shinobi user configured for keylogin
All checks were successful
learn org at code.softwareshinobi.com/linux.softwareshinobi.com/pipeline/head This commit looks good

This commit is contained in:
2025-06-11 09:38:24 -04:00
parent e82ba688eb
commit 73558cf551
15 changed files with 479 additions and 75 deletions

View File

@@ -12,7 +12,7 @@ services:
dockerfile: Dockerfile
hostname: shinobilinux
hostname: asterion
domainname: linux.softwareshinobi.com
@@ -20,6 +20,10 @@ services:
- "2222:22"
volumes:
- "./tmp:/tmp"
linux.softwareshinobi.com-landing:
container_name: linux.softwareshinobi.com-landing

View File

@@ -64,6 +64,28 @@ Shinobi Academy Linux comes pre-installed with some interesting tools to enhance
**Experimenting with these tools is a great way to explore the possibilities of Linux.**
## Issues
when the container is bounced, the following error/warning is displayed. i want to avoid that as the containers will be bounced often.
```bash
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that a host key has just been changed.
The fingerprint for the ED25519 key sent by the remote host is
SHA256:1mVaZmiBG+iX+aZxweT3zkZFnctabuzbeWQzojqNuJ4.
Please contact your system administrator.
Add correct host key in /home/shinobi/.ssh/known_hosts to get rid of this message.
Offending ED25519 key in /home/shinobi/.ssh/known_hosts:23
remove with:
ssh-keygen -f '/home/shinobi/.ssh/known_hosts' -R '[localhost]:2222'
Host key for [localhost]:2222 has changed and you have requested strict checking.
Host key verification failed.
```
## Conclusion:
By following these steps, you've successfully connected to Shinobi Academy Linux and begun your journey into the world of Linux. Use this platform to explore, experiment, and build your Linux skills!

View File

@@ -2,17 +2,17 @@ FROM ubuntu:questing
##
ARG DEBIAN_FRONTEND=noninteractive
##
WORKDIR /
COPY /provision /
##
ARG DEBIAN_FRONTEND=noninteractive
##
COPY /provision/provision.bash provision.bash
#COPY /provision/provision.bash provision.bash
RUN bash provision.bash

94
server/provision/legacy.bash Executable file
View File

@@ -0,0 +1,94 @@
#!/bin/bash
##
## This script installs stuff
## to set up a linux server
## suitable for newbies.
##
## Before you go, check read around my blog!
##
## https://softwareshinobi.com
##
##
set -e;
set -x;
##
cat /etc/issue;
echo "Shinobi Academy 24.04" > /etc/issue;
cat /etc/issue;
##
apt update;
##
## install bashrc systemwide
##
##cp bashrc /usr/local/bin/bashrc
##ls -l /tmp/.bashrc
##cat /tmp/.bashrc;
##source /tmp/.bashrc;
##
apt install -y vim nano;
apt install -y hollywood;
apt install -y cmatrix cmatrix-xfont;
##
## shinobi academy user config
##
groupadd -g 4444 shinobi
useradd -u 4444 -g 4444 -rm -d /home/shinobi -s /bin/bash shinobi
##useradd -rm -d /home/shinobi -s /bin/bash -u 1042 shinobi;
echo 'shinobi:shinobi' | chpasswd
## mkdir /home/shinobi/.ssh/
## cp /private.key /home/shinobi/.ssh/
##
## restrict permissions on home
##
#chmod -R 555 /home/shinobi/
#chmod -R 555 /tmp/
##
## change MOTD
##
## echo "hey?" > /etc/motd
##
## start ssh server
##
apt install -y openssh-server;
apt install -y sudo;
service ssh start;
##
## finish
##
echo "fin."

View File

@@ -1 +0,0 @@
the private key!!

View File

@@ -0,0 +1,78 @@
#!/bin/bash
##
## This script installs stuff
## to set up a linux server
## suitable for newbies.
##
## Before you go, check read around my blog!
##
## https://softwareshinobi.com
##
##
set -e;
set -x;
##
cd shinobi
bash provision.bash
cd ..
##
cat /etc/issue;
echo "Shinobi Academy 24.04" > /etc/issue;
cat /etc/issue;
##
apt update;
##
## install bashrc systemwide
##
##cp bashrc /usr/local/bin/bashrc
##ls -l /tmp/.bashrc
##cat /tmp/.bashrc;
##source /tmp/.bashrc;
##
apt install -y vim nano;
apt install -y hollywood;
apt install -y cmatrix cmatrix-xfont;
##
## change MOTD
##
## echo "hey?" > /etc/motd
##
## start ssh server
##
apt install -y openssh-server;
apt install -y sudo;
service ssh start;
##
## finish
##
echo "fin."

View File

@@ -17,78 +17,16 @@ set -x;
##
cat /etc/issue;
cd server
echo "Shinobi Academy 24.04" > /etc/issue;
bash sshd.bash
cat /etc/issue;
cd ..
##
apt update;
cd users/shinobi
##
## install bashrc systemwide
##
bash provision.bash
##cp bashrc /usr/local/bin/bashrc
##ls -l /tmp/.bashrc
##cat /tmp/.bashrc;
##source /tmp/.bashrc;
##
apt install -y vim nano;
## apt install -y hollywood;
apt install -y cmatrix cmatrix-xfont;
##
## shinobi academy user config
##
groupadd -g 1042 shinobi
useradd -u 1042 -g 1042 -rm -d /home/shinobi -s /bin/bash shinobi
##useradd -rm -d /home/shinobi -s /bin/bash -u 1042 shinobi;
echo 'shinobi:shinobi' | chpasswd
mkdir /home/shinobi/.ssh/
cp /private.key /home/shinobi/.ssh/
##
## restrict permissions on home
##
chmod -R 555 /home/shinobi/
chmod -R 555 /tmp/
##
## change MOTD
##
## echo "hey?" > /etc/motd
##
## start ssh server
##
apt install -y openssh-server;
apt install -y sudo;
service ssh start;
##
## finish
##
echo "fin."
cd ../..

View File

@@ -0,0 +1,21 @@
#!/bin/bash
set -e;
set -x;
apt update;
apt install -y openssh-server;
apt install -y sudo;
cp sshd_config /etc/ssh/sshd_config
service ssh start;
##
## finish
##
echo "fin."

View File

@@ -0,0 +1,144 @@
## revuelto!!
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options override the
# default value.
#
# In general, the first uncommented definition of an option takes precedence.
# For options that accept multiple values, like 'Port', subsequent definitions
# are appended to the configuration.
#
# Note that the above implies that configuration options from snippets in
# /etc/ssh/sshd_config.d/*.conf take precedence over those defined in this
# file. In addition, configuration snippet files are processed in lexical
# order, so options defined in files with names that sort earlier take
# precedence.
#
# Such configuration snippets may be present in default installations of
# Ubuntu.
Include /etc/ssh/sshd_config.d/*.conf
# When systemd socket activation is used (the default), the socket
# configuration must be re-generated after changing Port, AddressFamily, or
# ListenAddress.
#
# For changes to take effect, run:
#
# systemctl daemon-reload
# systemctl restart ssh.socket
#
#Port 22
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_ecdsa_key
#HostKey /etc/ssh/ssh_host_ed25519_key
# Ciphers and keying
#RekeyLimit default none
# Logging
#SyslogFacility AUTH
#LogLevel INFO
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin prohibit-password
#StrictModes yes
#MaxAuthTries 6
#MaxSessions 10
PubkeyAuthentication yes
# Expect .ssh/authorized_keys2 to be disregarded by default in future.
AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2
#AuthorizedPrincipalsFile none
#AuthorizedKeysCommand none
#AuthorizedKeysCommandUser nobody
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
KbdInteractiveAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
#GSSAPIStrictAcceptorCheck yes
#GSSAPIKeyExchange no
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the KbdInteractiveAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via KbdInteractiveAuthentication may bypass
# the setting of "PermitRootLogin prohibit-password".
# If you just want the PAM account and session checks to run without
# PAM authentication, then enable this but set PasswordAuthentication
# and KbdInteractiveAuthentication to 'no'.
UsePAM yes
#AllowAgentForwarding yes
#AllowTcpForwarding yes
#GatewayPorts no
X11Forwarding yes
#X11DisplayOffset 10
#X11UseLocalhost yes
#PermitTTY yes
PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
#UseDNS no
#PidFile /run/sshd.pid
#MaxStartups 10:30:100
#PermitTunnel no
#ChrootDirectory none
#VersionAddendum none
# no default banner path
#Banner none
# Allow client to pass locale environment variables
AcceptEnv LANG LC_*
# override default of no subsystems
Subsystem sftp /usr/lib/openssh/sftp-server
# Example of overriding settings on a per-user basis
#Match User anoncvs
# X11Forwarding no
# AllowTcpForwarding no
# PermitTTY no
# ForceCommand cvs server

View File

@@ -0,0 +1,2 @@
alias a="ls -lha"

View File

@@ -0,0 +1,48 @@
#!/bin/bash
##
## This script installs stuff
## to set up a linux server
## suitable for newbies.
##
## Before you go, check read around my blog!
##
## https://softwareshinobi.com
##
##
set -e;
set -x;
##
## create user
##
groupadd -g 4444 shinobi
useradd -u 4444 -g 4444 -rm -d /home/shinobi -s /bin/bash shinobi
##
## set password
##
echo 'shinobi:shinobi' | chpasswd
##
## set up keys
##
cp -r ssh/ /home/shinobi/.ssh
chmod -R 700 /home/shinobi/.ssh
chown -R shinobi: /home/shinobi/.ssh
##
## restrict permissions on home
##
#chmod -R 555 /home/shinobi/
#chmod -R 555 /tmp/

View File

@@ -0,0 +1 @@
ssh-rsa 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 troy@countach

View File

@@ -0,0 +1,49 @@
-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----

View File

@@ -0,0 +1 @@
ssh-rsa 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 troy@countach

View File

@@ -0,0 +1,3 @@
|1|HNfODkbpMvUeHOSv8tzTZdhzUnM=|C+xjDIr71yL49lJOO3eH2dJXJ6k= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID0luCnOEpQCpwxpFWlNSBfJ5uwRUhRlLByOvQGMVifV
|1|7OpTeAWOyu7ejBfKMNIe9aTrizU=|ca3+00vKexJwQZlvLVdgeljuBB0= ssh-rsa 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
|1|A8PuKz/4Ej8eeJqnnr0yrIazths=|kWyDWHoRp7Cuu19ieYtfVaXQfG0= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNYr2TApZxXT00eP7rXHOc7FVs+xUtR8kfsYRh6AlY/zcAbH7w+JFsXIvDa3iIn7PbblM25rgt64LiQZYbUCzpc=