramsMenu
}
# checked
xfce4 () {
dialog --yesno "This installer will set up XFCE4 and Slim automatically\nIt will not care about graphics, so if you don't already have a correct display with CTWM, you should not go on with XFCE4\n\nYou must have installed a complete version of NetBSD (with X) in order to get it working because this script will not install X\n\nAn already existing username will be asked in order to configure XFCE4 to start automatically after Slim authentication\n\nAnd at last, you must be connected to internet " 15 70
goon_ornot=$?
if [ $goon_ornot -eq 1 ]; then
MainMenu
fi
checkInternetConnection
user=$(dialog --title "User" --inputbox "Please enter the username (not root !)" 8 45 2>&1 1>/dev/tty)
{
# Install Slim
pkgin -y in slim > /dev/null 2>&1
echo 50
pkgin -y in slim-themes > /dev/null 2>&1
checkslim=$(grep -o "slim=YES" < /etc/rc.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$checkslim" -eq 0 ]; then
echo slim=YES >> /etc/rc.conf
sed -i "s/current_theme original/current_theme minimal/" /usr/pkg/etc/slim.conf
fi
sed -i "s/xdm=YES/xdm=NO/" /etc/rc.conf
echo 100
} | dialog --gauge "Installing Slim..." 6 23 0
{
# Install Xfce4
pkgin -y in elementary-xfce-icon-theme > /dev/null 2>&1
echo 2
pkgin -y in libxfce4ui > /dev/null 2>&1
echo 4
pkgin -y in libxfce4util > /dev/null 2>&1
echo 6
pkgin -y in ristretto > /dev/null 2>&1
echo 8
pkgin -y in xfburn > /dev/null 2>&1
echo 10
pkgin -y in xfce4 > /dev/null 2>&1
echo 12
pkgin -y in xfce4-appfinder > /dev/null 2>&1
echo 14
pkgin -y in xfce4-battery-plugin > /dev/null 2>&1
echo 16
pkgin -y in xfce4-calculator-plugin > /dev/null 2>&1
echo 18
pkgin -y in xfce4-clipman-plugin > /dev/null 2>&1
echo 20
pkgin -y in xfce4-conf > /dev/null 2>&1
echo 21
pkgin -y in xfce4-cpugraph-plugin > /dev/null 2>&1
echo 23
pkgin -y in xfce4-dashboard > /dev/null 2>&1
echo 24
pkgin -y in xfce4-desktop > /dev/null 2>&1
echo 26
pkgin -y in xfce4-dev-tools > /dev/null 2>&1
echo 27
pkgin -y in xfce4-dict > /dev/null 2>&1
echo 29
pkgin -y in xfce4-diskperf-plugin > /dev/null 2>&1
echo 30
pkgin -y in xfce4-exo > /dev/null 2>&1
echo 31
pkgin -y in xfce4-extras > /dev/null 2>&1
echo 33
pkgin -y in xfce4-eyes-plugin > /dev/null 2>&1
echo 34
pkgin -y in xfce4-fsguard-plugin > /dev/null 2>&1
echo 36
pkgin -y in xfce4-garcon > /dev/null 2>&1
echo 37
pkgin -y in xfce4-genmon-plugin > /dev/null 2>&1
echo 38
pkgin -y in xfce4-icon-theme > /dev/null 2>&1
echo 40
pkgin -y in xfce4-indicator-plugin > /dev/null 2>&1
echo 41
pkgin -y in xfce4-mailwatch-plugin > /dev/null 2>&1
echo 42
pkgin -y in xfce4-mount-plugin > /dev/null 2>&1
echo 50
pkgin -y in xfce4-mousepad > /dev/null 2>&1
echo 52
pkgin -y in xfce4-mpc-plugin > /dev/null 2>&1
echo 54
pkgin -y in xfce4-netload-plugin > /dev/null 2>&1
echo 56
pkgin -y in xfce4-notes-plugin > /dev/null 2>&1
echo 58
pkgin -y in xfce4-notifyd > /dev/null 2>&1
echo 60
pkgin -y in xfce4-orage > /dev/null 2>&1
echo 62
pkgin -y in xfce4-panel > /dev/null 2>&1
echo 64
pkgin -y in xfce4-places-plugin > /dev/null 2>&1
echo 66
pkgin -y in xfce4-power-manager > /dev/null 2>&1
echo 68
pkgin -y in xfce4-screenshooter > /dev/null 2>&1
echo 70
pkgin -y in xfce4-session > /dev/null 2>&1
echo 72
pkgin -y in xfce4-settings > /dev/null 2>&1
echo 73
pkgin -y in xfce4-smartbookmark-plugin > /dev/null 2>&1
echo 75
pkgin -y in xfce4-systemload-plugin > /dev/null 2>&1
echo 76
pkgin -y in xfce4-taskmanager > /dev/null 2>&1
echo 78
pkgin -y in xfce4-terminal > /dev/null 2>&1
echo 79
pkgin -y in xfce4-thunar > /dev/null 2>&1
echo 80
pkgin -y in xfce4-thunar-archive-plugin > /dev/null 2>&1
echo 81
pkgin -y in xfce4-thunar-media-tags-plugin > /dev/null 2>&1
echo 83
pkgin -y in xfce4-thunar-vcs-plugin > /dev/null 2>&1
echo 84
pkgin -y in xfce4-time-out-plugin > /dev/null 2>&1
echo 85
pkgin -y in xfce4-timer-plugin > /dev/null 2>&1
echo 87
pkgin -y in xfce4-tumbler > /dev/null 2>&1
echo 88
pkgin -y in xfce4-verve-plugin > /dev/null 2>&1
echo 89
pkgin -y in xfce4-wavelan-plugin > /dev/null 2>&1
echo 90
pkgin -y in xfce4-weather-plugin > /dev/null 2>&1
echo 91
pkgin -y in xfce4-whiskermenu-plugin > /dev/null 2>&1
echo 93
pkgin -y in xfce4-wm > /dev/null 2>&1
echo 94
pkgin -y in xfce4-wm-themes > /dev/null 2>&1
echo 96
pkgin -y in xfce4-xkb-plugin > /dev/null 2>&1
echo 97
cp /usr/pkg/share/examples/rc.d/* /etc/rc.d/
echo 100
} | dialog --gauge "Installing Xfce..." 6 23 0
dialog --yesno "Would you like to set XFCE to French?" 5 46
xfce4_french=$?
if [ $xfce4_french -eq 0 ]; then
echo 'export LANG="fr_FR.UTF-8"' > /home/"$user"/.xsession
echo 'export LC_CTYPE="fr_FR.UTF-8"' >> /home/"$user"/.xsession
echo "startxfce4" >> /home/"$user"/.xsession
else
echo "startxfce4" > /home/"$user"/.xsession
fi
#echo 'export LANG="fr_FR.UTF-8"' > /home/$user/.xinitrc
#echo 'export LC_CTYPE="fr_FR.UTF-8"' >> /home/$user/.xinitrc
#echo "startxfce4" >> /home/$user/.xinitrc
#echo "startx" >> /home/$user/.profile
dialog --yesno "Would you like to restart now?" 5 34
restart_now=$?
if [ $restart_now -eq 0 ]; then
reboot
fi
MainMenu
}
# checked
PareFeu () {
echo "This script will allow you to quickly configure the NPF firewall
It provides a file of standard rules that will be placed in /etc/npf.conf
By default, the provided rules file will block all incoming traffic except for SSH (tcp/22) and allow all outgoing traffic in a stateful manner
A blocklist table for fail2ban is also present, with a blocking rule associated in case you install fail2ban later
However, the file contains a bunch of additional commented rules that will allow you to quickly adapt the configuration to your needs
The next screen will display the provided rules file in a text editor
You can make modifications as needed.
Once you have made your modifications, exit the file and save it without changing its location
At the end, you will be asked whether you confirm or not the application of the rules and the start of the firewall" > /tmp/ZRzepinzenr.tmp
fold -s -w 67 /tmp/ZRzepinzenr.tmp > /tmp/ZR2zepinzenr.tmp
dialog --title "NPF configuration" --textbox /tmp/ZR2zepinzenr.tmp 20 70
rm /tmp/ZR2zepinzenr.tmp /tmp/ZRzepinzenr.tmp
if [ -e "/etc/npf.conf" ]; then
dialog --yesno "A rule file already exists in /etc/npf.conf.\nDo you want to edit the current file or delete it and start over with the default configuration?" 7 53
check_file=$?
if [ $check_file -eq 0 ]; then
pico /etc/npf.conf
dialog --yesno "Do you want to activate the NPF firewall?\n\nIf you are connected via SSH, the connection will be lost upon activation.\nHowever, if you haven't modified the rule allowing SSH traffic, you will be able to reconnect immediately." 11 60
activate_npf=$?
if [ $activate_npf -eq 0 ]; then
checknpf=$(grep -o "npf=" < /etc/rc.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$checknpf" -eq 0 ]; then
echo npf=YES >> /etc/rc.conf
else
sed -i'' 's/npf=NO/npf=YES/' /etc/rc.conf
sed -i'' 's/#npf=YES/npf=YES/' /etc/rc.conf
sed -i'' 's/#npf=NO/npf=YES/' /etc/rc.conf
fi
npfctl start
npfctl reload /etc/npf.conf
fi
SecurityMenu
fi
fi
# Creating the rules file:
{
echo "########################################################################"
echo " "
echo "# 1 - Provide information about your network interface(s):"
echo " "
echo "# WAN Interface :"
echo "\$WAN_if = \"wm0\""
echo "\$WAN_addrs = ifaddrs(wm0)"
echo " "
echo "# LAN Interface :"
echo "# (Uncomment the following only if the server acts as a gateway)"
echo "#\$LAN_if = \"wm1\""
echo "#\$LAN_addrs = ifaddrs(wm1)"
echo " "
echo 'alg "icmp"'
echo " "
echo "########################################################################"
echo " "
echo "# 2 - Define the networks"
echo " "
echo "# The RFC protects the server from private networks in case it is directly facing the internet."
echo "# (Uncomment only if the WAN IP is a public IP address)"
echo "#\$RFC1918 = { 10.0.0.0/8, 172.16.0.0/14, 192.168.0.0/16 }"
echo " "
echo "# (Uncomment only if the server acts as a gateway)"
echo "#\$LAN_net = { 10.10.10.0/24 }"
echo " "
echo "########################################################################"
echo " "
echo "# 3 - Create a NAT mapping for the LAN."
echo " "
echo "# (Uncomment only if the server acts as a gateway)"
echo "#map inet4(\$WAN_if) dynamic \$LAN_net -> inet4(\$WAN_if)"
echo " "
echo "########################################################################"
echo " "
echo "# 4 - Create a procedure for logging connections:"
echo " "
echo 'procedure "log" {'
echo ' # Send all events to a log (see npfd))'
echo ' log: npflog0'
echo '}'
echo " "
echo "########################################################################"
echo " "
echo "# 5 - Create tables"
echo " "
echo "# Create a table for fail2ban"
echo "table <fail2ban> type ipset"
echo " "
echo "########################################################################"
echo " "
echo "# 6 - Rule group for the WAN interface:"
echo " "
echo "group \"WAN\" on \$WAN_if {"
echo " "
echo " # Block IP from fail2ban table"
echo " block in final from <fail2ban> apply \"log\""
echo " "
echo " # Allow all stateful outgoing traffic by selecting the protocol:"
echo " #pass stateful out final proto tcp all"
echo " #pass stateful out final proto udp all"
echo " #pass stateful out final proto icmp all"
echo " #pass stateful out final proto ipv6-icmp all"
echo " "
echo " # Allow all stateful outgoing traffic (all protocols)."
echo " pass stateful out final all"
echo " "
echo " # SSH: Allow SSH connections to the server"
echo " pass stateful in on \$WAN_if proto tcp to \$WAN_addrs port ssh"
echo " "
echo " # Web Server: Allow HTTP and HTTPS connections to the server"
echo " #pass in final proto tcp from any to \$WAN_addrs port http"
echo " #pass in final proto tcp from any to \$WAN_addrs port https"
echo " "
echo " # DHCP: Allow incoming responses from the DHCP server."
echo " #pass in family inet4 proto udp from any port bootps to any port bootpc"
echo " #pass in family inet6 proto udp from any to any port \"dhcpv6-client\""
echo " "
echo " # Ping: Allow incoming ping requests"
echo ' #pass in family inet4 proto icmp icmp-type echo all'
echo ' #pass in final proto icmp icmp-type echo all'
echo ' #pass in final proto icmp icmp-type timxceed all'
echo ' #pass in final proto icmp icmp-type unreach all'
echo ' #pass in final proto icmp icmp-type echoreply all'
echo ' #pass in final proto icmp icmp-type sourcequench all'
echo ' #pass in final proto icmp icmp-type paramprob all'
echo ' #pass in final proto ipv6-icmp all'
echo ' #pass family inet6 proto ipv6-icmp all'
echo " "
echo ' # Traceroute: Allow incoming traceroute.'
echo ' #pass in proto udp to any port 33434-33600'
echo " "
echo ' # DNS: Allow incoming DNS requests'
echo ' #pass stateful out final proto udp to any port domain'
echo " "
echo ' # mDNS: Allow local traffic'
echo ' #pass in proto udp to any port mdns'
echo " "
echo ' # Block private networks:'
echo " #block in final from \$RFC1918 apply \"log\""
echo " #block out final to \$RFC1918 apply \"log\""
echo " "
echo ' # Forbidden IPs: (separate configuration)'
echo ' # ruleset "blacklistd"'
echo " "
echo " # IP Spoofing: Protect yourself (be careful not to cut off SSH access!)"
echo ' #block in final from 127.0.0.1 apply "log"'
echo " "
echo ' # L2TP/IPSEC-NAT-T Tunnels.'
echo " #pass in final proto esp from any to inet4(\$WAN_if)"
echo " #pass out final proto esp from inet4(\$WAN_if) to any"
echo " #pass stateful in final from any to inet4(\$WAN_if) port \"ipsec-nat-t\""
echo " #pass stateful in final from any to inet4(\$WAN_if) port l2tp"
echo " "
echo ' # IGMP on 224.0.0.1.'
echo ' #pass in final proto igmp all'
echo ' #pass in final from any to 224.0.0.0/4'
echo " "
echo ' # VNC'
echo " #pass in final proto tcp from any to any port 5900"
echo " "
echo '}'
echo " "
echo "########################################################################"
echo " "
echo "# 7 - Rule group for the LAN interface:"
echo " "
echo "# (This group manages rules for the LAN interface when the server acts as a gateway)"
echo " "
echo "#group \"LAN\" on \$LAN_if {"
echo " "
echo " # Allow stateful incoming and outgoing traffic"
echo ' #pass stateful out final all'
echo ' #pass stateful in final all'
echo " "
echo " # Allow connections from the LAN network:"
echo " #pass in final from \$LAN_net"
echo " "
echo " # Allow all traffic"
echo " #pass in final all"
echo " #pass out final all"
echo " "
echo '#}'
echo " "
echo "########################################################################"
echo " "
echo "# 8 - Default rule group:"
echo " "
echo 'group default {'
echo " "
echo ' # Loopback : Allow traffic'
echo " pass final on lo0 all"
echo " "
echo ' # Close the firewall'
echo ' block all apply "log"'
echo " "
echo '}'
echo "########################################################################"
} > /etc/npf.conf
pico /etc/npf.conf
dialog --yesno "Do you want to activate the NPF firewall?\n\nIf you are connected via SSH, the connection will be lost upon activation.\nHowever, if you haven't modified the rule allowing SSH traffic, you will be able to reconnect immediately." 10 60
activate_npf=$?
if [ $activate_npf -eq 0 ]; then
checknpf=$(grep -o "npf=" < /etc/rc.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$checknpf" -eq 0 ]; then
# Launch NPF at startup:
echo npf=YES >> /etc/rc.conf
else
# Launch NPF at startup:
sed -i'' 's/npf=NO/npf=YES/' /etc/rc.conf
sed -i'' 's/#npf=YES/npf=YES/' /etc/rc.conf
sed -i'' 's/#npf=NO/npf=YES/' /etc/rc.conf
fi
# Start NPF, load the rules
npfctl start
npfctl reload /etc/npf.conf
fi
PareFeuMenu
}
# checked
ShowRulesNPF () {
if [ ! -e "/etc/npf.conf" ]; then
dialog --msgbox "The firewall is not yet configured." 5 38
PareFeuMenu
fi
npfctl show > /tmp/Gzebpnief.tmp
dialog --textbox /tmp/Gzebpnief.tmp 0 0
rm /tmp/Gzebpnief.tmp
PareFeuMenu
}
# checked
InstallFail2ban () {
{
# check if fail2ban is already installed
if [ ! -e /usr/pkg/bin/fail2ban-server ]; then
checkInternetConnection
echo 10
pkgin -y in fail2ban > /dev/null 2>&1
echo 50
cp /usr/pkg/share/examples/rc.d/fail2ban /etc/rc.d/
# check for fail2ban in /etc/rc.conf
check=$(grep -o 'fail2ban=' < /etc/rc.conf | sort | uniq | tr -d ' ')
if [ "$check" -eq 0 ]; then
echo fail2ban=YES >> /etc/rc.conf
else
sed -i'' "s/fail2ban=NO/fail2ban=YES/" /etc/rc.conf
sed -i'' "s/#fail2ban=YES/fail2ban=YES/" /etc/rc.conf
sed -i'' "s/#fail2ban=NO/fail2ban=YES/" /etc/rc.conf
fi
# check for other things :
mkdir /usr/pkg/etc/fail2ban/filter.d/ignorecommands
cp /usr/pkg/share/examples/fail2ban/filter.d/ignorecommands/apache-fakegooglebot /usr/pkg/etc/fail2ban/filter.d/ignorecommands/
chmod 0644 /usr/pkg/etc/fail2ban/filter.d/ignorecommands/apache-fakegooglebot
fi
echo 100
} | dialog --gauge "Check for fail2ban..." 6 25 0
# checking for NPF correct configuration for fail2ban :
if [ ! -e /etc/npf.conf ]; then
dialog --yesno "To allow fail2ban to function properly, the NPF firewall must be configured and started beforehand\n\nDo you want to configure NPF now?" 9 70
npfnow_ornot=$?
if [ $npfnow_ornot -eq 0 ]; then
PareFeu
fi
fi
#Check for previous configuration
if [ -e /usr/pkg/etc/fail2ban/jail.local ]; then
dialog --yesno "A previous configuration of Fail2ban has been found\n\nWould you like to edit it (Yes) or start from a new configuration (No)" 8 70
new_ornot=$?
if [ $new_ornot -eq 1 ]; then
# Standard fail2ban.local :
{
echo '[INCLUDES]'
echo 'before = paths-pkgsrc.conf'
echo ''
echo '[DEFAULT]'
echo 'ignoreip = 127.0.0.1/8'
echo 'bantime = 10m'
echo 'findtime = 10m'
echo 'maxretry = 5'
echo 'maxmatches = %(maxretry)s'
echo 'backend = auto'
echo 'usedns = warn'
echo 'logencoding = auto'
echo 'enabled = false'
echo 'mode = normal'
echo 'filter = %(__name__)s[mode=%(mode)s]'
echo ''
echo 'destemail = root@localhost'
echo 'sender = root@<fq-hostname>'
echo 'mta = sendmail'
echo 'protocol = tcp'
echo 'chain = <known/chain>'
echo 'port = 0:65535'
echo 'fail2ban_agent = Fail2Ban/%(fail2ban_version)s'
echo ''
echo 'banaction = npf'
echo ''
echo '[sshd]'
echo '# To use more aggressive sshd modes set filter parameter "mode" in jail.local:'
echo '# normal (default), ddos, extra or aggressive (combines all).'
echo '# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.'
echo '#mode = normal'
echo 'enabled = true'
echo 'port = ssh'
echo 'logpath = /var/log/authlog'
echo 'backend = %(sshd_backend)s'
echo ''
echo '[dropbear]'
echo 'port = ssh'
echo 'logpath = %(dropbear_log)s'
echo 'backend = %(dropbear_backend)s'
echo ''
echo '[selinux-ssh]'
echo 'port = ssh'
echo 'logpath = %(auditd_log)s'
echo ''
echo '#'
echo '# HTTP servers'
echo '#'
echo '[apache-auth]'
echo 'port = http,https'
echo 'logpath = %(apache_error_log)s'
echo ''
echo '[apache-badbots]'
echo '# Ban hosts which agent identifies spammer robots crawling the web'
echo '# for email addresses. The mail outputs are buffered.'
echo 'port = http,https'
echo 'logpath = %(apache_access_log)s'
echo 'bantime = 48h'
echo 'maxretry = 1'
echo ''
echo '[apache-noscript]'
echo 'port = http,https'
echo 'logpath = %(apache_error_log)s'
echo ''
echo '[apache-overflows]'
echo 'port = http,https'
echo 'logpath = %(apache_error_log)s'
echo 'maxretry = 2'
echo ''
echo '[apache-nohome]'
echo 'port = http,https'
echo 'logpath = %(apache_error_log)s'
echo 'maxretry = 2'
echo ''
echo '[apache-botsearch]'
echo 'port = http,https'
echo 'logpath = %(apache_error_log)s'
echo 'maxretry = 2'
echo ''
echo '[apache-fakegooglebot]'
echo 'port = http,https'
echo 'logpath = %(apache_access_log)s'
echo 'maxretry = 1'
echo 'ignorecommand = %(fail2ban_confpath)s/filter.d/ignorecommands/apache-fakegooglebot <ip>'
echo ''
echo '[apache-modsecurity]'
echo 'port = http,https'
echo 'logpath = %(apache_error_log)s'
echo 'maxretry = 2'
echo ''
echo '[apache-shellshock]'
echo 'port = http,https'
echo 'logpath = %(apache_error_log)s'
echo 'maxretry = 1'
echo ''
echo '[openhab-auth]'
echo 'filter = openhab'
echo 'banaction = %(banaction_allports)s'
echo 'logpath = /opt/openhab/logs/request.log'
echo ''
echo '# To use more aggressive http-auth modes set filter parameter "mode" in jail.local:'
echo '# normal (default), aggressive (combines all), auth or fallback'
echo '[nginx-http-auth]'
echo '# mode = normal'
echo 'port = http,https'
echo 'logpath = %(nginx_error_log)s'
echo ''
echo "# To use 'nginx-limit-req' jail you should have \`ngx_http_limit_req_module\`"
echo "# and define \`limit_req\` and \`limit_req_zone\` as described in nginx documentation"
echo '# http://nginx.org/en/docs/http/ngx_http_limit_req_module.html'
echo '# or for example see in '\''config/filter.d/nginx-limit-req.conf'\'''
echo '[nginx-limit-req]'
echo 'port = http,https'
echo 'logpath = %(nginx_error_log)s'
echo ''
echo '[nginx-botsearch]'
echo 'port = http,https'
echo 'logpath = %(nginx_error_log)s'
echo ''
echo '[nginx-bad-request]'
echo 'port = http,https'
echo 'logpath = %(nginx_access_log)s'
echo ''
echo "# Ban attackers that try to use PHP's URL-fopen() functionality"
echo '# through GET/POST variables. - Experimental, with more than a year'
echo '# of usage in production environments.'
echo ''
echo '[php-url-fopen]'
echo 'port = http,https'
echo 'logpath = %(nginx_access_log)s'
echo ' %(apache_access_log)s'
echo ''
echo '[suhosin]'
echo 'port = http,https'
echo 'logpath = %(suhosin_log)s'
echo ''
echo '[lighttpd-auth]'
echo '# Same as above for Apache'\''s mod_auth'
echo '# It catches wrong authentifications'
echo 'port = http,https'
echo 'logpath = %(lighttpd_error_log)s'
echo ''
echo '#'
echo '# Webmail and groupware servers'
echo '#'
echo '[roundcube-auth]'
echo 'port = http,https'
echo 'logpath = %(roundcube_errors_log)s'
echo '# Use following line in your jail.local if roundcube logs to journal.'
echo '#backend = %(syslog_backend)s'
echo ''
echo '[openwebmail]'
echo 'port = http,https'
echo 'logpath = /var/log/openwebmail.log'
echo ''
echo '[horde]'
echo 'port = http,https'
echo 'logpath = /var/log/horde/horde.log'
echo ''
echo '[groupoffice]'
echo 'port = http,https'
echo 'logpath = /home/groupoffice/log/info.log'
echo ''
echo '[sogo-auth]'
echo '# Monitor SOGo groupware server'
echo '# without proxy this would be:'
echo '# port = 20000'
echo 'port = http,https'
echo 'logpath = /var/log/sogo/sogo.log'
echo ''
echo '[tine20]'
echo 'logpath = /var/log/tine20/tine20.log'
echo 'port = http,https'
echo ''
echo '#'
echo '# Web Applications'
echo '#'
echo '[drupal-auth]'
echo 'port = http,https'
echo 'logpath = %(syslog_daemon)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[guacamole]'
echo 'port = http,https'
echo 'logpath = /var/log/tomcat*/catalina.out'
echo '#logpath = /var/log/guacamole.log'
echo ''
echo '[monit]'
echo '#Ban clients brute-forcing the monit gui login'
echo 'port = 2812'
echo 'logpath = /var/log/monit'
echo ' /var/log/monit.log'
echo ''
echo '[webmin-auth]'
echo 'port = 10000'
echo 'logpath = %(syslog_authpriv)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[froxlor-auth]'
echo 'port = http,https'
echo 'logpath = %(syslog_authpriv)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '#'
echo '# HTTP Proxy servers'
echo '#'
echo '[squid]'
echo 'port = 80,443,3128,8080'
echo 'logpath = /var/log/squid/access.log'
echo ''
echo '[3proxy]'
echo 'port = 3128'
echo 'logpath = /var/log/3proxy.log'
echo ''
echo '#'
echo '# FTP servers'
echo '#'
echo '[proftpd]'
echo 'port = ftp,ftp-data,ftps,ftps-data'
echo 'logpath = %(proftpd_log)s'
echo 'backend = %(proftpd_backend)s'
echo ''
echo '[pure-ftpd]'
echo 'port = ftp,ftp-data,ftps,ftps-data'
echo 'logpath = %(pureftpd_log)s'
echo 'backend = %(pureftpd_backend)s'
echo ''
echo '[gssftpd]'
echo 'port = ftp,ftp-data,ftps,ftps-data'
echo 'logpath = %(syslog_daemon)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[wuftpd]'
echo 'port = ftp,ftp-data,ftps,ftps-data'
echo 'logpath = %(wuftpd_log)s'
echo 'backend = %(wuftpd_backend)s'
echo ''
echo '[vsftpd]'
echo '# or overwrite it in jails.local to be'
echo '# logpath = %(syslog_authpriv)s'
echo '# if you want to rely on PAM failed login attempts'
echo "# vsftpd's failregex should match both of those formats"
echo 'port = ftp,ftp-data,ftps,ftps-data'
echo 'logpath = %(vsftpd_log)s'
echo ''
echo '#'
echo '# Mail servers'
echo '#'
echo '# ASSP SMTP Proxy Jail'
echo '[assp]'
echo 'port = smtp,465,submission'
echo 'logpath = /root/path/to/assp/logs/maillog.txt'
echo ''
echo '[courier-smtp]'
echo 'port = smtp,465,submission'
echo 'logpath = %(syslog_mail)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[postfix]'
echo '# To use another modes set filter parameter "mode" in jail.local:'
echo 'mode = more'
echo 'port = smtp,465,submission'
echo 'logpath = %(postfix_log)s'
echo 'backend = %(postfix_backend)s'
echo ''
echo '[postfix-rbl]'
echo 'filter = postfix[mode=rbl]'
echo 'port = smtp,465,submission'
echo 'logpath = %(postfix_log)s'
echo 'backend = %(postfix_backend)s'
echo 'maxretry = 1'
echo ''
echo '[sendmail-auth]'
echo 'port = submission,465,smtp'
echo 'logpath = %(syslog_mail)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[sendmail-reject]'
echo '# To use more aggressive modes set filter parameter "mode" in jail.local:'
echo '# normal (default), extra or aggressive'
echo '# See "tests/files/logs/sendmail-reject" or "filter.d/sendmail-reject.conf" for usage example and details.'
echo '#mode = normal'
echo 'port = smtp,465,submission'
echo 'logpath = %(syslog_mail)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[qmail-rbl]'
echo 'filter = qmail'
echo 'port = smtp,465,submission'
echo 'logpath = /service/qmail/log/main/current'
echo ''
echo '# dovecot defaults to logging to the mail syslog facility'
echo '# but can be set by syslog_facility in the dovecot configuration.'
echo '[dovecot]'
echo 'port = pop3,pop3s,imap,imaps,submission,465,sieve'
echo 'logpath = %(dovecot_log)s'
echo 'backend = %(dovecot_backend)s'
echo ''
echo '[sieve]'
echo 'port = smtp,465,submission'
echo 'logpath = %(dovecot_log)s'
echo 'backend = %(dovecot_backend)s'
echo ''
echo '[solid-pop3d]'
echo 'port = pop3,pop3s'
echo 'logpath = %(solidpop3d_log)s'
echo ''
echo '[exim]'
echo '# see filter.d/exim.conf for further modes supported from filter:'
echo '#mode = normal'
echo 'port = smtp,465,submission'
echo 'logpath = %(exim_main_log)s'
echo ''
echo '[exim-spam]'
echo 'port = smtp,465,submission'
echo 'logpath = %(exim_main_log)s'
echo ''
echo '[kerio]'
echo 'port = imap,smtp,imaps,465'
echo 'logpath = /opt/kerio/mailserver/store/logs/security.log'
echo ''
echo '#'
echo '# Mail servers authenticators: might be used for smtp,ftp,imap servers, so'
echo '# all relevant ports get banned'
echo '#'
echo ''
echo '[courier-auth]'
echo 'port = smtp,465,submission,imap,imaps,pop3,pop3s'
echo 'logpath = %(syslog_mail)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[postfix-sasl]'
echo 'filter = postfix[mode=auth]'
echo 'port = smtp,465,submission,imap,imaps,pop3,pop3s'
echo '# You might consider monitoring /var/log/mail.warn instead if you are'
echo '# running postfix since it would provide the same log lines at the'
echo '# "warn" level but overall at the smaller filesize.'
echo 'logpath = %(postfix_log)s'
echo 'backend = %(postfix_backend)s'
echo ''
echo '[perdition]'
echo 'port = imap,imaps,pop3,pop3s'
echo 'logpath = %(syslog_mail)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[squirrelmail]'
echo 'port = smtp,465,submission,imap,imap2,imaps,pop3,pop3s,http,https,socks'
echo 'logpath = /var/db/squirrelmail/prefs/squirrelmail_access_log'
echo ''
echo '[cyrus-imap]'
echo 'port = imap,imaps'
echo 'logpath = %(syslog_mail)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[uwimap-auth]'
echo 'port = imap,imaps'
echo 'logpath = %(syslog_mail)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '#'
echo '#'
echo '# DNS servers'
echo '#'
echo ''
echo '#'
echo '#'
echo '# !!! WARNING !!!'
echo '# Since UDP is connection-less protocol, spoofing of IP and imitation'
echo '# of illegal actions is way too simple. Thus enabling of this filter'
echo '# might provide an easy way for implementing a DoS against a chosen'
echo '# victim. See'
echo '# http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html'
echo '# Please DO NOT USE this jail unless you know what you are doing.'
echo '#'
echo '# IMPORTANT: see filter.d/named-refused for instructions to enable logging'
echo '# This jail blocks UDP traffic for DNS requests.'
echo '# [named-refused-udp]'
echo '#'
echo '# filter = named-refused'
echo '# port = domain,953'
echo '# protocol = udp'
echo '# logpath = /var/log/named/security.log'
echo '#'
echo '#'
echo '# IMPORTANT: see filter.d/named-refused for instructions to enable logging'
echo '# This jail blocks TCP traffic for DNS requests.'
echo ''
echo ''
echo '[named-refused]'
echo 'port = domain,953'
echo 'logpath = /var/log/named/security.log'
echo ''
echo ''
echo '[nsd]'
echo 'port = 53'
echo 'action_ = %(default/action_)s[name=%(__name__)s-tcp, protocol="tcp"]'
echo ' %(default/action_)s[name=%(__name__)s-udp, protocol="udp"]'
echo 'logpath = /var/log/nsd.log'
echo ''
echo '#'
echo '# Miscellaneous'
echo '#'
echo ''
echo '[asterisk]'
echo 'port = 5060,5061'
echo 'action_ = %(default/action_)s[name=%(__name__)s-tcp, protocol="tcp"]'
echo ' %(default/action_)s[name=%(__name__)s-udp, protocol="udp"]'
echo 'logpath = /var/log/asterisk/messages'
echo 'maxretry = 10'
echo ''
echo '[freeswitch]'
echo 'port = 5060,5061'
echo 'action_ = %(default/action_)s[name=%(__name__)s-tcp, protocol="tcp"]'
echo ' %(default/action_)s[name=%(__name__)s-udp, protocol="udp"]'
echo 'logpath = /var/log/freeswitch.log'
echo 'maxretry = 10'
echo ''
echo '# enable adminlog; it will log to a file inside znc'\''s directory by default.'
echo '[znc-adminlog]'
echo 'port = 6667'
echo 'logpath = /var/db/znc/moddata/adminlog/znc.log'
echo ''
echo '# To log wrong MySQL access attempts add to /usr/pkg/etc/my.cnf in [mysqld] or'
echo '# equivalent section:'
echo '# log-warnings = 2'
echo '#'
echo '# for syslog (daemon facility)'
echo '# [mysqld_safe]'
echo '# syslog'
echo '#'
echo '# for own logfile'
echo '# [mysqld]'
echo '# log-error=/var/log/mysqld.log'
echo '[mysqld-auth]'
echo 'port = 3306'
echo 'logpath = %(mysql_log)s'
echo 'backend = %(mysql_backend)s'
echo ''
echo '[mssql-auth]'
echo '# Default configuration for Microsoft SQL Server for Linux'
echo '# See the '\''mssql-conf'\'' manpage how to change logpath or port'
echo 'logpath = /var/opt/mssql/log/errorlog'
echo 'port = 1433'
echo 'filter = mssql-auth'
echo ''
echo '# Log wrong MongoDB auth (for details see filter '\''filter.d/mongodb-auth.conf'\'')'
echo '[mongodb-auth]'
echo '# change port when running with "--shardsvr" or "--configsvr" runtime operation'
echo 'port = 27017'
echo 'logpath = /var/log/mongodb/mongodb.log'
echo ''
echo '# Jail for more extended banning of persistent abusers'
echo '# !!! WARNINGS !!!'
echo '# 1. Make sure that your loglevel specified in fail2ban.conf/.local'
echo '# is not at DEBUG level -- which might then cause fail2ban to fall into'
echo '# an infinite loop constantly feeding itself with non-informative lines'
echo '# 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)'
echo '# to maintain entries for failed logins for sufficient amount of time'
echo '[recidive]'
echo ''
echo 'logpath = /var/log/fail2ban.log'
echo 'banaction = %(banaction_allports)s'
echo 'bantime = 1w'
echo 'findtime = 1d'
echo ''
echo '# Generic filter for PAM. Has to be used with action which bans all'
echo '# ports such as iptables-allports, shorewall'
echo ''
echo '[pam-generic]'
echo '# pam-generic filter can be customized to monitor specific subset of '\''tty'\''s'
echo 'banaction = %(banaction_allports)s'
echo 'logpath = %(syslog_authpriv)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[xinetd-fail]'
echo 'banaction = iptables-multiport-log'
echo 'logpath = %(syslog_daemon)s'
echo 'backend = %(syslog_backend)s'
echo 'maxretry = 2'
echo ''
echo '# stunnel - need to set port for this'
echo '[stunnel]'
echo 'logpath = /var/log/stunnel4/stunnel.log'
echo ''
echo '[ejabberd-auth]'
echo 'port = 5222'
echo 'logpath = /var/log/ejabberd/ejabberd.log'
echo ''
echo '[counter-strike]'
echo 'logpath = /opt/cstrike/logs/L[0-9]*.log'
echo 'tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039'
echo 'udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015'
echo 'action_ = %(default/action_)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp"]'
echo ' %(default/action_)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp"]'
echo ''
echo '[softethervpn]'
echo 'port = 500,4500'
echo 'protocol = udp'
echo 'logpath = /usr/local/vpnserver/security_log/*/sec.log'
echo ''
echo '[gitlab]'
echo 'port = http,https'
echo 'logpath = /var/log/gitlab/gitlab-rails/application.log'
echo ''
echo '[grafana]'
echo 'port = http,https'
echo 'logpath = /var/log/grafana/grafana.log'
echo ''
echo '[bitwarden]'
echo 'port = http,https'
echo 'logpath = /home/*/bwdata/logs/identity/Identity/log.txt'
echo ''
echo '[centreon]'
echo 'port = http,https'
echo 'logpath = /var/log/centreon/login.log'
echo ''
echo '# consider low maxretry and a long bantime'
echo '# nobody except your own Nagios server should ever probe nrpe'
echo '[nagios]'
echo 'logpath = %(syslog_daemon)s ; nrpe.cfg may define a different log_facility'
echo 'backend = %(syslog_backend)s'
echo 'maxretry = 1'
echo ''
echo '[oracleims]'
echo '# see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above'
echo 'logpath = /opt/sun/comms/messaging64/log/mail.log_current'
echo 'banaction = %(banaction_allports)s'
echo ''
echo '[directadmin]'
echo 'logpath = /var/log/directadmin/login.log'
echo 'port = 2222'
echo ''
echo '[portsentry]'
echo 'logpath = /var/db/portsentry/portsentry.history'
echo 'maxretry = 1'
echo ''
echo '[pass2allow-ftp]'
echo '# this pass2allow example allows FTP traffic after successful HTTP authentication'
echo 'port = ftp,ftp-data,ftps,ftps-data'
echo '# knocking_url variable must be overridden to some secret value in jail.local'
echo 'knocking_url = /knocking/'
echo 'filter = apache-pass[knocking_url="%(knocking_url)s"]'
echo '# access log of the website with HTTP auth'
echo 'logpath = %(apache_access_log)s'
echo 'blocktype = RETURN'
echo 'returntype = DROP'
echo 'action = %(action_)s[blocktype=%(blocktype)s, returntype=%(returntype)s,'
echo ' actionstart_on_demand=false, actionrepair_on_unban=true]'
echo 'bantime = 1h'
echo 'maxretry = 1'
echo 'findtime = 1'
echo ''
echo '[murmur]'
echo '# AKA mumble-server'
echo 'port = 64738'
echo 'action_ = %(default/action_)s[name=%(__name__)s-tcp, protocol="tcp"]'
echo ' %(default/action_)s[name=%(__name__)s-udp, protocol="udp"]'
echo 'logpath = /var/log/mumble-server/mumble-server.log'
echo ''
echo '[screensharingd]'
echo '# For Mac OS Screen Sharing Service (VNC)'
echo 'logpath = /var/log/system.log'
echo 'logencoding = utf-8'
echo ''
echo '[haproxy-http-auth]'
echo "# HAProxy by default doesn't log to file you'll need to set it up to forward"
echo '# logs to a syslog server which would then write them to disk.'
echo '# See "haproxy-http-auth" filter for a brief cautionary note when setting'
echo '# maxretry and findtime.'
echo 'logpath = /var/log/haproxy.log'
echo ''
echo '[slapd]'
echo 'port = ldap,ldaps'
echo 'logpath = /var/log/slapd.log'
echo ''
echo '[domino-smtp]'
echo 'port = smtp,ssmtp'
echo 'logpath = /home/domino01/data/IBM_TECHNICAL_SUPPORT/console.log'
echo ''
echo '[phpmyadmin-syslog]'
echo 'port = http,https'
echo 'logpath = %(syslog_authpriv)s'
echo 'backend = %(syslog_backend)s'
echo ''
echo '[zoneminder]'
echo '# Zoneminder HTTP/HTTPS web interface auth'
echo '# Logs auth failures to apache2 error log'
echo 'port = http,https'
echo 'logpath = %(apache_error_log)s'
echo ''
echo '[traefik-auth]'
echo "# to use 'traefik-auth' filter you have to configure your Traefik instance,"
echo "# see \`filter.d/traefik-auth.conf\` for details and service example."
echo 'port = http,https'
echo 'logpath = /var/log/traefik/access.log'
echo ''
echo '[scanlogd]'
echo 'logpath = %(syslog_local0)s'
echo 'banaction = %(banaction_allports)s'
echo ''
echo '[monitorix]'
echo 'port = 8080'
echo 'logpath = /var/log/monitorix-httpd'
} > /usr/pkg/etc/fail2ban/jail.local
pico /usr/pkg/etc/fail2ban/jail.local
else
pico /usr/pkg/etc/fail2ban/jail.local
dialog --yesno "Do you want to (re)start fail2ban?" 5 39
restart_ornot=$?
if [ $restart_ornot -eq 0 ]; then
service fail2ban restart > /dev/null 2>&1
Fail2banMenu
fi
fi
dialog --yesno "Do you want to (re)start fail2ban?" 5 39
restart_ornot=$?
if [ $restart_ornot -eq 0 ]; then
service fail2ban restart > /dev/null 2>&1
fi
fi
Fail2banMenu
}
# checked
ConfigureSSH () {
# Check if OpenSSH is installed or not
check=$(grep -o "sshd=YES" < /etc/rc.conf | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
if [ ! -e /usr/sbin/sshd ]; then
dialog --yesno "OpenSSH is not installed on your system, do you want to install it?" 6 44
sshd_install=$?
checkInternetConnection
if [ $sshd_install -eq 0 ]; then
pkgin -y in opensshd
# I don't remember if sshd goes automatically to /etc/rc.d/... in case :
cp /usr/pkg/share/examples/rc.d/sshd /etc/rc.d/sshd
echo sshd=YES >> /etc/rc.conf
fi
fi
fi
# Check if a previous configuration has already been done
if [ -e /etc/ssh/sshd_config.BAK ]; then
dialog --yesno "A previous configuration seems to have been done\nDo you want to restore the backup file (Yes) or work on the actual configuration? (No)" 7 52
what_todo=$?
if [ $what_todo -eq 0 ]; then
cp /etc/ssh/sshd_config.BAK /etc/ssh/ssh/sshd_config
fi
else
dialog --yesno "Do you want to create a backup of the original /etc/ssh/sshd_config before starting to edit the configuration?\n(you really should say yes!!)" 7 70
bak_ornot=$?
if [ $bak_ornot -eq 0 ]; then
cp /etc/ssh/sshd_config /etc/ssh/sshd_config.BAK
dialog --msgbox "/etc/ssh/sshd_config has been saved as /etc/ssh/sshd_config.BAK" 5 68
fi
fi
# be guided for configuration or not ?
dialog --yesno "Do you wish to be guided (Yes) in order to configure SSH properly (with usual parameters)\nor\nDo you prefer to do it yourself? (No)" 8 70
guided_ornot=$?
if [ $guided_ornot -eq 0 ]; then
dialog --msgbox "Then, let's start!" 5 22
{
echo "###########################"
echo "# CUSTOM SSH CONFIGURATION"
echo " "
} >> /etc/ssh/sshd_config
# SSH PORT
dialog --yesno "Do you want to change the SSH port?\n\nBy default, the SSH port is 22 (TCP)\n(It is recommended to use another port to reduce the risk of automated attacks)" 9 70
change_port=$?
if [ $change_port -eq 0 ]; then
nport=$(dialog --inputbox "Please enter a new port number (>10,000 and <65,000 preferably)" 8 68 2>&1 1>/dev/tty)
{
echo "# PORT"
echo "Port $nport"
echo " "
} >> /etc/ssh/sshd_config
# check if the NPF firewall has already been configured
if [ -e /etc/npf.conf ]; then
check=$(npfctl show | grep -o "inactive" | sort | uniq | wc -l | tr -d ' ')
if [ ! "$check" -eq 1 ]; then
dialog --msgbox "The NPF firewall seems to be active\nYou also need to change the SSH port in the rules file to avoid being blocked when SSH is activated.\n\nThe NPF rules file will open\nMake the changes, exit, and save without changing the file location" 11 70
pico /etc/npf.conf
changePortNPF="1"
fi
fi
else
{
echo "# PORT"
echo "Port 22"
echo " "
} >> /etc/ssh/sshd_config
fi
# LISTEN ADDRESS
dialog --yesno "Do you want to configure the listening addresses?\n\n(If your server has multiple network interfaces, it is recommended to specify the IP address(es) of your server on which the SSH service should listen if you do not want users to be able to connect via undesired or protected interfaces)\n\nIf you answer (No), then SSH will listen by default on all interfaces of your server" 13 70
listen_ip=$?
if [ $listen_ip -eq 0 ]; then
echo "# LISTEN ADDRESS" >> /etc/ssh/sshd_config
i=0
while [ $i -lt "50" ]; do
ip_add=$(dialog --inputbox "Please enter an IP address allowed to connect" 8 55 2>&1 1>/dev/tty)
echo "ListenAddress $ip_add" >> /etc/ssh/sshd_config
dialog --yesno "Do you want to add another IP?" 5 34
add_another=$?
if [ $add_another -eq 1 ]; then
i=$((i+51))
fi
i=$((i+1))
done
echo " " >> /etc/ssh/sshd_config
else
{
echo "# LISTEN ADDRESS"
echo "ListenAddress 0.0.0.0"
echo "ListenAddress ::"
} >> /etc/ssh/sshd_config
fi
# AUTHORIZED/ USERS
dialog --yesno "Do you want to specify the users allowed to connect to this server via SSH?\n(Only the specified users will be allowed to connect)\n\nIf (No), all users will be allowed to connect" 9 70
user_yesconnect=$?
if [ $user_yesconnect -eq 0 ]; then
echo "# ALLOW USERS" >> /etc/ssh/sshd_config
permitusers=$(dialog --inputbox "Please enter the username(s) of the only user(s) allowed to connect\n(separate usernames with spaces)" 9 70 2>&1 1>/dev/tty)
echo "AllowUsers ${permitusers}" >> /etc/ssh/sshd_config
echo " " >> /etc/ssh/sshd_config
fi
# DENIED USERS
dialog --yesno "Do you want to prohibit specific users from connecting to this server via SSH?\n(only the specified users will be prohibited from connecting.\n\nIf you have previously allowed users to connect, then answer (No)" 9 70
user_noconnect=$?
if [ $user_noconnect -eq 0 ]; then
echo "# DENY USERS" >> /etc/ssh/sshd_config
denyusers=$(dialog --inputbox "Please enter the username(s) of the user(s) denied from connecting\n(separate usernames with spaces)" 9 70 2>&1 1>/dev/tty)
echo "DenyUsers ${denyusers}" >> /etc/ssh/sshd_config
echo " " >> /etc/ssh/sshd_config
fi
# PERMIT ROOT LOGIN
dialog --yesno "Do you want to prohibit (Yes) or allow (No) root to connect to this server?\n\n(It is recommended to prohibit root login)" 8 70
permit_root=$?
echo "# PERMIT ROOT LOGIN" >> /etc/ssh/sshd_config
if [ $permit_root -eq 0 ]; then
echo "PermitRootLogin no" >> /etc/ssh/sshd_config
echo " " >> /etc/ssh/sshd_config
else
echo "PermitRootLogin yes" >> /etc/ssh/sshd_config
echo " " >> /etc/ssh/sshd_config
fi
# PUB KEY AUTHENTICATION
dialog --yesno "Do you want to allow both key-based and password-based authentication (Yes) or only one of them (No)?\n\nIf you answer (No), you will be prompted to choose on the next screen." 9 70
pubkey_yesno=$?
if [ $pubkey_yesno -eq 0 ]; then
{
echo "# PUB KEY AND PASSWORD AUTHENTICATION"
echo "PasswordAuthentication yes"
echo "AuthorizedKeysFile .ssh/authorized_keys"
echo "KbdInteractiveAuthentication yes"
echo "UsePAM yes"
echo " "
} >> /etc/ssh/sshd_config
else
dialog --yesno "Do you want to allow only password-based authentication (Yes)\nor\nonly public key-based authentication (No)?\n\nSSH key-based authentication is highly recommended, however, you should not disable password authentication until you have added the public SSH key of the machine that will connect to this server to the /home/USER/.ssh/authorized_keys file on this server. Otherwise, you may risk losing access to the server." 13 70
pass_orkey=$?
if [ $pass_orkey -eq 0 ]; then
{
echo "# PASSWORD AUTHENTICATION ONLY"
echo "PasswordAuthentication yes"
echo "PubkeyAuthentication no"
echo "KbdInteractiveAuthentication yes"
echo "UsePAM yes"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# PUB KEY AUTHENTICATION ONLY"
echo "PasswordAuthentication no"
echo "PubkeyAuthentication yes"
echo "AuthorizedKeysFile .ssh/authorized_keys"
echo "KbdInteractiveAuthentication no"
echo "UsePAM no"
echo " "
} >> /etc/ssh/sshd_config
fi
fi
# X11Forwarding
dialog --yesno "Do you need to run graphical applications (X11) via SSH?" 5 61
x11_forward=$?
if [ $x11_forward -eq 0 ]; then
{
echo "# X11 FORWARDING"
echo "X11Forwarding yes"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# NO X11 FORWARDING"
echo "X11Forwarding no"
echo " "
} >> /etc/ssh/sshd_config
fi
# AllowTcpForwarding
dialog --yesno "Will you be setting up SSH tunnels?" 5 40
ssh_tunnels=$?
if [ $ssh_tunnels -eq 0 ]; then
{
echo "# SSH TUNNELING"
echo "AllowTcpForwarding yes"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# NO SSH TUNNELING"
echo "AllowTcpForwarding no"
echo " "
} >> /etc/ssh/sshd_config
fi
# USER ENVIRONMENT
dialog --yesno "Will you need to set environment variables via SSH?\n\nIt is recommended not to enable this option." 7 56
user_env=$?
if [ $user_env -eq 0 ]; then
{
echo "# USER ENVIRONMENT"
echo "PermitUserEnvironment yes"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# NO USER ENVIRONMENT"
echo "PermitUserEnvironment no"
echo " "
} >> /etc/ssh/sshd_config
fi
# LOGIN GRACE TIME
dialog --yesno "Do you want to set a timeout during authentication?\n\nIt is recommended to configure a timeout." 7 56
grace_limit=$?
if [ $grace_limit -eq 0 ]; then
timelogin=$(dialog --inputbox "Please enter a timeout value (in seconds)\n(example: 60)" 9 50 2>&1 1>/dev/tty)
{
echo "# LOGIN GRACE TIME"
echo "LoginGraceTime $timelogin"
echo " "
} >> /etc/ssh/sshd_config
fi
# MAX AUTHENTICATION TRIES
dialog --yesno "Do you want to limit the number of authentication attempts?\n\n(recommended)" 7 64
max_ornot=$?
if [ $max_ornot -eq 0 ]; then
maxauth=$(dialog --inputbox "Please enter a maximum number of attempts\n(3 or 4 are usually good values)" 9 47 2>&1 1>/dev/tty)
{
echo "# MAX AUTHENTICATION TRIES"
echo "MaxAuthTries $maxauth"
echo " "
} >> /etc/ssh/sshd_config
fi
# MAX SESSIONS
dialog --yesno "Do you want to limit the number of simultaneous SSH sessions for each user?\n\n(recommended)" 8 70
ssh_simul=$?
if [ $ssh_simul -eq 0 ]; then
maxsimul=$(dialog --inputbox "Please enter a maximum number of sessions" 8 50 2>&1 1>/dev/tty)
{
echo "# MAX SESSIONS PER USER"
echo "MaxSessions $maxsimul"
echo " "
} >> /etc/ssh/sshd_config
fi
# AUTOMATIC CLOSING
dialog --yesno "Do you want to configure automatic closure of inactive sessions?\n\n(recommended)" 7 69
close_inac=$?
if [ $close_inac -eq 0 ]; then
dialog --msgbox "The configuration is done in 2 steps\n\nFirst, you need to define the time (in seconds) between the sending of 2 inactivity requests (example 300)\nThen, we define the maximum number of requests sent before automatic session closure (example 3)\n\nTaking these 2 examples, the connection would be terminated after 15 minutes (300*3)" 13 70
interval=$(dialog --inputbox "Please enter the maximum number of seconds between the sending of 2 inactivity requests (example 300)" 9 60 2>&1 1>/dev/tty)
nbrequest=$(dialog --inputbox "Please enter the maximum number of requests sent before session closure (example 3)" 9 60 2>&1 1>/dev/tty)
{
echo "# CLOSE INACTIVE SESSIONS"
echo "ClientAliveInterval $interval"
echo "ClientAliveCountMax $nbrequest"
echo " "
} >> /etc/ssh/sshd_config
fi
# SYSLOG FACILITY
dialog --yesno "Do you want to set SysLogFacility to AUTH?\n\nThis allows SSH messages to be logged appropriately." 7 60
facility_ornot=$?
if [ $facility_ornot -eq 0 ]; then
{
echo "# SYSLOG FACILITY"
echo "SyslogFacility AUTH"
echo " "
} >> /etc/ssh/sshd_config
fi
# LOG LEVEL
dialog --yesno "Do you want to set the logging level?" 5 42
level_ornot=$?
if [ $level_ornot -eq 0 ]; then
dialog --yesno "Do you want to set it to INFO for normal usage (Yes)\nor\nVERBOSE for more details (No)?" 7 57
info_verbose=$?
if [ $info_verbose -eq 0 ]; then
{
echo "# LOG LEVEL"
echo "LogLevel INFO"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# LOG LEVEL"
echo "LogLevel VERBOSE"
echo " "
} >> /etc/ssh/sshd_config
fi
fi
# DNS
dialog --yesno "Do you want to disable DNS resolution?\n\nThis speeds up SSH connections and reduces the possibility of DNS-based attacks." 8 70
dns_ornot=$?
if [ $dns_ornot -eq 0 ]; then
{
echo "# DNS"
echo "UseDNS no"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# DNS"
echo "UseDNS yes"
echo " "
} >> /etc/ssh/sshd_config
fi
# SFTP
dialog --yesno "Will you be using the SFTP protocol (FTP over SSH) for file exchange via SSH?" 6 66
sftp_ornot=$?
if [ $sftp_ornot -eq 0 ]; then
dialog --yesno "Do you want to use /usr/libexex/sftp-server (default choice) (Yes)\nor\ninternal-sftp (No)?" 7 70
which_sftp=$?
if [ $which_sftp -eq 0 ]; then
{
echo "# SFTP"
echo "Subsystem sftp /usr/libexec/sftp-server"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# SFTP"
echo "Subsystem sftp internal-sftp"
echo " "
} >> /etc/ssh/sshd_config
fi
fi
# MOTD
dialog --yesno "Do you want to disable the Message of the Day (Motd)?\n\n(recommended)" 7 58
motd_ornot=$?
if [ $motd_ornot -eq 0 ]; then
{
echo "# MOTD"
echo "PrintMotd no"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# MOTD"
echo "PrintMotd yes"
echo " "
} >> /etc/ssh/sshd_config
fi
# LAST LOG
dialog --yesno "Do you want to hide (Yes) or display (No) the message showing the date and time of the last login when a user logs in?\n\n(It is recommended to hide this information)" 8 70
hidelog_ornot=$?
if [ $hidelog_ornot -eq 0 ]; then
{
echo "# PRINT LAST LOG"
echo "PrintLastLog no"
echo " "
} >> /etc/ssh/sshd_config
else
{
echo "# PRINT LAST LOG"
echo "PrintLastLog yes"
echo " "
} >> /etc/ssh/sshd_config
fi
# USUAL
{
echo "# DISABLE HPN"
echo "HPNDisabled yes"
echo " "
} >> /etc/ssh/sshd_config
dialog --msgbox "The configuration is now completed" 5 39
else
dialog --msgbox "/etc/ssh/sshd_config is going to be opened in a text editor in order to let you configure SSH yourself\n\nDo what you need to do, then Exit and Save without changing the location of the file\n\nYou'll be asked to activate (or not) the configuration at the end" 11 69
pico /etc/ssh/sshd_config
# check if Port is commented or not
check=$(grep Port < /etc/ssh/sshd_config | grep "[0-9]" | grep -o '#' | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
# check if Port has been modified
check2=$(grep -o "Port 22" < /etc/ssh/sshd_config | sort | uniq | wc -l | tr -d ' ')
if [ ! "$check2" -eq 1 ]; then
# check if the NPF firewall has already been configured
if [ -e /etc/npf.conf ]; then
# check if NPF is running
check=$(npfctl show | grep -o "inactive" | sort | uniq | wc -l | tr -d ' ')
if [ ! "$check" -eq 1 ]; then
dialog --msgbox "The NPF firewall seems to be active\nYou also need to change the SSH port in the rules file to avoid being blocked when SSH is activated.\n\nThe NPF rules file will open\nMake the changes, exit, and save without changing the file location" 11 70
pico /etc/npf.conf
changePortNPF="1"
fi
fi
fi
fi
fi
dialog --yesno "Do you want to (re)start SSH?" 5 33
activate_ornot=$?
if [ $activate_ornot -eq 0 ]; then
service sshd restart > /dev/null 2>&1
sleep 1
check=$(service sshd status | grep -o "sshd is not running." | wc -l | tr -d)
if [ "$check" -eq 0 ]; then
dialog --msgbox "It seems that something went wrong, sshd did not start" 5 59
fi
if [ "$changePortNPF" -eq 1 ]; then
dialog --yesno "You have modified the SSH port, do you want to restart the firewall now?" 6 66
restart_npf=$?
if [ $restart_npf -eq 0 ]; then
service npf restart > /dev/null 2>&1
fi
fi
check=$(service sshd status | grep -o "sshd is running" | wc -l | tr -d ' ')
if [ "$check" -eq 1 ]; then
dialog --msgbox "SSH is running, Congratulations!" 5 36
fi
fi
SecurityMenu
}
# checked
FormatToNTFS () {
{
################################################
# STAGE 0 : CHECK FOR NECESSARY TOOLS
if [ ! -e /usr/pkg/sbin/mkntfs ]; then
checkInternetConnection
pkgin -y in fuse > /dev/null 2>&1
echo 20
pkgin -y in fuse-ntfs > /dev/null 2>&1
echo 40
pkgin -y in fuse-ntfs-3g > /dev/null 2>&1
echo 60
pkgin -y in libntfs > /dev/null 2>&1
echo 80
pkgin -y inntfsprogs > /dev/null 2>&1
echo 100
fi
} | dialog --gauge "Checking for necessary software..." 6 39
dialog --msgbox "If you have just inserted the USB device, then you can continue. Otherwise, please unplug it, wait a few seconds, then plug it back in, wait a few seconds, and then continue" 7 70
################################################
# STAGE 1 : DETECTION AND CHOICE OF THE DEVICE
# Create a temporary file
TMPFILE=$(mktemp)
# Generate the list of devices
dmesg | tail -5 | grep -o "sd[0-9]" | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No USB devices detected" 5 30
rm -f "$TMPFILE"
DiskMngmtMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the USB device to format\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
###################################################################################################################
# STAGE 2 : CHECK IF THE DEVICE IS ASSOCIATED TO A GEOMETRY AND IF THIS GEOMETRY IS ALREADY MOUNTED ON THE SYSTEM
# check if already mounted then format
if [ -n "$device" ]; then
# check if the selected device is already associated with a geometry
seekdkX=$(dmesg | tail -10 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | wc -l | tr -d ' ')
if [ "$seekdkX" -gt 0 ]; then
# get geom name (dkX)
getgeom=$(dmesg | tail -10 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq)
checkmounted=$(mount | grep -o "/dev/${getgeom}" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkmounted" -eq 1 ]; then
dialog --msgbox "The device is mounted, please unmount it first" 5 50
DiskMngmtMenu
fi
fi
{
###################
# STAGE 3 : FORMAT
# Destroy and Create a new GPT table
gpt destroy "$device" > /dev/null 2>&1
gpt create -f "$device" > /dev/null 2>&1
echo 10
# Create a partition of type windows
gpt add -t windows "$device" > /dev/null 2>&1
echo 20
# The operation is repeated a second time to accommodate the transition from MBR to GPT (again, it is needed sometimes)
gpt destroy "$device" > /dev/null 2>&1
gpt create -f "$device" > /dev/null 2>&1
echo 30
# Create a partition of type windows
gpt add -t windows "$device" > /dev/null 2>&1
echo 40
# Retrieve the created geometry:
geom=$(dmesg | tail -5 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | tr -d ' ')
# Create the filesystem:
mkntfs -f "/dev/$geom" > /dev/null 2>&1
echo 100
} | dialog --gauge "Formatting in progress..." 6 31
geom=$(dmesg | tail -5 | grep -o "dk[0-9]" | sort | uniq | tr -d ' ')
##############################################
# STAGE 4 : MOUNT THE NEWLY CREATED GEOMETRY
dialog --yesno "Do you want to mount the USB device to /media/$geom?" 5 56
mount_ornot=$?
if [ "$mount_ornot" -eq 0 ]; then
# Creating the mount point
mkdir -p /media/"$geom" > /dev/null 2>&1
# Mounting NTFS
env PERFUSE_BUFSIZE=135168 ntfs-3g /dev/"$geom" /media/"$geom" > /dev/null 2>&1
dialog --msgbox "Don't forget about permissions on /media/$geom" 5 51
fi
DiskMngmtMenu
fi
}
# checked
FormatToEXFAT () {
{
################################################
# STAGE 0 : CHECK FOR NECESSARY TOOLS
if [ ! -e /usr/pkg/sbin/mkexfatfs ]; then
checkInternetConnection
pkgin -y in fuse > /dev/null 2>&1
echo 20
pkgin -y in fuse-ntfs > /dev/null 2>&1
echo 40
pkgin -y in fuse-ntfs-3g > /dev/null 2>&1
echo 60
pkgin -y in libntfs > /dev/null 2>&1
echo 70
pkgin -y fuse-exfat > /dev/null 2>&1
echo 80
pkgin -y inntfsprogs > /dev/null 2>&1
echo 100
fi
} | dialog --gauge "Checking for necessary software..." 6 39
dialog --msgbox "If you have just inserted the USB device, then you can continue. Otherwise, please unplug it, wait a few seconds, then plug it back in, wait a few seconds, and then continue" 7 70
################################################
# STAGE 1 : DETECTION AND CHOICE OF THE DEVICE
# Create a temporary file
TMPFILE=$(mktemp)
# Generate the list of devices
dmesg | tail -5 | grep -o "sd[0-9]" | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No USB devices detected" 5 30
rm -f "$TMPFILE"
DiskMngmtMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the USB device to format\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
###################################################################################################################
# STAGE 2 : CHECK IF THE DEVICE IS ASSOCIATED TO A GEOMETRY AND IF THIS GEOMETRY IS ALREADY MOUNTED ON THE SYSTEM
# check if already mounted then format
if [ -n "$device" ]; then
# check if the selected device is already associated with a geometry
seekdkX=$(dmesg | tail -10 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | wc -l | tr -d ' ')
if [ "$seekdkX" -gt 0 ]; then
# get geom name (dkX)
getgeom=$(dmesg | tail -10 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq)
checkmounted=$(mount | grep -o "/dev/${getgeom}" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkmounted" -eq 1 ]; then
dialog --msgbox "The device is mounted, please unmount it first" 5 50
DiskMngmtMenu
fi
fi
{
###################
# STAGE 3 : FORMAT
# Destroy and Create a new GPT table
gpt destroy "$device" > /dev/null 2>&1
gpt create -f "$device" > /dev/null 2>&1
echo 10
# Create a partition of type windows
gpt add -t windows "$device" > /dev/null 2>&1
echo 20
# The operation is repeated a second time to accommodate the transition from MBR to GPT (again, it is needed sometimes)
gpt destroy "$device" > /dev/null 2>&1
gpt create -f "$device" > /dev/null 2>&1
echo 30
# Create a partition of type windows
gpt add -t windows "$device" > /dev/null 2>&1
echo 40
# Retrieve the created geometry:
geom=$(dmesg | tail -5 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | tr -d ' ')
# Create the filesystem:
/usr/pkg/sbin/mkexfatfs "/dev/$geom" > /dev/null 2>&1
echo 100
} | dialog --gauge "Formatting in progress..." 6 31
geom=$(dmesg | tail -5 | grep -o "dk[0-9]" | sort | uniq | tr -d ' ')
##############################################
# STAGE 4 : MOUNT THE NEWLY CREATED GEOMETRY
dialog --yesno "Do you want to mount the USB device to /media/$geom?" 5 56
mount_ornot=$?
if [ "$mount_ornot" -eq 0 ]; then
# Creating the mount point
mkdir -p /media/"$geom" > /dev/null 2>&1
# Mounting
env PERFUSE_BUFSIZE=135168 /usr/pkg/sbin/mount.exfat /dev/"$geom" /media/"$geom" > /dev/null 2>&1
#env PERFUSE_BUFSIZE=135168 ntfs-3g /dev/$geom /media/$geom > /dev/null 2>&1
dialog --yesno "Don't you want to give Read/Write permissions to a user on /media/$geom?" 6 60
rw_ornot=$?
if [ $rw_ornot -eq 0 ]; then
user=$(dialog --title "Read/Write Permissions" --inputbox "Please enter the username" 8 40 2>&1 1>/dev/tty)
/sbin/chown -R "$user" /media/"$geom"
chmod -R /media/"$geom"
else
dialog --msgbox "Don't forget about permissions on /media/$geom" 5 51
fi
fi
DiskMngmtMenu
fi
}
# checked
FormatToFFSv1 () {
dialog --yesno "FFSv1 is outdated and does not support storage devices > 1 TB. Do you want to continue?" 6 67
ffsv1_choix=$?
case $ffsv1_choix in
1)
DiskMngmtMenu
;;
esac
dialog --msgbox "If you have just inserted the USB device, then you can continue. Otherwise, please unplug it, wait a few seconds, then plug it back in, wait a few seconds, and then continue" 7 70
################################################
# STAGE 1 : DETECTION AND CHOICE OF THE DEVICE
# Create a temporary file
TMPFILE=$(mktemp)
# Generate the list of devices
dmesg | tail -5 | grep -o "sd[0-9]" | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No USB devices detected" 5 30
rm -f "$TMPFILE"
DiskMngmtMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the USB device to format\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
###################################################################################################################
# STAGE 2 : CHECK IF THE DEVICE IS ASSOCIATED TO A GEOMETRY AND IF THIS GEOMETRY IS ALREADY MOUNTED ON THE SYSTEM
# check if already mounted then format
if [ -n "$device" ]; then
# check if the selected device is already associated with a geometry
seekdkX=$(dmesg | tail -10 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | wc -l | tr -d ' ')
if [ "$seekdkX" -gt 0 ]; then
# get geom name (dkX)
getgeom=$(dmesg | tail -10 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq)
checkmounted=$(mount | grep -o "/dev/${getgeom}" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkmounted" -eq 1 ]; then
dialog --msgbox "The device is mounted, please unmount it first" 5 50
DiskMngmtMenu
fi
fi
{
###################
# STAGE 3 : FORMAT
# Destroy and Create a new GPT table
gpt destroy "$device" > /dev/null 2>&1
gpt create -f "$device" > /dev/null 2>&1
echo 10
# Destroy and Create a new GPT table again
gpt destroy "$device" > /dev/null 2>&1
gpt create -f "$device" > /dev/null 2>&1
echo 20
# Create a partition of type FFS
gpt add -t ffs "$device" > /dev/null 2>&1
echo 30
# Retrieve the created geometry:
geom=$(dmesg | tail -5 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | tr -d ' ')
# Create the filesystem:
newfs -O1 "$geom" > /dev/null 2>&1
echo 100
} | dialog --gauge "Formatting in progress..." 6 31
##############################################
# STAGE 4 : MOUNT THE NEWLY CREATED GEOMETRY
geom=$(dmesg | tail -5 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | tr -d ' ')
dialog --yesno "Do you want to mount the USB device to /media/$geom?" 5 56
mount_ornot=$?
if [ $mount_ornot -eq 0 ]; then
# Création du point de montage
mkdir -p /media/"$geom" > /dev/null 2>&1
# Montage
mount /dev/"$geom" /media/"$geom" > /dev/null 2>&1
dialog --yesno "Don't you want to give Read/Write permissions to a user on /media/$geom?" 6 60
rw_ornot=$?
if [ $rw_ornot -eq 0 ]; then
user=$(dialog --title "Read/Write Permissions" --inputbox "Please enter the username" 8 40 2>&1 1>/dev/tty)
/sbin/chown -R "$user" /media/"$geom"
chmod -R /media/"$geom"
else
dialog --msgbox "Don't forget about permissions on /media/$geom" 5 51
fi
fi
DiskMngmtMenu
fi
}
# checked
FormatToFFSv2 () {
dialog --msgbox "If you have just inserted the USB device, then you can continue. Otherwise, please unplug it, wait a few seconds, then plug it back in, wait a few seconds, and then continue" 7 70
################################################
# STAGE 1 : DETECTION AND CHOICE OF THE DEVICE
# Create a temporary file
TMPFILE=$(mktemp)
# Generate the list of devices
dmesg | tail -5 | grep -o "sd[0-9]" | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No USB devices detected" 5 30
rm -f "$TMPFILE"
DiskMngmtMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the USB device to format\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
###################################################################################################################
# STAGE 2 : CHECK IF THE DEVICE IS ASSOCIATED TO A GEOMETRY AND IF THIS GEOMETRY IS ALREADY MOUNTED ON THE SYSTEM
# check if already mounted then format
if [ -n "$device" ]; then
# check if the selected device is already associated with a geometry
seekdkX=$(dmesg | tail -10 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | wc -l | tr -d ' ')
if [ "$seekdkX" -gt 0 ]; then
# get geom name (dkX)
getgeom=$(dmesg | tail -10 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq)
checkmounted=$(mount | grep -o "/dev/${getgeom}" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkmounted" -eq 1 ]; then
dialog --msgbox "The device is mounted, please unmount it first" 5 50
DiskMngmtMenu
fi
fi
{
###################
# STAGE 3 : FORMAT
# Destroy and Create a new GPT table
gpt destroy "$device" > /dev/null 2>&1
gpt create -f "$device" > /dev/null 2>&1
echo 10
# Destroy and Create a new GPT table again
gpt destroy "$device" > /dev/null 2>&1
gpt create -f "$device" > /dev/null 2>&1
echo 20
# Create a partition of type FFS
gpt add -t ffs "$device" > /dev/null 2>&1
echo 30
# Retrieve the created geometry:
geom=$(dmesg | tail -5 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | tr -d ' ')
# Create the filesystem:
newfs -O2 "$geom" > /dev/null 2>&1
echo 100
} | dialog --gauge "Formatting in progress..." 6 30
##############################################
# STAGE 4 : MOUNT THE NEWLY CREATED GEOMETRY
geom=$(dmesg | tail -5 | grep "${device}" | grep -o "dk[0-9]" | sort | uniq | tr -d ' ')
dialog --yesno "Do you want to mount the USB device to /media/$geom?" 5 56
mount_ornot=$?
if [ "$mount_ornot" -eq 0 ]; then
# Création du point de montage
mkdir -p /media/"$geom" > /dev/null 2>&1
# Montage
mount /dev/"$geom" /media/"$geom" > /dev/null 2>&1
dialog --yesno "Don't you want to give Read/Write permissions to a user on /media/$geom?" 6 60
rw_ornot=$?
if [ "$rw_ornot" -eq 0 ]; then
user=$(dialog --title "Read/Write Permissions" --inputbox "Please enter the username" 8 40 2>&1 1>/dev/tty)
/sbin/chown -R "$user" /media/"$geom"
chmod -R /media/"$geom"
else
dialog --msgbox "Don't forget about permissions on /media/$geom" 5 51
fi
fi
DiskMngmtMenu
fi
}
# checked
mountUSB () {
dialog --msgbox "If you have just inserted the USB device, then you can continue. Otherwise, please unplug it, wait a few seconds, then plug it back in, wait a few seconds, and then continue" 7 70
count=$(dmesg | tail -5 | grep -o ntfs | wc -l | tr -d " ")
if [ "$count" -gt 0 ]; then
device=$(dmesg | tail -5 | grep "ntfs" | grep -o "dk[0-9]" | sort | uniq)
checkmounted=$(mount | grep -o "/dev/$device" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkmounted" -eq 1 ]; then
dialog --msgbox "Device already mounted on /dev/$dkX" 5 41
else
if [ -n "$device" ]; then
# if NTFS
env PERFUSE_BUFSIZE=135168 ntfs-3g /dev/"$device" /media/"$device"
# if ExFAT :
env PERFUSE_BUFSIZE=135168 /usr/pkg/sbin/mount.exfat /dev/"$device" /media/"$device"
else
dialog --msgbox "No NTFS-associated device dkX found." 5 40
fi
fi
else
dkX=$(dmesg | tail -10 | grep -o "dk[0-9]")
checkdkX=$(dmesg | tail -10 | grep -o "dk[0-9]" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkdkX" -eq 0 ]; then
dialog --msgbox "Device not detected" 5 23
DiskMngmtMenu
fi
checkmounted=$(mount | grep -o "/dev/$dkX" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkmounted" -eq 1 ]; then
dialog --msgbox "Device already mounted on /dev/$dkX" 5 41
DiskMngmtMenu
else
mount /dev/"$dkX" /media/"$dkX"
fi
fi
dialog --yesno "Don't you want to give Read/Write permissions to a user on /media/$device?" 6 60
rw_ornot=$?
if [ "$rw_ornot" -eq 0 ]; then
user=$(dialog --title "Read/Write Permissions" --inputbox "Please enter the username" 8 40 2>&1 1>/dev/tty)
/sbin/chown -R "$user" /media/"$dkX"
chmod -R /media/"$dkX"
else
dialog --msgbox "Don't forget about permissions on /media/$dkX" 5 51
fi
DiskMngmtMenu
}
# checked
umountUSB () {
# Create a temporary file
TMPFILE=$(mktemp)
# Generate the list of devices
mount | grep media | grep -o "dk[0-9]" | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No mounted USB devices detected" 5 35
rm -f "$TMPFILE"
DiskMngmtMenu
return
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the USB device to unmount\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
# Unmount the selected device
if [ -n "$device" ]; then
umount -f "/media/$device" || dialog --msgbox "Error unmounting /media/$device" 5 33
fi
# Return to disk management menu
DiskMngmtMenu
}
# checked
BurnISOtoUSB () {
dialog --msgbox "If you have just inserted the USB device, then you can continue. Otherwise, please unplug it, wait a few seconds, then plug it back in, wait a few seconds, and then continue" 7 70
# Verifications
seekdkX=$(dmesg | tail -10 | grep "sd[0-9]" | grep -o "dk[0-9]" | sort | uniq)
for each in $seekdkX; do
checkmounted=$(mount | grep -o "/dev/$each" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkmounted" -eq 1 ]; then
dialog --msgbox "The device is mounted, please unmount it first" 5 50
DiskMngmtMenu
fi
done
# Create a temporary file
TMPFILE=$(mktemp)
# Generate the list of devices
sysctl hw.disknames | grep -o "sd[0-9]" | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No USB devices detected" 5 32
rm -f "$TMPFILE"
DiskMngmtMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the USB device to burn ISO\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
# Burn the .iso image
if [ -n "$device" ]; then
isoFile=$(dialog --title "ISO file" --inputbox "Please enter the absolute path of your .iso file" 9 54 2>&1 1>/dev/tty)
{
dd if="$isoFile" of=/dev/"$device" bs=8m msgfmt=human
} | dialog --gauge "Writing in progress..." 6 26
fi
# Return to disk management menu
DiskMngmtMenu
}
# checked
BurnISOtoCD () {
checkInternetConnection
{
pkgin -y in cdrtools > /dev/null 2>&1
echo 100
} | dialog --gauge "Checking for necessary software..." 6 39
# Create a temporary file
TMPFILE=$(mktemp)
# Generate the list of devices
# grep -v "*" is not a glob ! It's necessary to keep only the bus actually connected
cdrecord --scanbus | grep "[0-9],[0-9],[0-9]" | sed "/\*/d" | grep -o "[0-9],[0-9],[0-9]" | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No burner detected..." 5 32
rm -f "$TMPFILE"
DiskMngmtMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the burner\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
# Burn the .iso image
if [ -n "$device" ]; then
isoFile=$(dialog --title "ISO file" --inputbox "Please enter the absolute path of your .iso file" 9 54 2>&1 1>/dev/tty)
if [ ! -e "${isoFile}" ]; then
dialog --msgbox "File does not exist" 5 23
DiskMngmtMenu
fi
{
cdrecord dev="${device}" -v "${isoFile}" > /dev/null 2>&1
echo 100
} | dialog --gauge "Writing in progress..." 6 26
TMPFILE=$(mktemp)
dialog --yesno "Do you want to verify if the burning was done correctly?" 5 61
burn_ok=$?
if [ "$burn_ok" -eq 0 ]; then
readcd dev="${device}" f=/tmp/diskburnedTMP.iso > /dev/null 2>&1
sleep 1
check=$(cmp "${isoFile}" /tmp/diskburnedTMP.iso | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
dialog --msgbox "The burning process was successful" 5 38
rm /tmp/diskburnedTMP.iso
fi
fi
fi
# Return to disk management menu
DiskMngmtMenu
}
# checked
SecurelyErase () {
dialog --msgbox "If you have just inserted the USB device, then you can continue. Otherwise, please unplug it, wait a few seconds, then plug it back in, wait a few seconds, and then continue" 7 70
# Verifications
seekdkX=$(dmesg | tail -10 | grep "sd[0-9]" | grep -o "dk[0-9]" | sort | uniq)
for each in $seekdkX; do
checkmounted=$(mount | grep -o "/dev/$each" | sort | uniq | wc -l | tr -d ' ')
if [ "$checkmounted" -eq 1 ]; then
dialog --msgbox "The device is mounted, please unmount it first" 5 50
DiskMngmtMenu
fi
done
# Create a temporary file
TMPFILE=$(mktemp)
# Generate the list of devices
sysctl hw.disknames | grep -o "sd[0-9]" | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No USB devices detected" 5 32
rm -f "$TMPFILE"
DiskMngmtMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the USB device to burn ISO\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
# Erase the device
if [ -n "$device" ]; then
{
dd if=/dev/zero of=/dev/"$device" bs=8m msgfmt=human
echo 100
} | dialog --gauge "Erasing in progress..." 6 26
fi
# Return to disk management menu
DiskMngmtMenu
}
# checked
RestartDHCP () {
service dhcpcd restart > /dev/null 2>&1
NetworkMenu
}
# checked
SwitchToWifi () {
# Create a temporary file
TMPFILE=$(mktemp)
# Get NICs
netstat -i | cut -d' ' -f1 | grep -v "Name" | grep -v "lo0" | grep -v "npflo" | tr -d '*' | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No NIC detected" 5 30
rm -f "$TMPFILE"
NetworkMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the Wifi NIC please\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
# choice of the user :
#echo $device
{
# Enabling dhcpcd at startup
check=$(grep -o 'dhcpcd=' < /etc/rc.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 1 ]; then
sed -i 's/dhcpcd=NO/dhcpcd=YES/' /etc/rc.conf
sed -i 's/#dhcpcd=YES/dhcpcd=YES/' /etc/rc.conf
sed -i 's/#dhcpcd=NO/dhcpcd=YES/' /etc/rc.conf
else
echo dhcpcd=YES >> /etc/rc.conf
fi
echo 16
# Setting up wifi NIC flags for dhcpcd
FILE="/etc/rc.conf"
# Check if the dhcpcd_flags entry exists and contains "-qM wm0" but not "${device}"
if grep -q "^dhcpcd_flags=.*-qM wm0" "$FILE" && ! grep -q "^dhcpcd_flags=.*${device}" "$FILE"; then
# Use sed to add wifi NIC after "-qM wm0"
sed -i'' -e "/^dhcpcd_flags=.*-qM wm0/s/-qM wm0/& ${device}/" "$FILE"
fi
# Restart dhcpcd
service dhcpcd restart > /dev/null 2>&1
echo 32
# Change the WAN interface in the firewall rules file
FILE="/etc/npf.conf"
# Replace "wm0" with the wifi NIC in specific lines
if [ -f "$FILE" ]; then
sed -i'' -e "/^\$WAN_if = \"wm0\"/s/wm0/${device}/" -e "/^\$WAN_addrs = ifaddrs(wm0)/s/wm0/${device}/" "$FILE"
# Restart the firewall
service npf restart > /dev/null 2>&1
fi
echo 48
# Activation of wifi NIC at startup
check=$(grep -o "ifconfig_${device}=" < /etc/rc.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 1 ]; then
sed -i "s/ifconfig_${device}=\"down\"/ifconfig_${device}=\"up\"/" /etc/rc.conf
sed -i "s/#ifconfig_${device}=\"up\"/ifconfig_${device}=\"up\"/" /etc/rc.conf
sed -i "s/#ifconfig_${device}=\"down\"/ifconfig_${device}=\"up\"/" /etc/rc.conf
else
echo "ifconfig_${device}=\"up\"" >> /etc/rc.conf
fi
# Starting the wifi NIC interface
ifconfig "${device}" up > /dev/null 2>&1
sleep 3
echo 64
# Activation of wpa_supplicant at startup
check=$(grep -o 'wpa_supplicant=' < /etc/rc.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 1 ]; then
sed -i 's/wpa_supplicant=NO/wpa_supplicant=YES/' /etc/rc.conf
sed -i 's/#wpa_supplicant=YES/wpa_supplicant=YES/' /etc/rc.conf
sed -i 's/#wpa_supplicant=NO/wpa_supplicant=YES/' /etc/rc.conf
else
echo "wpa_supplicant=YES" >> /etc/rc.conf
fi
echo 80
# Starting wpa_supplicant
service wpa_supplicant restart > /dev/null 2>&1
sleep 3
echo 100
} | dialog --gauge "Enabling Wifi..." 6 21 0
dialog --msgbox "Wifi Enabled" 5 16
NetworkMenu
}
ConnectWifi () {
check=$(service wpa_supplicant status| grep -o 'wpa_supplicant is running' | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
dialog --yesno "WPA supplicant is not running\n\nWould you like to go to 'Switch from Ethernet to Wifi' function (Yes)\nor\nJust activate WPA temporary and do what you want? (No)" 10 70
switch_ornot=$?
if [ $switch_ornot -eq 0 ]; then
SwitchToWifi
else
service wpa_supplicant onestart > /dev/null 2>&1
fi
fi
{
# Network scan
wpa_cli scan
sleep 3
echo 20
sleep 3
echo 40
sleep 3
echo 60
sleep 2
echo 80
wpa_cli scan_results > /tmp/EvnpinvAvpininZ8.tmp
sed '1,2d' < /tmp/EvnpinvAvpininZ8.tmp | sed 's/.\{26\}//' | sed 's/.*]//' | sed '/^[[:space:]]*$/d' | sed 's/^[[:space:]]//' > /tmp/Ev2npinvAvpininZ8.tmp
sleep 1
echo 100
} | dialog --gauge "Scan in progress..." 6 24 0
# Nom du fichier contenant les SSID
SSID_FILE="/tmp/Ev2npinvAvpininZ8.tmp"
# Build the options array for the dialog box
DIALOG_OPTS=""
while read -r ssid; do
DIALOG_OPTS="$DIALOG_OPTS ${ssid} ''"
done < "$SSID_FILE"
# Display the dialog box to choose the WiFi network
chosen_ssid=$(dialog --backtitle "Detected WiFi Networks" --title "List" --menu "Choose a WiFi network:" 0 0 0 "$DIALOG_OPTS" 3>&1 1>&2 2>&3)
ssid=$(grep "$chosen_ssid" < /tmp/EvnpinvAvpininZ8.tmp)
# Check the security type
check=$(echo "$ssid" | grep -o "PSK" | wc -l | tr -d ' ')
if [ "$check" -gt 0 ]; then
password=$(dialog --title 'Enter Password' --inputbox "Please enter the password" 8 35 2>&1 1>/dev/tty)
{
echo " "
echo "network={"
echo " ssid=\"$chosen_ssid\""
echo " psk=\"$password\""
echo " proto=RSN"
echo " key_mgmt=WPA-PSK"
echo " pairwise=CCMP"
echo "}"
} >> /etc/wpa_supplicant.conf
fi
# Reload wpa_supplicant
service wpa_supplicant reload > /dev/null 2>&1
# Restart the dhcpd service
service dhcpcd restart > /dev/null 2>&1
# Remove configuration files:
rm /tmp/EvnpinvAvpininZ8.tmp
rm /tmp/Ev2npinvAvpininZ8.tmp
NetworkMenu
}
# checked
SwitchToEthernet () {
# Create a temporary file
TMPFILE=$(mktemp)
# Get NICs
netstat -i | cut -d' ' -f1 | grep -v "Name" | grep -v "lo0" | grep -v "npflo" | tr -d '*' | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No NIC detected" 5 30
rm -f "$TMPFILE"
NetworkMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the Ethernet NIC please\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
# choice of the user :
#echo $device
# Create a temporary file
TMPFILE=$(mktemp)
# Get NICs
netstat -i | cut -d' ' -f1 | grep -v "Name" | grep -v "lo0" | grep -v "npflo" | tr -d '*' | sort | uniq > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No NIC detected" 5 30
rm -f "$TMPFILE"
NetworkMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
wifiNIC=$(eval "dialog --radiolist \"Choose the Wifi NIC please\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
{
# Stop the wpa_supplicant service:
service wpa_supplicant stop > /dev/null 2>&1
sleep 2
# Disable wpa_supplicant at startup
check=$(grep -o 'wpa_supplicant=' < /etc/rc.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 1 ]; then
service wpa_supplicant stop > /dev/null 2>&1
sed -i '/wpa_supplicant=YES/d' /etc/rc.conf
fi
echo 25
# Turn off the wifi card:
ifconfig "$wifiNIC" down > /dev/null 2>&1
# Stop and Disable ${wifiNIC} at startup
check=$(grep -o "ifconfig_${wifiNIC}=" < /etc/rc.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 1 ]; then
ifconfig "${wifiNIC}" down > /dev/null 2>&1
sed -i "/ifconfig_${wifiNIC}=\"up\"/d" /etc/rc.conf
fi
sleep 2
echo 50
# Change the WAN interface in the firewall rules file:
FILE="/etc/npf.conf"
# Replace "${wifiNIC}" with "${device}" in specific lines
if [ -f "$FILE" ]; then
sed -i'' -e "/^\$WAN_if = \"${wifiNIC}\"/s/${wifiNIC}/${device}/" -e "/^\$WAN_addrs = ifaddrs(${wifiNIC})/s/${wifiNIC}/${device}/" "$FILE"
# Restart the firewall
service npf restart > /dev/null 2>&1
fi
echo 75
# Remove the wifi card flags from dhcpcd_flags
FILE="/etc/rc.conf"
# Check if the dhcpcd_flags entry exists and contains "${wifiNIC}"
if grep -q "^dhcpcd_flags=.*${wifiNIC}" "$FILE"; then
# Use sed to remove "${wifiNIC}" from dhcpcd_flags
sed -i'' -e "/^dhcpcd_flags=/s/ ${wifiNIC}//" "$FILE"
fi
# Restart dhcpcd
service dhcpcd restart > /dev/null 2>&1
echo 100
} | dialog --gauge "Disabling Wifi..." 6 22 0
dialog --msgbox "Wifi Disabled" 5 18
NetworkMenu
}
# checked
getentPasswd () {
# Display the contents of the /etc/passwd file in a dialog screen
dialog --backtitle "Contents of the /etc/passwd file" --title "Users" --textbox /etc/passwd 0 0
# Call UsersRightsMenu after dialog closes
UsersRightsMenu
}
# checked
CreateUser () {
# Dialog to get the username
user=$(dialog --title ' Create a User' --inputbox "Please enter the username" 8 43 2>&1 1>/dev/tty)
# Verification:
countus=$(getent passwd "$user" | cut -d: -f1)
case $countus in
"$user")
dialog --backtitle "User Exists!" \
--title ' Result' \
--msgbox "The user exists" 5 24
UsersRightsMenu
;;
esac
# Dialog to ask if a home directory should be created
dialog --yesno "Do you want to create a home directory for the user" 5 56
create_home=$?
if [ "$create_home" -eq 0 ]; then
dialog --yesno "/home/$user ?" 5 50
homestandard=$?
if [ "$homestandard" -eq 1 ]; then
perso=$(dialog --title "Custom Location" --inputbox "Please enter the absolute path of the desired base directory. (example: /export/home/$user)" 9 70 2>&1 1>/dev/tty)
mkdir -p "${perso}"
useradd_options="-md ${perso}"
fi
if [ "$homestandard" -eq 0 ]; then
useradd_options="-md /home/$user"
fi
fi
# Dialog to ask if the user should be allowed to log in
dialog --yesno "Do you want to allow login on this system" 5 46
login_shell=$?
# Dialog to ask for the maximum password validity period
password_expire=$(dialog --title "Password Expiration" --inputbox "Please enter the maximum password validity period (in days)" 9 64 2>&1 1>/dev/tty)
# Dialog to ask for the groups the user should be added to
groups=$(dialog --title "User Groups" --inputbox "Please enter the groups separated by commas to which the user should be added" 9 70 2>&1 1>/dev/tty)
pass=$(dialog --title "Password" --inputbox "Please enter a password" 8 30 2>&1 1>/dev/tty)
dialog --yesno "Do you want to allow the user to change password on first login?" 6 68
changeAtlogon=$?
# Creating the options string:
if [ "$login_shell" -eq 1 ]; then
useradd_options="${useradd_options} -s /sbin/nologin" # Disable login if not allowed
fi
if [ "$password_expire" ]; then
useradd_options="${useradd_options} -f $password_expire" # Maximum password validity period
fi
# Adding the user to the specified groups
count=$(echo "$groups" | grep -o ',' | wc -c | tr -d ' ')
if [ "$count" -eq 0 ]; then
useradd_options="${useradd_options} -G $groups"
fi
i=1
while [ $i -le "$count" ]; do
grouptoadd=$(echo "$groups" | cut -d',' -f$i)
useradd_options="${useradd_options} -G $grouptoadd"
i=$((i+1))
done
if [ "$pass" ]; then
useradd_options="${useradd_options} -p ${pass}"
fi
if [ "$changeAtlogon" -eq 0 ]; then
useradd_options="${useradd_options} -F"
fi
# Creating the user with the chosen options
useradd "$useradd_options" "$user"
passwd "${user}"
dialog --backtitle "User Created!" \
--title ' Result' \
--msgbox "The user has been successfully created" 5 42
UsersRightsMenu
}
# checked
DeleteUser () {
# Get the list of system users excluding specified users
users=$(getent passwd | cut -d: -f1 | grep -Ev 'root|toor|daemon|operator|wheel|bin|games|postfix|named|ntpd|sshd|_pflogd|_proxy|_timedc|_sdpd|_httpd|_mdnsd|_rwhod|_tests|_tcpdump|_tss|_rtadvd|_unbound|_nsd|_dhcpcd|uucp|nobody|dbus|polkitd')
# Check if the list of users is empty
if [ -z "$users" ]; then
dialog --backtitle "Remove a User" \
--title "No Users Available" \
--msgbox "No users to remove." 8 50
return
fi
# Initialize an empty string to store dialog options
dialog_options=""
# Loop through the list of users
for user in $users; do
# Get the user's ID
uid=$(id -u "$user")
# Check if the user's ID was successfully retrieved
if [ -z "$uid" ]; then
echo "Error: Unable to find user ID for $user"
continue
fi
# Build each option and add it to the dialog options string
dialog_options="$dialog_options $user $uid off"
done
# Display the checkbox dialog to select users for deletion
selected_users=$(dialog --backtitle "Remove a User" \
--title "Choose whom to remove" \
--checklist "Use space bar. Choose only one user if you want to archive the home folder. To remove all, select as many users as necessary:" \
20 60 10 \
"$dialog_options" \
2>&1 >/dev/tty)
# Check if users have been selected
if [ -n "$selected_users" ]; then
# Ask if the home directory should also be removed
dialog --yesno "Do you also want to remove the home directory of the selected user?" 6 65
remove_home=$?
# Remove the selected users
for user in $selected_users; do
if [ $remove_home -eq 0 ]; then
# Remove the user and their home directory
userdel -r "$user"
else
dialog --yesno "Do you want to archive the home directory of the selected user?" 6 65
compress_home=$?
if [ $compress_home -eq 0 ]; then
# Get the user's home directory
user_home=$(getent passwd "$user" | cut -d: -f6)
# Check if the directory exists
if [ -d "$user_home" ]; then
# Archive and compress the directory
tar cf - "$user_home" | xz > "${user_home}.tar.xz"
userdel -r "$user"
else
dialog --backtitle "Directory Not Found!" \
--title 'Directory Not Found' \
--msgbox "The home directory does not exist." 5 38
fi
else
userdel "$user"
fi
fi
done
fi
dialog --backtitle "User(s) Removed!" \
--title ' Result' \
--msgbox "Deletion Successful" 5 23
UsersRightsMenu
}
# checked
getentGroup () {
# Display the contents of the /etc/group file in a dialog box
dialog --backtitle "Contents of /etc/group file" --title "Groups" --textbox /etc/group 0 0
# Call UsersRightsMenu after dialog is closed
UsersRightsMenu
}
# checked
CreateGroup () {
groupName=$(dialog --title " Add a Group" --inputbox "Please enter the group name" 8 34 2>&1 1>/dev/tty)
countus=$(getent group "$groupName" | cut -d: -f1)
case $countus in
"$groupName")
dialog --backtitle "Group Exists!" \
--title " Result" \
--msgbox "Group Exists" 5 17
;;
*)
groupadd "$groupName" 2>/dev/null
countus2=$(getent group "$groupName" | cut -d: -f1)
case $countus2 in
"$groupName")
dialog --backtitle "Group Created" \
--title " Result" \
--msgbox "The group has been successfully created" 5 43
;;
*)
dialog --backtitle "Error" \
--title " Result" \
--msgbox "Error creating the group" 5 29
esac
;;
esac
UsersRightsMenu
}
CheckGroupExists () {
groupName=$(dialog --title " Check Group Existence" --inputbox "Please enter the group name" 8 37 2>&1 1>/dev/tty)
countus=$(getent group "$groupName" | cut -d: -f1)
case $countus in
"$groupName")
dialog --backtitle "Group Exists!" \
--title " Result" \
--msgbox "Group Exists" 5 17
;;
*)
dialog --backtitle "Group Not Found!" \
--title " Result" \
--msgbox "Group Not Found" 5 20
;;
esac
UsersRightsMenu
}
# checked
DeleteGroup () {
groupName=$(dialog --title " Delete a group" --inputbox "Please enter the group name" 8 37 2>&1 1>/dev/tty)
countus=$(getent group "$groupName" | cut -d: -f1)
case $countus in
"$groupName")
groupdel "$groupName" 2>/dev/null
countus=$(getent group "$groupName" | cut -d: -f1)
case $countus in
"$groupName")
dialog --backtitle "Error!" \
--title " Result" \
--msgbox "Group not deleted" 5 21
;;
*)
dialog --backtitle "Group Deleted!" \
--title " Result" \
--msgbox "Group Deleted" 5 17
;;
esac
;;
*)
dialog --backtitle "Group Not Found!" \
--title " Result" \
--msgbox "Group Not Found" 5 19
;;
esac
UsersRightsMenu
}
AddToGroup () {
# Dialogue to get the username
user=$(dialog --title "Check User Existence" --inputbox "Please enter the username" 8 30 2>&1 1>/dev/tty)
countus=$(getent passwd "$user" | cut -d: -f1)
case $countus in
"$user")
group=$(dialog --title "Check Group Existence" --inputbox "Please enter the group name" 8 32 2>&1 1>/dev/tty)
countus2=$(getent group "$group" | cut -d: -f1)
case $countus2 in
"$group")
usermod -G "$group" "$user"
countus3=$(groups "$user" | grep -o "$group")
case $countus3 in
"$group")
dialog --backtitle "User Added" \
--title ' Result' \
--msgbox "User added" 5 15
;;
*)
dialog --backtitle "Error" \
--title ' Result' \
--msgbox "User not added" 5 19
UsersRightMenu
;;
esac
;;
*)
dialog --backtitle "Group Not Found!" \
--title ' Result' \
--msgbox "The group does not exist" 5 29
UsersRightsMenu
;;
esac
;;
*)
dialog --backtitle "User Not Found!" \
--title ' Result' \
--msgbox "The user does not exist" 5 28
UsersRightsMenu
;;
esac
UsersRightsMenu
}
# checked
LeaveGroup () {
dialog --backtitle "Modify /etc/group" \
--title ' Modify /etc/group' \
--msgbox "The /etc/group file will open. Please locate the line starting with the group name, then remove your username and any extra comma, then exit (ctrl+x) and save (Y) in /etc/group" 7 70
pico /etc/group
UsersRightsMenu
}
# checked
ovpnVPN () {
checkInternetConnection
openVPNinstallation () {
clear
echo "--------------------------------------------------"
echo "Installation in progress, please wait ..."
echo " "
pkgin -y in wget
pkgin -y in curl
pkgin -y in openvpn
pkgin -y in unzip
clear
echo "--------------------------------------------------"
echo "Do you want to require the server to connect to the VPN upon startup? [y],"
echo "Or do you prefer to decide when to connect it yourself? [n]"
read -r ansou
case $ansou in
y|Y)
echo openvpn=YES
;;
n|N)
;;
esac
}
startovpnconnection () {
clear
echo "--------------------------------------------------"
echo "Connection is starting, please wait..."
openvpn --config /usr/pkg/etc/openvpn/ovpn.conf --daemon
sleep 10
echo " "
echo "--------------------------------------------------"
echo "Do you want to check if the connection was successful ? [y/n]"
read -r ansverif
case $ansverif in
y|Y)
echo " "
echo "--------------------------------------------------"
echo "if success:true happens, you're connected:"
echo " "
curl https://www.ovpn.com/v2/api/client/ptr
sleep 5
return
;;
n|N)
;;
esac
}
addOVPNcredentials () {
echo ""
echo "--------------------------------------------------"
echo "Please enter your OVPN login:"
read -r nameu
echo "$nameu" >> /usr/pkg/etc/openvpn/credentials
echo ""
echo "--------------------------------------------------"
echo "Please enter your OVPN password:"
read -r mtpu
echo "$mtpu" >> /usr/pkg/etc/openvpn/credentials
}
OVPNconfiguration () {
# All the OVPN servers around the world
places="at-vienna at-vienna-tcp au-sydney au-sidney-tcp ca-toronto ca-toronto-tcp dk-copenhagen dk-copenhagen-tcp fi-helsinki fi-helsinki-tcp fr-paris fr-paris-tcp de-erfurt de-erfurt-tcp de-frankfurt de-frankfurt-tcp de-offenbach de-offenbach-tcp it-milan it-milan-tcp jp-tokyo jp-tokyo-tcp nl-amsterdam nl-amsterdam-tcp no-oslo no-oslo-tcp pl-warsaw pl-warsaw-tcp ro-bucharest ro-bucharest-tcp sg-singapore sg-singapore-tcp es-madrid es-madrid-tcp se-gothenburg se-gothenburg-tcp se-malmo se-malmo-tcp se-stockholm se-stockholm-tcp se-sundsvall se-sundsvall-tcp ch-zurich ch-zurich-tcp gb-london gb-london-tcp us-atlanta us-atlanta-tcp us-chicago us-chicago-tcp us-dallas us-dallas-tcp us-denver us-denver-tcp us-losangeles us-losangeles-tcp us-miami us-miami-tcp us-newyork us-newyork-tcp us-seattle us-seattle-tcp ua-kyiv ua-kyiv-tcp"
clear
echo "---------------------------------------"
echo "# Here is the list of available places"
echo "# (tcp not written = udp)"
echo ""
i=1
for place in $places; do
echo "$i - $place"
i=$((i + 1))
done
echo ""
echo "Please choose a place by its number:"
read -r choice
i=1
for place in $places; do
if [ "$i" -eq "$choice" ]; then
# Download file configuration from ovpn and install it
wget https://files.ovpn.com/freebsd/ovpn-"${place}".zip -P /tmp
#cd /tmp ; unzip ovpn-"${place}".zip
unzip /tmp/ovpn-"${place}".zip -d /tmp/
rm -r /usr/pkg/etc/openvpn
mkdir -p /usr/pkg/etc/openvpn
touch /usr/pkg/etc/openvpn/update-resolv-conf
mv /tmp/config/* /usr/pkg/etc/openvpn/
chmod +x /usr/pkg/etc/openvpn/update-resolv-conf
rm -rf /tmp/config
rm -f /tmp/ovpn-"${place}".zip
# Adapt file configuration to NetBSD
sed -i'' "s/\/usr\/local/\/usr\/pkg/" /usr/pkg/etc/openvpn/ovpn.conf
sleep 1
sed -i "/^log/d" /usr/pkg/etc/openvpn/ovpn.conf
sleep 1
echo "" >> /usr/pkg/etc/openvpn/ovpn.conf
echo "log /var/log/openvpn.log" >> /usr/pkg/etc/openvpn/ovpn.conf
# Add OVPN credentials
addOVPNcredentials
# Start OVPN or not
clear
echo "--------------------------------------------------"
echo "Do you want to connect to OVPN now ? [y/n]"
read -r answno
case $answno in
y|Y)
startovpnconnection
;;
n|N)
;;
esac
fi
i=$((i + 1))
done
}
i=0
while [ $i -lt 5 ]; do
clear
echo "--------------------------------------------------"
echo "What do you want to do ?"
echo ""
echo " - connect to the VPN [c],"
echo " - disconnect from the VPN [d],"
echo " - proceed with the configuration? [p]"
echo ""
echo "--------------------------------------------------"
echo "Please enter the letter:"
read -r cinst
case $cinst in
c|C)
startovpnconnection
i=$((i+6))
;;
d|D)
pkill openvpn
i=$((i+6))
;;
p|P)
openVPNinstallation
OVPNconfiguration
i=$((i+6))
;;
*)
echo "--------------------------------------------------"
echo "I didn't understand your choice."
echo "Please enter only c/d/p"
sleep 3
i=$((i+1))
;;
esac
done
MainMenu
}
installClamAV () {
checkInternetConnection
{
pkgin -y in clamav clamav-doc
pkgin -y in rsync
cp /usr/pkg/share/examples/rc.d/* /etc/rc.d/
check=$(grep -o "freshclamd=YES" < /etc/rc.conf | wc -l | tr -d ' ' )
if [ "$check" -eq 0 ]; then
echo freshclamd=YES >> /etc/rc.conf
fi
service freshclamd start > /dev/null 2>&1
mkdir -p /var/db/clamav/quarantine > /dev/null 2>&1
chown clamav:clamav /var/db/clamav/quarantine > /dev/null 2>&1
############
# Optimize threat detection configuration:
# Remove settings from previous installation:
FILE="/usr/pkg/etc/clamd.conf"
PATTERN="# OPTIMIZED CONFIGURATION"
# Check if file and string exist
if [ -f "$FILE" ] && grep -q "$PATTERN" "$FILE"; then
# Remove all lines from the string onwards
sed -i'' "/$PATTERN/,\$d" "$FILE"
fi
{
echo " "
echo "# OPTIMIZED CONFIGURATION"
echo "DetectPUA yes"
echo "ExcludePUA PUA.Win.Packer"
echo "ExcludePUA PUA.Win.Trojan.Packed"
echo "ExcludePUA PUA.Win.Packer.Upx"
echo "ExcludePUA PUA.Doc.Packed"
echo "MaxScanTime 120000"
echo "MaxScanSize 20480M"
echo "MaxRecursion 30"
echo "MaxFiles 15000"
echo "MaxEmbeddedPE 2048M"
echo "MaxHTMLNormalize 2048M"
echo "MaxHTMLNoTags 2048M"
echo "MaxScriptNormalize 2048M"
echo "MaxZipTypeRcg 50M"
echo "PCREMaxFileSize 2048M"
} >> /usr/pkg/etc/clamd.conf
} | dialog --gauge "Installation and optimization in progress..." 6 50 0
dialog --yesno "Would you like to set up the security bases from securiteinfo.com? You must have a paid subscription. Please create a file /tmp/dbsecuriteinfo.tmp containing the blocks 'DatabaseCustomURL https://...' provided in your customer area on the securiteinfo.com website, or copy/paste them into the text file that will open during verification. You can rerun the ClamAV installation script later to add your URLs when you have them" 12 65
create_securinfo=$?
if [ $create_securinfo -eq 0 ]; then
# Add the securiteinfo.com download URLs to freshclam
# Remove settings from a previous installation:
FILE="/usr/pkg/etc/freshclam.conf"
PATTERN="# SECURITEINFO.COM BASES"
# Check if the file and string exist
if [ -f "$FILE" ] && grep -q "$PATTERN" "$FILE"; then
# Remove all lines from the string onwards
sed -i'' "/$PATTERN/,\$d" "$FILE"
fi
dialog --msgbox "The text file will open, please make sure to place one 'DatabaseCustomUrl https://...' group per line.\nThen exit and save without changing the file location" 7 60
pico /tmp/dbsecuriteinfo.tmp
{
echo ""
echo "# SECURITEINFO.COM BASES"
} >> /usr/pkg/etc/freshclam.conf
cat /tmp/dbsecuriteinfo.tmp >> /usr/pkg/etc/freshclam.conf
service freshclamd restart > /dev/null 2>&1
freshclam > /dev/null 2>&1
fi
dialog --yesno "Would you like to set up the security bases from SaneSecurity?" 5 67
create_sanesecu=$?
if [ $create_sanesecu -eq 0 ]; then
# Direct download of the bases
if [ ! -e /usr/pkg/bin/rsync ]; then
pkgin -y in rsync
fi
rsync rsync://rsync.sanesecurity.net/sanesecurity/* /var/clamav/ > /dev/null 2>&1
fi
dialog --msgbox "Installation Completed" 5 27
AntiVirusMenu
}
UpdateSaneSecurityClamAV () {
checkInternetConnection
{
nohup rsync rsync://rsync.sanesecurity.net/sanesecurity/* /var/clamav/ &
echo 100
} | dialog --gauge "Update in progress..." 6 30 0
AntiVirusMenu
}
FullScanClamAV () {
dialog --msgbox "Scanning / will begin..." 5 30
dialog --msgbox "The log will be located in /var/db/clamav/scan.log" 6 32
nohup clamscan -r --log=/var/db/clamav/scan.log --move=/var/db/clamav/quarantine / &
dialog --msgbox "Scan launched in the background" 5 35
AntiVirusMenu
}
HomeScanClamAV () {
dialog --msgbox "Scanning /home will begin..." 5 33
dialog --msgbox "The log will be located in /var/db/clamav/scan.log" 6 32
nohup clamscan -r --log=/var/db/clamav/scan.log --move=/var/db/clamav/quarantine /home &
dialog --msgbox "Scan launched in the background" 5 35
AntiVirusMenu
}
LogClamAV () {
dialog --textbox /var/db/clamav/scan.log 0 0
AntiVirusMenu
}
ArchiveLogClamAV () {
# Get the date and time in the desired format
DATE=$(date "+%d-%m-%Y")
TIME=$(date "+%H:%M:%S")
# Path of the file to compress
FILE="/var/db/clamav/scan.log"
# Check if the file to compress exists
if [ ! -f "$FILE" ]; then
dialog --msgbox "The file to compress does not exist" 5 40
AntiVirusMenu
fi
# Compressed file name
COMPRESSED_FILE_NAME="scan_${DATE}_${TIME}.xz"
# Full path of the compressed file
COMPRESSED_FILE_PATH="/var/db/clamav/${COMPRESSED_FILE_NAME}"
# Compress the file
xz "$FILE" -c > "$COMPRESSED_FILE_PATH"
AntiVirusMenu
}
CleanLogClamAV () {
dialog --yesno "Are you sure you want to delete the log?" 5 45
confirm=$?
if [ "$confirm" -eq 0 ]; then
rm /var/db/clamav/scan.log
touch /var/db/clamav/scan.log
fi
AntiVirusMenu
}
locateRebuild () {
{
/usr/libexec/locate.updatedb
echo 100
} | dialog --gauge "Rebuilding index..." 6 40 0
dialog --msgbox "Rebuilding complete" 5 23
MainMenu
}
CheckUserExists () {
# Dialogue to get the username
user=$(dialog --title "Check User Existence" --inputbox "Please enter the username" 8 30 2>&1 1>/dev/tty)
countus=$(getent passwd "$user" | cut -d: -f1)
case $countus in
"$user")
userInfo=$(id "$user")
dialog --backtitle "User Exists!" \
--title ' Result' \
--msgbox "The user exists:\n\nInformation:\n$userInfo" 10 50
;;
*)
dialog --backtitle "User Not Found!" \
--title ' Result' \
--msgbox "The user does not exist" 5 28
;;
esac
UsersRightsMenu
}
SFTPFS () {
# Check if OpenSSH is installed or not
check=$(grep -o "sshd=YES" < /etc/rc.conf | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
if [ ! -e /usr/sbin/sshd ]; then
dialog --yesno "OpenSSH is not installed on your system, do you want to install it?" 6 44
sshd_install=$?
checkInternetConnection
if [ "$sshd_install" -eq 0 ]; then
pkgin -y in opensshd
# I don't remember if sshd goes automatically to /etc/rc.d/... in case :
cp /usr/pkg/share/examples/rc.d/sshd /etc/rc.d/sshd
echo sshd=YES >> /etc/rc.conf
fi
else
echo sshd=YES >> /etc/rc.conf
fi
fi
# check if a previous SFTP file server is already configured
check22=$(grep -o "sftpexclusive" < /etc/ssh/sshd_config | sort | uniq | wc -l | tr -d ' ')
if [ "$check22" -eq "1" ]; then
dialog --msgbox "This server is already configured as SFTP File Server" 5 57
ServicesMenu
fi
# Check if /etc/ssh/sshd_config contains Subsystem sftp command
check=$(grep Subsystem < /etc/ssh/sshd_config | grep sftp | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 1 ]; then
# now, check if the sftp is internal-sftp
check2=$(grep Subsystem < /etc/ssh/sshd_config | grep "internal-sftp" | sort | uniq | wc -l | tr -d ' ')
if [ "$check2" -eq 0 ]; then
# Configure sftp-internal + nosftp + sftpexclusive group and user chrooting to /SFTP/%u
#sed -i'' "s/\/usr\/libexec\/sftp-server/internal-sftp\n\nMatch Group sftpexclusive\n ChrootDirectory \/SFTP\/%u\n ForceCommand internal-sftp\n AllowTcpForwarding no\n X11Forwarding no\n/" /etc/ssh/sshd_config
sed -i'' "s/\/usr\/libexec\/sftp-server/internal-sftp\n\nMatch Group nosftp\n ForceCommand \/usr\/bin\/false\n\nMatch Group sftpexclusive\n ChrootDirectory \/SFTP\/%u\n ForceCommand internal-sftp\n AllowTcpForwarding no\n X11Forwarding no\n/" /etc/ssh/sshd_config
fi
else
# Add a Subystem + configuration
{
echo " "
echo "# SFTP FILE SERVER"
echo "Subsystem sftp internal-sftp"
echo " "
echo "Match group nosftp"
echo " ForceCommand /usr/bin/false"
echo " "
echo "Match Group sftpexclusive"
echo " ChrootDirectory /SFTP/%u"
echo " ForceCommand internal-sftp"
echo " AllowTcpForwarding no"
echo " X11Forwarding no"
echo " "
} >> /etc/ssh/sshd_config
fi
# Create groups nosftp and sftpexclusive
groupadd nosftp 2>/dev/null
groupadd sftpexclusive 2>/dev/null
# Add the /usr/bin/false shell to /etc/shells (in order to deactivate user account in case)
echo "/usr/bin/false" >> /etc/shells
# deactivate Motd
check4=$(grep -o '#PrintMotd yes' < /etc/ssh/sshd_config | wc -l | tr -d ' ')
if [ "$check4" -eq 1 ]; then
sed -i'' "s/#PrintMotd yes/PrintMotd no/" /etc/ssh/sshd_config
fi
check41=$(grep -o 'PrintMotd yes' < /etc/ssh/sshd_config | wc -l | tr -d ' ')
if [ "$check41" -eq 1 ]; then
sed -i'' "s/PrintMotd yes/PrintMotd no/" /etc/ssh/sshd_config
fi
# deactivate Banner
check5=$(grep -o '#Banner none' < /etc/ssh/sshd_config | wc -l | tr -d ' ')
if [ "$check5" -eq 1 ]; then
sed -i'' "s/#Banner none/Banner none/" /etc/ssh/sshd_config
fi
check51=$(grep -o 'Banner none' < /etc/ssh/sshd_config | wc -l | tr -d ' ')
if [ "$check51" -eq 1 ]; then
sed -i'' "s/Banner none/Banner none/" /etc/ssh/sshd_config
fi
# Restart SSH
service sshd restart > /dev/null 2>&1
# check if the NPF firewall has already been configured.
i=0
while [ $i -lt "3" ]; do
if [ -e /etc/npf.conf ]; then
# check if NPF is active
check=$(npfctl show | grep -o "inactive" | sort | uniq | wc -l | tr -d ' ')
if [ ! "$check" -eq 1 ]; then
# NPF is active
# check SSH port is the same than in /etc/npf.conf
sshdport=$(grep 'Port ' < /etc/ssh/sshd_config | grep -o "[0-9]" | tr -d "\n")
npfsshport=$(grep ssh < /etc/npf.conf | grep -o ssh | sort | uniq | wc -l | tr -d ' ')
if [ "$npfsshport" -eq 1 ]; then
npfsshport="22"
fi
npfsshport2=$(grep ssh < /etc/npf.conf | grep -o "22" | sort | uniq | wc -l | tr -d ' ')
if [ "$npfsshport2" -eq 1 ]; then
npfsshport="22"
fi
# Compare the 2 var
if [ "$sshdport" -eq "$npfsshport" ]; then
# perfect ! Same port
i=$((i+11))
else
# SSH ports are different between /etc/ssh/sshd_config and /etc/npf.conf
dialog --msgbox "The NPF firewall seems to be active but the SSH port is different between /etc/ssh/sshd_config and /etc/npf.conf\n\n/etc/ssh/sshd_config and then /etc/npf.conf will open so that you can make your changes" 9 70
pico /etc/ssh/sshd_config
pico /etc/npf.conf
service npf restart > /dev/null 2>&1
service sshd restart > /dev/null 2>&1
fi
else
dialog --yesno "The NPF firewall seems inactive\nWould you like to configure it?" 6 35
npf_ornot=$?
if [ "$npf_ornot" -eq 0 ]; then
PareFeu
fi
fi
else
dialog --yesno "The NPF firewall seems inactive\nWould you like to configure it?" 6 35
npf_ornot=$?
if [ "$npf_ornot" -eq 0 ]; then
PareFeu
fi
fi
i=$((i+1))
done
dialog --msgbox "The configuration is done!\nPlease now create SFTP users" 6 32
}
CreateSFTPuser () {
# check if a previous SFTP file server is already configured
check22=$(grep -o "sftpexclusive" < /etc/ssh/sshd_config | sort | uniq | wc -l | tr -d ' ')
if [ ! "$check22" -eq "1" ]; then
dialog --msgbox "This server is not configured as SFTP File Server\nPlease 'Configure a SFTP file server with OpenSSH'" 6 54
OpenSSHFSMenu
fi
# Get the username to create
user=$(dialog --title "Adding a SFTP user" --inputbox "Please enter the username of the new SFTP user" 8 52 2>&1 1>/dev/tty)
# check if the user already exists
countus=$(getent passwd "$user" | cut -d: -f1)
case $countus in
"$user")
dialog --msgbox "This user already exists" 5 29
OpenSSHFSMenu
;;
*)
;;
esac
# Create the user with no login access and a home directory to /SFTP/user
useradd -G sftpexclusive -s /sbin/nologin -m -d /SFTP/"${user}" "${user}"
passwd "${user}"
# Permissions :
/sbin/chown root:sftpexclusive /SFTP/"${user}"
chmod 755 /SFTP/"${user}"
# Check if everything has been done correctly
countus=$(getent passwd "$user" | cut -d: -f1 | wc -l | tr -d ' ')
if [ "$countus" -eq 1 ]; then
if [ -d /SFTP/"${user}" ]; then
dialog --msgbox "${user} has been correctly created and is member of sftpexclusive" 6 70
else
dialog --msgbox "Something went wrong" 5 24
fi
fi
OpenSSHFSMenu
}
DeleteSFTPuser () {
# Get the list of system users excluding specified users
users=$(getent passwd | grep '/SFTP/' | cut -d: -f1)
# Check if the list of users is empty
if [ -z "$users" ]; then
dialog --backtitle "Remove a User" \
--title "No Users Available" \
--msgbox "No users to remove." 8 50
return
fi
# Initialize an empty string to store dialog options
dialog_options=""
# Loop through the list of users
for user in $users; do
# Get the user's ID
uid=$(id -u "$user")
# Check if the user's ID was successfully retrieved
if [ -z "$uid" ]; then
echo "Error: Unable to find user ID for $user"
OpenSSHFSMenu
fi
# Build each option and add it to the dialog options string
dialog_options="$dialog_options $user $uid off"
done
# Display the checkbox dialog to select users for deletion
selected_users=$(dialog --backtitle "Remove a User" \
--title "Choose whom to remove" \
--checklist "Use space bar. Choose only one user if you want to archive the home folder. To remove all, select as many users as necessary:" \
20 60 10 \
"$dialog_options" \
2>&1 >/dev/tty)
# Check if users have been selected
if [ -n "$selected_users" ]; then
# Ask if the home directory should also be removed
dialog --yesno "Do you also want to remove the home directory of the selected user?" 6 65
remove_home=$?
# Remove the selected users
for user in $selected_users; do
if [ "$remove_home" -eq 0 ]; then
# Remove the user and their home directory
userdel -r "$user"
else
dialog --yesno "Do you want to archive the home directory of the selected user?" 6 65
compress_home=$?
if [ "$compress_home" -eq 0 ]; then
# Get the user's home directory
user_home="/SFTP/${user}"
# Check if the directory exists
if [ -d "$user_home" ]; then
# Archive and compress the directory
tar cf - "$user_home" | xz > "${user_home}.tar.xz"
userdel -r "$user"
dialog --msgbox "The home directory has been archived to /SFTP/${user}.tar.xz" 6 70
else
dialog --backtitle "Directory Not Found!" \
--title 'Directory Not Found' \
--msgbox "The home directory does not exist." 5 38
fi
else
userdel "$user"
fi
fi
done
fi
dialog --backtitle "User(s) Removed!" \
--title ' Result' \
--msgbox "Deletion Successful" 5 23
OpenSSHFSMenu
}
ListSFTPusers () {
getent passwd | grep '/SFTP' | cut -d: -f1 > /tmp/AAervinrinZbiznvinzdmin32.tmp
# Display the contents of the /etc/passwd file in a dialog screen
dialog --backtitle "List of SFTP users" --title "SFTP" --textbox /tmp/AAervinrinZbiznvinzdmin32.tmp 0 0
rm /tmp/AAervinrinZbiznvinzdmin32.tmp
# Call OpenSSHFSMenu after dialog close
OpenSSHFSMenu
}
ChangepassSFTPuser () {
# Get the username
user=$(dialog --title "Username" --inputbox "Please enter the username" 8 30 2>&1 1>/dev/tty)
# check if the user already exists
countus=$(getent passwd "$user" | cut -d: -f1)
case $countus in
"$user")
passwd "${user}"
;;
*)
dialog --msgbox "User doesn't exist!" 5 23
OpenSSHFSMenu
;;
esac
OpenSSHFSMenu
}
DisableSFTPuser () {
# Get the username
user=$(dialog --title "Username" --inputbox "Please enter the username" 8 30 2>&1 1>/dev/tty)
# check if the user already exists
countus=$(getent passwd "$user" | cut -d: -f1)
case $countus in
"$user")
usermod -G nosftp "${user}"
countus3=$(groups "${user}" | grep -o "nosftp")
case $countus3 in
"nosftp")
dialog --backtitle "User account disabled" \
--title ' Result' \
--msgbox "User account disabled" 5 25
;;
*)
dialog --backtitle "Error" \
--title ' Result' \
--msgbox "User not disabled" 5 25
OpenSSHFSMenu
;;
esac
;;
*)
dialog --msgbox "User doesn't exist!" 5 23
OpenSSHFSMenu
;;
esac
OpenSSHFSMenu
}
ListDisabledSFTPusers () {
grep '^nosftp:' /etc/group | cut -d: -f4 | tr ',' '\n' > /tmp/AAervinrinZbiznvinzdmin32.tmp
# Display the contents of the /etc/passwd file in a dialog screen
dialog --backtitle "List of SFTP disabled users" --title "DISABLED" --textbox /tmp/AAervinrinZbiznvinzdmin32.tmp 0 0
rm /tmp/AAervinrinZbiznvinzdmin32.tmp
# Call OpenSSHFSMenu after dialog close
OpenSSHFSMenu
}
RenableSFTPuser () {
# Get the username
user=$(dialog --title "Username" --inputbox "Please enter the username" 8 30 2>&1 1>/dev/tty)
# check if the user already exists
countus=$(getent passwd "$user" | cut -d: -f1)
case $countus in
"$user")
sed -i'' -e "/^nosftp:/s/,${user}\(,\|$\)/\1/" -e "/^nosftp:/s/${user},//" -e "/^nosftp:/s/,${user}$//" -e "/^nosftp:/s/:${user}$/:/" /etc/group
countus3=$(groups "${user}" | grep -o nosftp)
case $countus3 in
"nosftp")
dialog --backtitle "Error" \
--title ' Result' \
--msgbox "User not enabled" 5 25
OpenSSHFSMenu
;;
*)
dialog --backtitle "Enabled" \
--title ' Result' \
--msgbox "User account enabled" 5 25
;;
esac
;;
*)
;;
esac
OpenSSHFSMenu
}
Fail2banStatus () {
service fail2ban status > /tmp/aaevpinpaeinEAB.tmp
dialog --title "Fail2ban Status" --textbox /tmp/aaevpinpaeinEAB.tmp 20 70
rm /tmp/aaevpinpaeinEAB.tmp
Fail2banMenu
}
ShowBannedIP () {
fail2ban-client banned > /tmp/aaevpinpaeinEAB.tmp
dialog --title "Fail2ban Banned IP" --textbox /tmp/aaevpinpaeinEAB.tmp 20 70
rm /tmp/aaevpinpaeinEAB.tmp
Fail2banMenu
}
UnbanAnIP () {
# Create a temporary file
TMPFILE=$(mktemp)
# Get NICs
fail2ban-client banned | grep -Eo '\b([0-9a-fA-F]{0,4}:){2,7}[0-9a-fA-F]{0,4}\b|\b([0-9]{1,3}\.){3}[0-9]{1,3}\b' > "$TMPFILE"
# Check if the list is empty
if [ ! -s "$TMPFILE" ]; then
dialog --msgbox "No IP banned" 5 30
rm -f "$TMPFILE"
Fail2banMenu
fi
# Read the temporary file and construct the option for dialog
devices=""
while IFS= read -r line; do
devices="$devices $line \"$line\" off"
done < "$TMPFILE"
# Use dialog to display the list of devices
device=$(eval "dialog --radiolist \"Choose the IP to unban\" 0 0 0 $devices 3>&1 1>&2 2>&3")
# Clean up and remove the temporary file
rm -f "$TMPFILE"
fail2ban-client unban "${device}"
}
ArchiveFail2banLog () {
# Get the date and time in the desired format
DATE=$(date "+%d-%m-%Y")
TIME=$(date "+%H:%M:%S")
# Path of the file to compress
FILE="/var/log/fail2ban.log"
# Check if the file to compress exists
if [ ! -f "$FILE" ]; then
dialog --msgbox "The file to compress does not exist" 5 40
Fail2banMenu
fi
# Compressed file name
COMPRESSED_FILE_NAME="fail2ban_${DATE}_${TIME}.xz"
# Full path of the compressed file
COMPRESSED_FILE_PATH="/var/log/${COMPRESSED_FILE_NAME}"
# Compress the file
xz "$FILE" -c > "$COMPRESSED_FILE_PATH"
Fail2banMenu
}
Openfail2banLog () {
pico /var/log/fail2ban.log
Fail2banMenu
}
EnableForwardingIP () {
dialog --yesno "Voulez-vous autoriser le routage IPv4 et IPv6 (Yes)\nou\nseulement IPv4 (No)" 7 70
ipv6_ornot=$?
if [ $ipv6_ornot -eq 0 ]; then
sysctl -w net.inet.ip.forwarding=1 > /dev/null 2>&1
sysctl -w net.inet6.ip6.forwarding=1 > /dev/null 2>&1
# check if ip fowarding has already been added
check=$(grep -o '# FORWARDING IP' < /etc/sysctl.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
printf "\n" >> /etc/sysctl.conf
echo "# FORWARDING IP" >> /etc/sysctl.conf
check1=$(grep -o 'net.inet.ip.forwarding=1' < /etc/sysctl.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check1" -eq 0 ]; then
echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf
echo "net.inet6.ip6.forwarding=1" >> /etc/sysctl.conf
fi
check1=$(grep -o 'net.inet6.ip6.forwarding=1' < /etc/sysctl.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check1" -eq 0 ]; then
echo "net.inet6.ip6.forwarding=1" >> /etc/sysctl.conf
fi
else
check1=$(grep -o 'net.inet.ip.forwarding=1' < /etc/sysctl.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check1" -eq 0 ]; then
echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf
echo "net.inet6.ip6.forwarding=1" >> /etc/sysctl.conf
fi
check1=$(grep -o 'net.inet6.ip6.forwarding=1' < /etc/sysctl.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check1" -eq 0 ]; then
echo "net.inet6.ip6.forwarding=1" >> /etc/sysctl.conf
fi
fi
else
sysctl -w net.inet.ip.forwarding=1 > /dev/null 2>&1
# check if ip fowarding has already been added
check=$(grep -o '# FORWARDING IP' < /etc/sysctl.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check" -eq 0 ]; then
printf "\n" >> /etc/sysctl.conf
echo "# FORWARDING IP" >> /etc/sysctl.conf
check1=$(grep -o 'net.inet.ip.forwarding=1' < /etc/sysctl.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check1" -eq 0 ]; then
echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf
fi
else
check1=$(grep -o 'net.inet.ip.forwarding=1' < /etc/sysctl.conf | sort | uniq | wc -l | tr -d ' ')
if [ "$check1" -eq 0 ]; then
echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf
fi
fi
fi
# check if activated :
check=$(sysctl net.inet.ip.forwarding | grep -o "= [0-9]" | grep -o "[0-9]")
if [ "$check" -eq 1 ]; then
dialog --msgbox "IPv4 Forwading enabled" 5 26
else
dialog --msgbox "IPv4 Forwading disabled" 5 28
fi
check2=$(sysctl net.inet6.ip6.forwarding | grep -o "= [0-9]" | grep -o "[0-9]")
if [ "$check2" -eq 1 ]; then
dialog --msgbox "IPv6 Forwading enabled" 5 26
else
dialog --msgbox "IPv6 Forwading disabled" 5 28
fi
NetworkMenu
}
DisableForwardingIP () {
sysctl -w net.inet.ip.forwarding=0 > /dev/null 2>&1
sysctl -w net.inet6.ip6.forwarding=0 > /dev/null 2>&1
sed '/^# FORWARDING IP/d' /etc/sysctl.conf
sed '/^net.inet.ip.forwarding=1/d' /etc/sysctl.conf
sed '/^net.inet6.ip6.forwarding=1/d' /etc/sysctl.conf
# check if activated :
check=$(sysctl net.inet.ip.forwarding | grep -o "= [0-9]" | grep -o "[0-9]")
if [ "$check" -eq 1 ]; then
dialog --msgbox "IPv4 Forwading enabled" 5 26
else
dialog --msgbox "IPv4 Forwading disabled" 5 28
fi
check2=$(sysctl net.inet6.ip6.forwarding | grep -o "= [0-9]" | grep -o "[0-9]")
if [ "$check2" -eq 1 ]; then
dialog --msgbox "IPv6 Forwading enabled" 5 26
else
dialog --msgbox "IPv6 Forwading disabled" 5 28
fi
NetworkMenu
}
PowerOff () {
poweroff
}
RebooT () {
reboot
}
#################
# MENUS
NetworkMenu () {
# Your dialog command with dynamically calculated sizes
choix1=$(dialog --clear \
--backtitle "NETWORK MENU" \
--title "Network Menu" \
--menu "Choose an option:" \
19 70 10 \
1 "Check Internet Connection" \
2 "Restart DHCP Service" \
- "------------------------------------------------------------" \
3 "Enable IP forwarding" \
4 "Disable IP forwarding" \
- "------------------------------------------------------------" \
5 "Switch from Ethernet to Wifi" \
6 "Connect to WiFi Network" \
7 "Switch from Wifi to Ethernet" \
- "------------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix1 in
1) checkInternetConnection ; ItsOkInternet ; NetworkMenu ;;
2) RestartDHCP ;;
3) EnableForwardingIP ;;
4) DisableForwardingIP ;;
-) NetworkMenu ;;
5) SwitchToWifi ;;
6) ConnectWifi ;;
7) SwitchToEthernet ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
PareFeuMenu () {
choix1=$(dialog --clear \
--backtitle "FIREWALL MENU" \
--title "Firewall Menu" \
--menu "Choose an option:" \
12 70 10 \
1 "Configure NPF" \
2 "View NPF Status and Active Rules" \
- "------------------------------------------------------------" \
r "PREVIOUS MENU" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix1 in
1) PareFeu ;;
2) ShowRulesNPF ;;
-) PareFeuMenu ;;
r|R) SecurityMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
AntiVirusMenu () {
choix1=$(dialog --clear \
--backtitle "ANTIVIRUS MENU" \
--title "AntiVirus Menu" \
--menu "Choose an option:" \
19 70 10 \
1 "Install ClamAV with securiteinfo/sanesecurity databases" \
2 "Update SaneSecurity ClamAV databases" \
- "------------------------------------------------------------" \
3 "Run a full antivirus scan" \
4 "Run an antivirus scan of /home" \
5 "Show ClamAV scan log" \
6 "Archive ClamAV log file" \
7 "Clear ClamAV log file" \
- "------------------------------------------------------------" \
r "PREVIOUS MENU" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix1 in
1) installClamAV ;;
2) UpdateSaneSecurityClamAV ;;
-) AntiVirusMenu ;;
3) FullScanClamAV ;;
4) HomeScanClamAV ;;
5) LogClamAV ;;
6) ArchiveLogClamAV ;;
7) CleanLogClamAV ;;
r|R) SecurityMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
Fail2banMenu () {
# Your dialog command with dynamically calculated sizes
choix=$(dialog --clear \
--backtitle "SECURITY MENU" \
--title "Security Menu" \
--menu "Choose an option:" \
19 70 10 \
1 "Configure Fail2ban" \
- "------------------------------------------------------------" \
2 "Show status" \
- "------------------------------------------------------------" \
3 "Open fail2ban log" \
4 "Archive fail2ban log" \
- "------------------------------------------------------------" \
5 "Show banned IP" \
6 "Unban an IP" \
- "------------------------------------------------------------" \
r "PREVIOUS MENU" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) InstallFail2ban ;;
2) Fail2banStatus ;;
3) Openfail2banLog ;;
4) ArchiveFail2banLog ;;
5) ShowBannedIP ;;
6) UnbanAnIP ;;
-) Fail2banMenu ;;
r|R) SecurityMenu;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
SecurityMenu () {
# Your dialog command with dynamically calculated sizes
choix=$(dialog --clear \
--backtitle "SECURITY MENU" \
--title "Security Menu" \
--menu "Choose an option:" \
19 70 10 \
1 "Firewall" \
- "------------------------------------------------------------" \
2 "Configure SSH" \
- "------------------------------------------------------------" \
3 "Fail2ban" \
- "------------------------------------------------------------" \
4 "Anti-Virus" \
- "------------------------------------------------------------" \
5 "Set up OVPN VPN" \
- "------------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) PareFeuMenu ;;
2) ConfigureSSH ;;
3) Fail2banMenu ;;
4) AntiVirusMenu ;;
5) ovpnVPN ;;
-) SecurityMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
UsersRightsMenu () {
# Your dialog command with dynamically calculated sizes
choix=$(dialog --clear \
--backtitle "USERS AND ACCESS RIGHTS MENU" \
--title "Users and Access Rights Menu" \
--menu "Choose an option:" \
19 70 10 \
1 "Display list of users" \
2 "Create a user" \
3 "Check user existence" \
4 "Delete a user" \
- "-----------------------------------------------------------" \
5 "Display list of groups" \
6 "Create a group" \
7 "Check group existence" \
8 "Delete a group" \
9 "Add user to a group" \
10 "Remove user from a group" \
- "-----------------------------------------------------------" \
11 "Install sudo and add user to sudo group" \
- "-----------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) getentPasswd ;;
2) CreateUser ;;
3) CheckUserExists ;;
4) DeleteUser ;;
5) getentGroup ;;
6) CreateGroup ;;
7) CheckGroupExists ;;
8) DeleteGroup ;;
9) AddToGroup ;;
10) LeaveGroup ;;
11) InstallSudo ;;
-) UsersRightsMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
InstallProgramsMenu () {
choix=$(dialog --clear \
--backtitle "PROGRAM INSTALLATION MENU" \
--title "Program Installation Menu" \
--menu "Choose an option:" \
12 70 10 \
1 "Install desktop applications" \
2 "Install usual utilities" \
- "------------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) DesktopBundleApps ;;
2) UsualTools ;;
-) InstallProgramsMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
NetServices () {
dialog --msgbox "Not yet ready" 5 17
MainMenu
}
DiskMngmtMenu () {
choix=$(dialog --clear \
--backtitle "DISK MANAGEMENT MENU" \
--title "Disk Management Menu" \
--menu "Choose an option:" \
18 70 10 \
1 "Format a USB device to FFSv1" \
2 "Format a USB device to FFSv2" \
3 "Format a USB device to NTFS" \
4 "Format a USB device to EXFAT (not fully working)" \
5 "Securely erase a USB device" \
- "------------------------------------------------------------" \
6 "Mount a USB device to /media/dkX" \
7 "Unmount a USB device mounted to /media/dkX" \
- "------------------------------------------------------------" \
8 "Burn .iso to a USB device" \
9 "Burn .iso to a CD" \
- "------------------------------------------------------------" \
10 "Rebuild locate index" \
- "------------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) FormatToFFSv1 ;;
2) FormatToFFSv2 ;;
3) FormatToNTFS ;;
4) FormatToEXFAT ;;
5) SecurelyErase ;;
6) mountUSB ;;
7) umountUSB ;;
8) BurnISOtoUSB ;;
9) BurnISOtoCD ;;
10) locateRebuild ;;
-) DiskMngmtMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
OpenSSHFSMenu () {
choix=$(dialog --clear \
--backtitle "OPENSSH FILE SERVER MENU" \
--title "OpenSSH File Server Menu" \
--menu "Choose an option:" \
19 70 10 \
1 "Configure a SFTP file server with OpenSSH" \
- "------------------------------------------------------------" \
2 "Create a SFTP user" \
3 "List SFTP users" \
4 "Delete a SFTP user" \
5 "Change password for a SFTP user" \
- "------------------------------------------------------------" \
6 "Disable a SFTP user account" \
7 "List SFTP disabled users" \
8 "Re-enable a SFTP user account" \
- "------------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) SFTPFS ;;
-) OpenSSHFSMenu ;;
2) CreateSFTPuser ;;
3) ListSFTPusers ;;
4) DeleteSFTPuser ;;
5) ChangepassSFTPuser ;;
6) DisableSFTPuser ;;
7) ListDisabledSFTPusers ;;
8) RenableSFTPuser ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
ServicesMenu () {
choix=$(dialog --clear \
--backtitle "SERVICES MENU" \
--title "Services Menu" \
--menu "Choose an option:" \
11 70 10 \
1 "OpenSSH File Server" \
- "------------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) OpenSSHFSMenu ;;
-) ServicesMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
DesktopMenu () {
choix=$(dialog --clear \
--backtitle "DESKTOP ENVIRONMENT MENU" \
--title "Desktop Environment Menu" \
--menu "Choose an option:" \
11 70 10 \
1 "Install XFCE4/Slim desktop environment" \
- "------------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) xfce4 ;;
-) DesktopMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
###############################################################################
MainMenu () {
choix=$(dialog --clear \
--backtitle "WELCOME TO THE GLOBAL NETBSD SCRIPT" \
--title "Main Menu" \
--menu "Choose an option:" \
19 70 10 \
h "README" \
- "------------------------------------------------------------" \
1 "Network" \
2 "Security" \
3 "Users and Permissions" \
4 "Programs" \
5 "Web Server" \
6 "Disk Management" \
7 "Services" \
8 "Desktop Environment" \
- "------------------------------------------------------------" \
q "QUIT" \
- "------------------------------------------------------------" \
s "POWER OFF" \
x "REBOOT" \
3>&1 1>&2 2>&3)
case $choix in
h) READMEMenu ;;
1) NetworkMenu ;;
2) SecurityMenu ;;
3) UsersRightsMenu ;;
4) InstallProgramsMenu ;;
5) NetServices ;;
6) DiskMngmtMenu ;;
7) ServicesMenu ;;
8) DesktopMenu ;;
-) MainMenu ;;
q|Q) exit 0 ;;
s|S) PowerOff ;;
x|X) RebooT ;;
esac
}
###############################################################################
READMEMenu () {
choix=$(dialog --clear \
--backtitle "README MENU" \
--title "README Menu" \
--menu "Choose an option:" \
18 70 10 \
1 "Read Me First" \
- "------------------------------------------------------------" \
p "MAIN MENU" \
q "QUIT" \
3>&1 1>&2 2>&3)
case $choix in
1) ReadMeFirst ;;
-) READMEMenu ;;
p|P) MainMenu ;;
q|Q) exit 0 ;;
esac
}
ReadMeFirst() {
echo "Welcome to this server configuration module for NetBSD!
------------------------------------------------------------
First of all, this module should only be executed on a fresh installation of NetBSD 9.3/10.
It should not be executed on an already configured and production server as the scripts it contains could interact with the existing server configurations and potentially cause damage.
I decline any responsibility regarding the execution of this module.
The purpose of this module is primarily to facilitate basic server management tasks on a NetBSD server by providing a fully automated configuration of many services through a minimalist graphical interface.
It can also serve as a source of functional commands and syntaxes under NetBSD standard shell.
Of course, it is graciously made available to the public and can be modified by anyone without any form of compensation (except a thank you, if you feel like it).
If you spot any faulty features (or bad english :-S ! I'm french) or wish to discuss the possibility of adding new features and collaborate, you can contact me: theophile.dudreuilh@yahoo.com" > /tmp/AEzevinvpin.tmp
fold -s -w 67 /tmp/AEzevinvpin.tmp > /tmp/aaevpinpaeinEAB.tmp
dialog --title "Read Me First" --textbox /tmp/aaevpinpaeinEAB.tmp 20 70
}
# Appel du menu
MainMenu