From dd36a0857968cc15cfeba780bbd08ff3e9f0a7af Mon Sep 17 00:00:00 2001 From: Tommy Date: Sun, 28 Apr 2024 11:47:46 -0700 Subject: [PATCH] Remove unmaintained scripts Signed-off-by: Tommy --- GCP-Debian-11-Docker.sh | 40 ------- GCP-Debian-11.sh | 209 ------------------------------------ RHEL-Server-9.sh | 231 ---------------------------------------- openSUSE-Aeon.sh | 106 ------------------ 4 files changed, 586 deletions(-) delete mode 100644 GCP-Debian-11-Docker.sh delete mode 100644 GCP-Debian-11.sh delete mode 100644 RHEL-Server-9.sh delete mode 100644 openSUSE-Aeon.sh diff --git a/GCP-Debian-11-Docker.sh b/GCP-Debian-11-Docker.sh deleted file mode 100644 index fb902f4..0000000 --- a/GCP-Debian-11-Docker.sh +++ /dev/null @@ -1,40 +0,0 @@ -#!/bin/bash - -# Copyright (C) 2021-2024 Thien Tran -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy of -# the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT -# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the -# License for the specific language governing permissions and limitations under -# the License. - -#Run this after GCP-Debian-11.sh - -output(){ - echo -e '\e[36m'"$1"'\e[0m'; -} - -unpriv(){ - sudo -u nobody "$@" -} - -# Install Docker -sudo mkdir -m 0755 -p /etc/apt/keyrings -unpriv curl -fsSL https://download.docker.com/linux/debian/gpg | sudo gpg --dearmor -o /etc/apt/keyrings/docker.gpg -echo "deb [arch=$(dpkg --print-architecture) signed-by=/etc/apt/keyrings/docker.gpg] https://download.docker.com/linux/debian $(lsb_release -cs) stable" | sudo tee /etc/apt/sources.list.d/docker.list > /dev/null -sudo apt update -sudo apt -y --no-install-recommends install docker-ce - -# Install gVisor -unpriv curl -fsSL https://gvisor.dev/archive.key | sudo gpg --dearmor -o /usr/share/keyrings/gvisor-archive-keyring.gpg -echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/gvisor-archive-keyring.gpg] https://storage.googleapis.com/gvisor/releases release main" | sudo tee /etc/apt/sources.list.d/gvisor.list > /dev/null -sudo apt update -sudo apt -y --no-install-recommends install runsc -sudo runsc installl -sudo systemctl restart docker \ No newline at end of file diff --git a/GCP-Debian-11.sh b/GCP-Debian-11.sh deleted file mode 100644 index 4f0d6cf..0000000 --- a/GCP-Debian-11.sh +++ /dev/null @@ -1,209 +0,0 @@ -#!/bin/bash - -# Copyright (C) 2021-2024 Thien Tran -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy of -# the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT -# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the -# License for the specific language governing permissions and limitations under -# the License. - -output(){ - echo -e '\e[36m'"$1"'\e[0m'; -} - -unpriv(){ - sudo -u nobody "$@" -} - -# Compliance and updates -sudo systemctl mask debug-shell.service - -## Avoid phased updates -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/apt/apt.conf.d/99sane-upgrades | sudo tee /etc/apt/apt.conf.d/99sane-upgrades -sudo chmod 644 /etc/apt/apt.conf.d/99sane-upgrades - -sudo apt update -sudo apt full-upgrade -y -sudo apt autoremove -y - -# Make home directory private -sudo chmod 700 /home/* - -# Setup NTS -sudo rm -rf /etc/chrony/chrony.conf -unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/chrony.conf | sudo tee /etc/chrony/chrony.conf -sudo systemctl restart chronyd - -# Setup repositories -sudo find /etc/apt/sources.list.d -type f -exec sudo sed -i 's/http:/https:/g' {} \; - -# Setup ufw -sudo apt install ufw -y -sudo ufw enable -sudo ufw allow OpenSSH - -# Harden SSH -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/ssh/sshd_config.d/10-custom.conf | sudo tee /etc/ssh/sshd_config.d/10-custom.conf -sudo chmod 644 /etc/ssh/sshd_config.d/10-custom.conf -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/ssh/ssh_config.d/10-custom.conf | sudo tee /etc/ssh/ssh_config.d/10-custom.conf -sudo chmod 644 /etc/ssh/ssh_config.d/10-custom.conf -sudo mkdir -p /etc/systemd/system/ssh.service.d -unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/sshd.service.d/local.conf | sudo tee /etc/systemd/system/ssh.service.d/override.conf -sudo systemctl daemon-reload -sudo systemctl restart sshd - -# Kernel Hardening - -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf -sudo chmod 644 /etc/modprobe.d/30_security-misc.conf -sudo sed -i 's/#install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf -sudo sed -i 's/# install bluetooth/install bluetooth/g' /etc/modprobe.d/30_security-misc.conf -sudo sed -i 's/# install btusb/install btusb/g' /etc/modprobe.d/30_security-misc.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf -sudo chmod 644 /etc/sysctl.d/990-security-misc.conf -sudo sed -i 's/kernel.yama.ptrace_scope=2/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf -sudo sed -i 's/net.ipv4.icmp_echo_ignore_all=1/net.ipv4.icmp_echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf -sudo sed -i 's/net.ipv6.icmp.echo_ignore_all=1/net.ipv6.icmp.echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf | sudo tee /etc/sysctl.d/30_silent-kernel-printk.conf -sudo chmod 644 /etc/sysctl.d/30_silent-kernel-printk.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf | sudo tee /etc/sysctl.d/30_security-misc_kexec-disable.conf -sudo chmod 644 /etc/sysctl.d/30_security-misc_kexec-disable.conf -sudo sysctl -p - -# Rebuild initramfs -sudo update-initramfs -u - -# Disable coredump -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf - -# System Hardening -sudo mkdir -p /etc/systemd/system/NetworkManager.service.d -curl https://gitlab.com/divested/brace/-/raw/master/brace/usr/lib/systemd/system/NetworkManager.service.d/99-brace.conf | sudo tee /etc/systemd/system/NetworkManager.service.d/99-brace.conf - -# Update GRUB config -# shellcheck disable=SC2016 -echo 'GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX mitigations=auto,nosmt spectre_v2=on spec_store_bypass_disable=on tsx=off kvm.nx_huge_pages=force nosmt=force l1d_flush=on spec_rstack_overflow=safe-ret random.trust_bootloader=off random.trust_cpu=off intel_iommu=on amd_iommu=force_isolation efi=disable_early_pci_dma iommu=force iommu.passthrough=0 iommu.strict=1 slab_nomerge init_on_alloc=1 init_on_free=1 pti=on vsyscall=none ia32_emulation=0 page_alloc.shuffle=1 randomize_kstack_offset=on debugfs=off"' | sudo tee -a /etc/grub.d/40_custom -sudo update-grub - -# Setup tuned -sudo dnf install tuned -y -sudo tuned-adm profile virtual-guest - -# Enable fstrim.timer -sudo systemctl enable --now fstrim.timer - -### Differentiating bare metal and virtual installs - -# Installing tuned first here because virt-what is 1 of its dependencies anyways -sudo apt install tuned -y - -virt_type=$(virt-what) -if [ "$virt_type" = "" ]; then - output 'Virtualization: Bare Metal.' -elif [ "$virt_type" = 'openvz lxc' ]; then - output 'Virtualization: OpenVZ 7.' -elif [ "$virt_type" = 'xen xen-hvm' ]; then - output 'Virtualization: Xen-HVM.' -elif [ "$virt_type" = 'xen xen-hvm aws' ]; then - output 'Virtualization: Xen-HVM on AWS.' -else - output "Virtualization: $virt_type." -fi - -# Setup tuned -if [ "$virt_type" = "" ]; then - sudo tuned-adm profile latency-performance -else - sudo tuned-adm profile virtual-guest -fi - -# Setup fwupd -if [ "$virt_type" = '' ]; then - sudo apt install fwupd -y - echo 'UriSchemes=file;https' | sudo tee -a /etc/fwupd/fwupd.conf - sudo systemctl restart fwupd - mkdir -p /etc/systemd/system/fwupd-refresh.service.d - unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/system/fwupd-refresh.service.d/override.conf | sudo tee /etc/systemd/system/fwupd-refresh.service.d/override.conf - sudo systemctl daemon-reload - sudo systemctl enable --now fwupd-refresh.timer -fi - -# Setup unbound -sudo apt instal unbound resolvconf -y - -echo 'server: - trust-anchor-signaling: yes - root-key-sentinel: yes - tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt - - hide-identity: yes - hide-trustanchor: yes - hide-version: yes - deny-any: yes - harden-algo-downgrade: yes - harden-large-queries: yes - harden-referral-path: yes - ignore-cd-flag: yes - max-udp-size: 3072 - module-config: "validator iterator" - qname-minimisation-strict: yes - unwanted-reply-threshold: 10000000 - use-caps-for-id: yes - - outgoing-port-permit: 1024-65535 - - prefetch: yes - prefetch-key: yes - - -forward-zone: - name: "." - forward-tls-upstream: yes - forward-addr: 1.1.1.2@853#security.cloudflare-dns.com - forward-addr: 1.0.0.2@853#security.cloudflare-dns.com - forward-addr: 2606:4700:4700::1112@853#security.cloudflare-dns.com - forward-addr: 2606:4700:4700::1002@853#security.cloudflare-dns.com' | sudo tee /etc/unbound/unbound.conf.d/custom.conf - -mkdir -p /etc/systemd/system/unbound.service.d -echo $'[Service] -CapabilityBoundingSet=CAP_NET_BIND_SERVICE CAP_SETGID CAP_SETUID CAP_SYS_CHROOT CAP_SYS_RESOURCE CAP_NET_RAW -MemoryDenyWriteExecute=true -NoNewPrivileges=true -PrivateDevices=true -PrivateTmp=true -ProtectHome=true -ProtectClock=true -ProtectControlGroups=true -ProtectKernelLogs=true -ProtectKernelModules=true -# This breaks using socket options like \'so-rcvbuf\'. Explicitly disable for visibility. -ProtectKernelTunables=false -ProtectProc=invisible -RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX -RestrictRealtime=true -SystemCallArchitectures=native -SystemCallFilter=~@clock @cpu-emulation @debug @keyring @module mount @obsolete @resources -RestrictNamespaces=yes -LockPersonality=yes -RestrictSUIDSGID=yes -ReadWritePaths=@UNBOUND_RUN_DIR@ @UNBOUND_CHROOT_DIR@ - -# Below rules are needed when chroot is enabled (usually it\'s enabled by default). -# If chroot is disabled like chroot: "" then they may be safely removed. -TemporaryFileSystem=@UNBOUND_CHROOT_DIR@/dev:ro -TemporaryFileSystem=@UNBOUND_CHROOT_DIR@/run:ro -BindReadOnlyPaths=-/run/systemd/notify:@UNBOUND_CHROOT_DIR@/run/systemd/notify -BindReadOnlyPaths=-/dev/urandom:@UNBOUND_CHROOT_DIR@/dev/urandom -BindPaths=-/dev/log:@UNBOUND_CHROOT_DIR@/dev/log' | sudo tee /etc/systemd/system/unbound.service.d/override.conf - -sudo systemctl daemon-reload -sudo systemctl restart unbound -sudo systemctl disable systemd-resolved -sudo reboot \ No newline at end of file diff --git a/RHEL-Server-9.sh b/RHEL-Server-9.sh deleted file mode 100644 index b422b0a..0000000 --- a/RHEL-Server-9.sh +++ /dev/null @@ -1,231 +0,0 @@ -#!/bin/bash - -# Copyright (C) 2021-2024 Thien Tran -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy of -# the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT -# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the -# License for the specific language governing permissions and limitations under -# the License. - -output(){ - echo -e '\e[36m'"$1"'\e[0m'; -} - -unpriv(){ - sudo -u nobody "$@" -} - -# Compliance -sudo systemctl mask debug-shell.service -sudo systemctl mask kdump.service - -# Setup NTS -unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/chrony.conf | sudo tee /etc/chrony.conf -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/sysconfig/chronyd | sudo tee /etc/sysconfig/chronyd - -sudo systemctl restart chronyd - -# Make home directory private -sudo chmod 700 /home/* - -# Setup Firewalld - -sudo firewall-cmd --permanent --remove-service=cockpit -sudo firewall-cmd --reload -sudo firewall-cmd --lockdown-on - -# Remove nullok -sudo /usr/bin/sed -i 's/\s+nullok//g' /etc/pam.d/system-auth - -# Harden SSH -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/ssh/sshd_config.d/10-custom.conf | sudo tee /etc/ssh/sshd_config.d/10-custom.conf -sudo chmod 644 /etc/ssh/sshd_config.d/10-custom.conf -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/ssh/ssh_config.d/10-custom.conf | sudo tee /etc/ssh/ssh_config.d/10-custom.conf -sudo chmod 644 /etc/ssh/ssh_config.d/10-custom.conf -unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/sshd.service.d/local.conf | sudo tee /etc/systemd/system/sshd.service.d/override.conf -sudo systemctl daemon-reload -sudo systemctl restart sshd - -# Kernel hardening - -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf -sudo sed -i 's/#install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf -sudo sed -i 's/# install bluetooth/install bluetooth/g' /etc/modprobe.d/30_security-misc.conf -sudo sed -i 's/# install btusb/install btusb/g' /etc/modprobe.d/30_security-misc.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf -sudo sed -i 's/kernel.yama.ptrace_scope=2/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf -sudo sed -i 's/net.ipv4.icmp_echo_ignore_all=1/net.ipv4.icmp_echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf -sudo sed -i 's/net.ipv6.icmp.echo_ignore_all=1/net.ipv6.icmp.echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf | sudo tee /etc/sysctl.d/30_silent-kernel-printk.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf | sudo tee /etc/sysctl.d/30_security-misc_kexec-disable.conf -sudo dracut -f -sudo sysctl -p -sudo grubby --update-kernel=ALL --args='mitigations=auto,nosmt spectre_v2=on spec_store_bypass_disable=on tsx=off kvm.nx_huge_pages=force nosmt=force l1d_flush=on spec_rstack_overflow=safe-ret random.trust_bootloader=off random.trust_cpu=off intel_iommu=on amd_iommu=force_isolation efi=disable_early_pci_dma iommu=force iommu.passthrough=0 iommu.strict=1 slab_nomerge init_on_alloc=1 init_on_free=1 pti=on vsyscall=none ia32_emulation=0 page_alloc.shuffle=1 randomize_kstack_offset=on debugfs=off lockdown=confidentiality module.sig_enforce=1' - -# Disable coredump -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf - -# Systemd Hardening - -sudo mkdir -p /etc/systemd/system/NetworkManager.service.d -unpriv curl https://gitlab.com/divested/brace/-/raw/master/brace/usr/lib/systemd/system/NetworkManager.service.d/99-brace.conf | sudo tee /etc/systemd/system/NetworkManager.service.d/99-brace.conf -sudo systemctl daemon-reload -sudo systemctl restart NetworkManager - -sudo mkdir -p /etc/systemd/system/irqbalance.service.d -unpriv curl https://gitlab.com/divested/brace/-/raw/master/brace/usr/lib/systemd/system/irqbalance.service.d/99-brace.conf | sudo tee /etc/systemd/system/irqbalance.service.d/99-brace.conf -sudo systemctl daemon-reload -sudo systemctl restart irqbalance - -# Remove packages - -sudo dnf remove baobab chrome-gnome-shell evince firefox gedit gnome-calculator gnome-characters gnome-font-viewer gnome-screenshot gnome-tour qemu-guest-agent 'sssd*' 'yelp*' - -# Setup dnf -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dnf/dnf.conf | sudo tee /etc/dnf/dnf.conf -sudo sed -i 's/^metalink=.*/&\&protocol=https/g' /etc/yum.repos.d/* - -# Setup unbound - -sudo dnf install unbound -y - -echo 'server: - chroot: "" - - auto-trust-anchor-file: "/var/lib/unbound/root.key" - trust-anchor-signaling: yes - root-key-sentinel: yes - - tls-ciphers: "PROFILE=SYSTEM" - - hide-http-user-agent: yes - hide-identity: yes - hide-trustanchor: yes - hide-version: yes - - deny-any: yes - harden-algo-downgrade: yes - harden-large-queries: yes - harden-referral-path: yes - ignore-cd-flag: yes - max-udp-size: 3072 - module-config: "validator iterator" - qname-minimisation-strict: yes - unwanted-reply-threshold: 10000000 - use-caps-for-id: yes - - outgoing-port-permit: 1024-65535 - - prefetch: yes - prefetch-key: yes - -forward-zone: - name: "." - forward-tls-upstream: yes - forward-addr: 1.1.1.2@853#security.cloudflare-dns.com - forward-addr: 1.0.0.2@853#security.cloudflare-dns.com - forward-addr: 2606:4700:4700::1112@853#security.cloudflare-dns.com - forward-addr: 2606:4700:4700::1002@853#security.cloudflare-dns.com' | sudo tee /etc/unbound/unbound.conf - -mkdir -p /etc/systemd/system/unbound.service.d -echo $'[Service] -MemoryDenyWriteExecute=true -PrivateDevices=true -PrivateTmp=true -ProtectHome=true -ProtectClock=true -ProtectControlGroups=true -ProtectKernelLogs=true -ProtectKernelModules=true -# This breaks using socket options like \'so-rcvbuf\'. Explicitly disable for visibility. -ProtectKernelTunables=true -ProtectProc=invisible -RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX -RestrictRealtime=true -SystemCallArchitectures=native -SystemCallFilter=~@clock @cpu-emulation @debug @keyring @module mount @obsolete @resources -RestrictNamespaces=yes -LockPersonality=yes' | sudo tee /etc/systemd/system/unbound.service.d/override.conf - -sudo systemctl enable --now unbound - -# Setup yara -sudo dnf install -y yara -sudo insights-client --collector malware-detection -sudo sed -i 's/test_scan: true/test_scan: false/' /etc/insights-client/malware-detection-config.yml - -# Setup automatic updates - -sudo sed -i 's/apply_updates = no/apply_updates = yes\nreboot = when-needed/g' /etc/dnf/automatic.conf -sudo systemctl enable --now dnf-automatic.timer - -# Enable fstrim.timer -sudo systemctl enable --now fstrim.timer - -### Differentiating bare metal and virtual installs - -# Installing tuned first here because virt-what is 1 of its dependencies anyways -sudo dnf install tuned -y - -virt_type=$(virt-what) -if [ "$virt_type" = '' ]; then - output 'Virtualization: Bare Metal.' -elif [ "$virt_type" = 'openvz lxc' ]; then - output 'Virtualization: OpenVZ 7.' -elif [ "$virt_type" = 'xen xen-hvm' ]; then - output 'Virtualization: Xen-HVM.' -elif [ "$virt_type" = 'xen xen-hvm aws' ]; then - output 'Virtualization: Xen-HVM on AWS.' -else - output "Virtualization: $virt_type." -fi - -# Setup tuned -if [ "$virt_type" = '' ]; then - sudo tuned-adm profile latency-performance - if [ "$virt_type" = 'kvm' ]; then - sudo dnf install qemu-guest-agent -y - fi -else - sudo tuned-adm profile virtual-guest -fi - -# Setup real-ucode and hardened_malloc -if [ "$virt_type" = '' ] || [ "${MACHINE_TYPE}" == 'x86_64' ]; then - sudo dnf install 'https://divested.dev/rpm/fedora/divested-release-20231210-2.noarch.rpm' -y - sudo sed -i 's/^metalink=.*/&?protocol=https/g' /etc/yum.repos.d/divested-release.repo - if [ "${MACHINE_TYPE}" != 'x86_64' ]; then - sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,real-ucode,microcode_ctl,amd-ucode-firmware - sudo dnf install real-ucode -y - sudo dracut -f - elif [ "$virt_type" != '' ]; then - sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,hardened_malloc - sudo dnf install hardened_malloc -y - else - sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,real-ucode,microcode_ctl,amd-ucode-firmware,hardened_malloc - sudo dnf install real-ucode hardened_malloc -y - echo 'libhardened_malloc.so' | sudo tee /etc/ld.so.preload - sudo dracut -f - fi -elif [ "${MACHINE_TYPE}" == 'aarch64' ]; then - sudo dnf copr enable secureblue/hardened_malloc -y - sudo dnf install hardened_malloc -y -fi - -# Setup fwupd -if [ "$virt_type" = '' ]; then - sudo dnf install fwupd -y - echo 'UriSchemes=file;https' | sudo tee -a /etc/fwupd/fwupd.conf - sudo systemctl restart fwupd - mkdir -p /etc/systemd/system/fwupd-refresh.service.d - unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/system/fwupd-refresh.service.d/override.conf | sudo tee /etc/systemd/system/fwupd-refresh.service.d/override.conf - sudo systemctl daemon-reload - sudo systemctl enable --now fwupd-refresh.timer -fi diff --git a/openSUSE-Aeon.sh b/openSUSE-Aeon.sh deleted file mode 100644 index de74f02..0000000 --- a/openSUSE-Aeon.sh +++ /dev/null @@ -1,106 +0,0 @@ -#!/bin/bash - -# Copyright (C) 2021-2024 Thien Tran -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy of -# the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT -# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the -# License for the specific language governing permissions and limitations under -# the License. - -#Please note that this is how I PERSONALLY setup my computer - I do some stuff such as not using anything to download GNOME extensions from extensions.gnome.org and installing the extensions as a package instead - -# Meant to run as the normal user - other stuff needs to be done with transactional-update shell - -output(){ - echo -e '\e[36m'"$1"'\e[0m'; -} - -unpriv(){ - sudo -u nobody "$@" -} - -# Compliance -sudo systemctl mask debug-shell.service -sudo systemctl mask kdump.service - -# Make home directory private -sudo chmod 700 /home/* - -# Setup NTS -sudo rm -rf /etc/chrony/chrony.conf -unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/chrony.conf | sudo tee /etc/chrony/chrony.conf -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/sysconfig/chronyd | sudo tee /etc/sysconfig/chronyd - -sudo systemctl restart chronyd - -# Setup Networking -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/NetworkManager/conf.d/00-macrandomize.conf | sudo tee /etc/NetworkManager/conf.d/00-macrandomize.conf -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/NetworkManager/conf.d/01-transient-hostname.conf | sudo tee /etc/NetworkManager/conf.d/01-transient-hostname.conf -sudo nmcli general reload conf -sudo hostnamectl hostname 'localhost' -sudo hostnamectl --transient hostname '' -sudo firewall-cmd --set-default-zone=block -sudo firewall-cmd --permanent --add-service=dhcpv6-client -sudo firewall-cmd --reload -sudo firewall-cmd --lockdown-on - -# Harden SSH -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/ssh/ssh_config.d/10-custom.conf | sudo tee /etc/ssh/ssh_config.d/10-custom.conf -sudo chmod 644 /etc/ssh/ssh_config.d/10-custom.conf - -# Security kernel settings -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf -sudo chmod 644 /etc/modprobe.d/30_security-misc.conf -sudo sed -i 's/#install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf -sudo chmod 644 /etc/sysctl.d/990-security-misc.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf | sudo tee /etc/sysctl.d/30_silent-kernel-printk.conf -sudo chmod 644 /etc/sysctl.d/30_silent-kernel-printk.conf -unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf | sudo tee /etc/sysctl.d/30_security-misc_kexec-disable.conf -sudo chmod 644 /etc/sysctl.d/30_security-misc_kexec-disable.conf -sudo sed -i 's/kernel.yama.ptrace_scope=2/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf - -# Disable coredump -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf - -# Systemd Hardening -sudo mkdir -p /etc/systemd/system/NetworkManager.service.d -unpriv curl https://gitlab.com/divested/brace/-/raw/master/brace/usr/lib/systemd/system/NetworkManager.service.d/99-brace.conf | sudo tee /etc/systemd/system/NetworkManager.service.d/99-brace.conf -sudo systemctl restart NetworkManager - -# Disable XWayland -umask 022 -sudo mkdir -p /etc/systemd/user/org.gnome.Shell@wayland.service.d -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/user/org.gnome.Shell%40wayland.service.d/override.conf | sudo tee /etc/systemd/user/org.gnome.Shell@wayland.service.d/override.conf -umask 077 - -# Setup dconf -umask 022 -mkdir -p /etc/dconf/db/local.d/locks - -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dconf/db/local.d/locks/automount-disable | sudo tee /etc/dconf/db/local.d/locks/automount-disable -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dconf/db/local.d/locks/privacy | sudo tee /etc/dconf/db/local.d/locks/privacy - -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dconf/db/local.d/automount-disable | sudo tee /etc/dconf/db/local.d/automount-disable -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dconf/db/local.d/button-layout | sudo tee /etc/dconf/db/local.d/button-layout -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dconf/db/local.d/prefer-dark | sudo tee /etc/dconf/db/local.d/prefer-dark -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dconf/db/local.d/privacy | sudo tee /etc/dconf/db/local.d/privacy -unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dconf/db/local.d/touchpad | sudo tee /etc/dconf/db/local.d/touchpad - -sudo dconf update -umask 077 - -# Setup Flatpak -sudo flatpak override --system --nosocket=x11 --nosocket=fallback-x11 --nosocket=pulseaudio --unshare=network --unshare=ipc --nofilesystem=host:reset --nodevice=input --nodevice=shm --nodevice=all --no-talk-name=org.freedesktop.Flatpak --no-talk-name=org.freedesktop.systemd1 --no-talk-name=ca.desrt.dconf --no-talk-name=org.gnome.Shell.Extensions -flatpak override --user --nosocket=x11 --nosocket=fallback-x11 --nosocket=pulseaudio --unshare=network --unshare=ipc --nofilesystem=host:reset --nodevice=input --nodevice=shm --nodevice=all --no-talk-name=org.freedesktop.Flatpak --no-talk-name=org.freedesktop.systemd1 --no-talk-name=ca.desrt.dconf --no-talk-name=org.gnome.Shell.Extensions -flatpak remote-add --if-not-exists --user flathub https://dl.flathub.org/repo/flathub.flatpakrepo -flatpak --user install com.github.tchx84.Flatseal org.gnome.Loupe -y -flatpak --user override com.github.tchx84.Flatseal --filesystem=/var/lib/flatpak/app:ro --filesystem=xdg-data/flatpak/app:ro --filesystem=xdg-data/flatpak/overrides:create -flatpak update -y \ No newline at end of file