shinobi user configured for keylogin
All checks were successful
learn org at code.softwareshinobi.com/linux.softwareshinobi.com/pipeline/head This commit looks good

This commit is contained in:
2025-06-11 09:38:24 -04:00
parent e82ba688eb
commit 73558cf551
15 changed files with 479 additions and 75 deletions

View File

@@ -2,17 +2,17 @@ FROM ubuntu:questing
##
ARG DEBIAN_FRONTEND=noninteractive
##
WORKDIR /
COPY /provision /
##
ARG DEBIAN_FRONTEND=noninteractive
##
COPY /provision/provision.bash provision.bash
#COPY /provision/provision.bash provision.bash
RUN bash provision.bash

94
server/provision/legacy.bash Executable file
View File

@@ -0,0 +1,94 @@
#!/bin/bash
##
## This script installs stuff
## to set up a linux server
## suitable for newbies.
##
## Before you go, check read around my blog!
##
## https://softwareshinobi.com
##
##
set -e;
set -x;
##
cat /etc/issue;
echo "Shinobi Academy 24.04" > /etc/issue;
cat /etc/issue;
##
apt update;
##
## install bashrc systemwide
##
##cp bashrc /usr/local/bin/bashrc
##ls -l /tmp/.bashrc
##cat /tmp/.bashrc;
##source /tmp/.bashrc;
##
apt install -y vim nano;
apt install -y hollywood;
apt install -y cmatrix cmatrix-xfont;
##
## shinobi academy user config
##
groupadd -g 4444 shinobi
useradd -u 4444 -g 4444 -rm -d /home/shinobi -s /bin/bash shinobi
##useradd -rm -d /home/shinobi -s /bin/bash -u 1042 shinobi;
echo 'shinobi:shinobi' | chpasswd
## mkdir /home/shinobi/.ssh/
## cp /private.key /home/shinobi/.ssh/
##
## restrict permissions on home
##
#chmod -R 555 /home/shinobi/
#chmod -R 555 /tmp/
##
## change MOTD
##
## echo "hey?" > /etc/motd
##
## start ssh server
##
apt install -y openssh-server;
apt install -y sudo;
service ssh start;
##
## finish
##
echo "fin."

View File

@@ -1 +0,0 @@
the private key!!

View File

@@ -0,0 +1,78 @@
#!/bin/bash
##
## This script installs stuff
## to set up a linux server
## suitable for newbies.
##
## Before you go, check read around my blog!
##
## https://softwareshinobi.com
##
##
set -e;
set -x;
##
cd shinobi
bash provision.bash
cd ..
##
cat /etc/issue;
echo "Shinobi Academy 24.04" > /etc/issue;
cat /etc/issue;
##
apt update;
##
## install bashrc systemwide
##
##cp bashrc /usr/local/bin/bashrc
##ls -l /tmp/.bashrc
##cat /tmp/.bashrc;
##source /tmp/.bashrc;
##
apt install -y vim nano;
apt install -y hollywood;
apt install -y cmatrix cmatrix-xfont;
##
## change MOTD
##
## echo "hey?" > /etc/motd
##
## start ssh server
##
apt install -y openssh-server;
apt install -y sudo;
service ssh start;
##
## finish
##
echo "fin."

View File

@@ -17,78 +17,16 @@ set -x;
##
cat /etc/issue;
cd server
echo "Shinobi Academy 24.04" > /etc/issue;
bash sshd.bash
cat /etc/issue;
cd ..
##
apt update;
cd users/shinobi
##
## install bashrc systemwide
##
bash provision.bash
##cp bashrc /usr/local/bin/bashrc
##ls -l /tmp/.bashrc
##cat /tmp/.bashrc;
##source /tmp/.bashrc;
##
apt install -y vim nano;
## apt install -y hollywood;
apt install -y cmatrix cmatrix-xfont;
##
## shinobi academy user config
##
groupadd -g 1042 shinobi
useradd -u 1042 -g 1042 -rm -d /home/shinobi -s /bin/bash shinobi
##useradd -rm -d /home/shinobi -s /bin/bash -u 1042 shinobi;
echo 'shinobi:shinobi' | chpasswd
mkdir /home/shinobi/.ssh/
cp /private.key /home/shinobi/.ssh/
##
## restrict permissions on home
##
chmod -R 555 /home/shinobi/
chmod -R 555 /tmp/
##
## change MOTD
##
## echo "hey?" > /etc/motd
##
## start ssh server
##
apt install -y openssh-server;
apt install -y sudo;
service ssh start;
##
## finish
##
echo "fin."
cd ../..

View File

@@ -0,0 +1,21 @@
#!/bin/bash
set -e;
set -x;
apt update;
apt install -y openssh-server;
apt install -y sudo;
cp sshd_config /etc/ssh/sshd_config
service ssh start;
##
## finish
##
echo "fin."

View File

@@ -0,0 +1,144 @@
## revuelto!!
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options override the
# default value.
#
# In general, the first uncommented definition of an option takes precedence.
# For options that accept multiple values, like 'Port', subsequent definitions
# are appended to the configuration.
#
# Note that the above implies that configuration options from snippets in
# /etc/ssh/sshd_config.d/*.conf take precedence over those defined in this
# file. In addition, configuration snippet files are processed in lexical
# order, so options defined in files with names that sort earlier take
# precedence.
#
# Such configuration snippets may be present in default installations of
# Ubuntu.
Include /etc/ssh/sshd_config.d/*.conf
# When systemd socket activation is used (the default), the socket
# configuration must be re-generated after changing Port, AddressFamily, or
# ListenAddress.
#
# For changes to take effect, run:
#
# systemctl daemon-reload
# systemctl restart ssh.socket
#
#Port 22
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_ecdsa_key
#HostKey /etc/ssh/ssh_host_ed25519_key
# Ciphers and keying
#RekeyLimit default none
# Logging
#SyslogFacility AUTH
#LogLevel INFO
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin prohibit-password
#StrictModes yes
#MaxAuthTries 6
#MaxSessions 10
PubkeyAuthentication yes
# Expect .ssh/authorized_keys2 to be disregarded by default in future.
AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2
#AuthorizedPrincipalsFile none
#AuthorizedKeysCommand none
#AuthorizedKeysCommandUser nobody
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
KbdInteractiveAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
#GSSAPIStrictAcceptorCheck yes
#GSSAPIKeyExchange no
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the KbdInteractiveAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via KbdInteractiveAuthentication may bypass
# the setting of "PermitRootLogin prohibit-password".
# If you just want the PAM account and session checks to run without
# PAM authentication, then enable this but set PasswordAuthentication
# and KbdInteractiveAuthentication to 'no'.
UsePAM yes
#AllowAgentForwarding yes
#AllowTcpForwarding yes
#GatewayPorts no
X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PermitTTY yes
PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
#UseDNS no
#PidFile /run/sshd.pid
#MaxStartups 10:30:100
#PermitTunnel no
#ChrootDirectory none
#VersionAddendum none
# no default banner path
#Banner none
# Allow client to pass locale environment variables
AcceptEnv LANG LC_*
# override default of no subsystems
Subsystem sftp /usr/lib/openssh/sftp-server
# Example of overriding settings on a per-user basis
#Match User anoncvs
# X11Forwarding no
# AllowTcpForwarding no
# PermitTTY no
# ForceCommand cvs server

View File

@@ -0,0 +1,2 @@
alias a="ls -lha"

View File

@@ -0,0 +1,48 @@
#!/bin/bash
##
## This script installs stuff
## to set up a linux server
## suitable for newbies.
##
## Before you go, check read around my blog!
##
## https://softwareshinobi.com
##
##
set -e;
set -x;
##
## create user
##
groupadd -g 4444 shinobi
useradd -u 4444 -g 4444 -rm -d /home/shinobi -s /bin/bash shinobi
##
## set password
##
echo 'shinobi:shinobi' | chpasswd
##
## set up keys
##
cp -r ssh/ /home/shinobi/.ssh
chmod -R 700 /home/shinobi/.ssh
chown -R shinobi: /home/shinobi/.ssh
##
## restrict permissions on home
##
#chmod -R 555 /home/shinobi/
#chmod -R 555 /tmp/

View File

@@ -0,0 +1 @@
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDFA1cVhVsNlZBzZXHHUko6w6c3I/4hL/y72zeIy9VatijkY9Dhlle3nOzipRz0Z0uXQcJS7ElVpMYIXp7SAOp/S8F8NJk4yDuIyYLRMOBw1KJdP4qfnBwExASbQOcPb8yexOnNRwyypxmS6hyCy1ovm5cq9xKy6qwFpIoU9MUgE2ZWZez1Ek19AaRDlIuhCFrV4dyo3XrKBBxnSqffkIla98pijG6JQHcONG/IIwmohkU+o/Z8KHYAwEd5RTYxz55CFrx3V+pc3kpJ6AelOGY5zjzzQCVR1jiO9t8gGZ5LyZmZb/go3G1AVmFKjc8XHDrk1wtG8Inhx7Y3/0pmwIiuHaVa9kCeRTuSPNRUMXjasFtCPhH2wbBTRfQgLON/445PMItkbJ/KVkGFXhkQemkqc0XAfKf5KKJBl6AiFaku8E30TykH9hr+Mdt29lO56WR1GkBoDb/DEs6D2KAnqVLQhIRBkihcrcoDnYT7MD68+v5fDhx5+5lA1QsCXTTAc90U18t6bKIGTGNWpPQAmufXl6TzCojI95z1/nkmMA2t9WYid2kcOE3BsJ9c5RekoSy6iwrpEJC9PNHAAPF6iFPLjrV6osuvOx9fBbF+Qv9aoDWditS2beSlDDKHfDXYGExAIILMSZ3zjigy/jGef5C0W65AbkguIebTGHgqSIEakQ== troy@countach

View File

@@ -0,0 +1,49 @@
-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----

View File

@@ -0,0 +1 @@
ssh-rsa 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 troy@countach

View File

@@ -0,0 +1,3 @@
|1|HNfODkbpMvUeHOSv8tzTZdhzUnM=|C+xjDIr71yL49lJOO3eH2dJXJ6k= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID0luCnOEpQCpwxpFWlNSBfJ5uwRUhRlLByOvQGMVifV
|1|7OpTeAWOyu7ejBfKMNIe9aTrizU=|ca3+00vKexJwQZlvLVdgeljuBB0= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCZf0vzyuJfhopMBwH55hHR7WAAnj2Z9mrgA3WdhXLXHVNTZGJiuiGqO+J289nAANyuhSuly4CJNq7pKTAIoJhfx6OP6i1tt0A3n6BlqiIwnI81qw3W/5aSsESrsj8+7tYei5IxRSVmkkZXSpKKTMsGcox/1lYlRcFC5AOE2Q2Y9fPtRpQZWCHoHvX4PBWjwqEd65TylZ14+yWCnd49uKt86gNPK58U9+TsMRIKiKt0AGmDPPcjujwCiIHFZUvyd1a71t9L5ky7qr8iNEDO3BtmsXoHBQTQEaKboaN8oqeYPLMVZDwrROiyDktmXrdO6S7mQXQ6BTKnGue5Mv7WdCJQGZvIlpNBvxDTOowV2oo2Iu1Mf1/KHuFN+3SIluEaVc6juXUbymb29xG61mEcKK4qOoRX675nbvPtyhvCATYWWH8WXPhddhBLEvSVgbmKGPfUd0shoaQZgQnijyrIv05/tHsuIjRHvATYN/c9SSyHdyw3rW0z50Tp3dkdc/ZM4ws=
|1|A8PuKz/4Ej8eeJqnnr0yrIazths=|kWyDWHoRp7Cuu19ieYtfVaXQfG0= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNYr2TApZxXT00eP7rXHOc7FVs+xUtR8kfsYRh6AlY/zcAbH7w+JFsXIvDa3iIn7PbblM25rgt64LiQZYbUCzpc=