|
|
import { Client } from "ssh2"; |
|
|
import { findServerById } from "../services/server"; |
|
|
|
|
|
|
|
|
const validateUfw = () => ` |
|
|
if command -v ufw >/dev/null 2>&1; then |
|
|
isInstalled=true |
|
|
isActive=$(sudo ufw status | grep -q "Status: active" && echo true || echo false) |
|
|
defaultIncoming=$(sudo ufw status verbose | grep "Default:" | grep "incoming" | awk '{print $2}') |
|
|
echo "{\\"installed\\": $isInstalled, \\"active\\": $isActive, \\"defaultIncoming\\": \\"$defaultIncoming\\"}" |
|
|
else |
|
|
echo "{\\"installed\\": false, \\"active\\": false, \\"defaultIncoming\\": \\"unknown\\"}" |
|
|
fi |
|
|
`; |
|
|
|
|
|
const validateSsh = () => ` |
|
|
if systemctl is-active --quiet sshd || systemctl is-active --quiet ssh; then |
|
|
isEnabled=true |
|
|
|
|
|
# Get the sshd config file path |
|
|
sshd_config=$(sudo sshd -T 2>/dev/null | grep -i "^configfile" | awk '{print $2}') |
|
|
|
|
|
# If we couldn't get the path, use the default |
|
|
if [ -z "$sshd_config" ]; then |
|
|
sshd_config="/etc/ssh/sshd_config" |
|
|
fi |
|
|
|
|
|
# Check for key authentication |
|
|
# SSH key auth is enabled by default unless explicitly disabled |
|
|
pubkey_line=$(sudo grep -i "^PubkeyAuthentication" "$sshd_config" 2>/dev/null | grep -v "#") |
|
|
if [ -z "$pubkey_line" ] || echo "$pubkey_line" | grep -q -i "yes"; then |
|
|
keyAuth=true |
|
|
else |
|
|
keyAuth=false |
|
|
fi |
|
|
|
|
|
# Get the exact PermitRootLogin value from config |
|
|
# This preserves values like "prohibit-password" without normalization |
|
|
permitRootLogin=$(sudo grep -i "^PermitRootLogin" "$sshd_config" 2>/dev/null | grep -v "#" | awk '{print $2}') |
|
|
if [ -z "$permitRootLogin" ]; then |
|
|
# Default is prohibit-password in newer versions |
|
|
permitRootLogin="prohibit-password" |
|
|
fi |
|
|
|
|
|
# Get the exact PasswordAuthentication value from config |
|
|
passwordAuth=$(sudo grep -i "^PasswordAuthentication" "$sshd_config" 2>/dev/null | grep -v "#" | awk '{print $2}') |
|
|
if [ -z "$passwordAuth" ]; then |
|
|
# Default is yes |
|
|
passwordAuth="yes" |
|
|
fi |
|
|
|
|
|
# Get the exact UsePAM value from config |
|
|
usePam=$(sudo grep -i "^UsePAM" "$sshd_config" 2>/dev/null | grep -v "#" | awk '{print $2}') |
|
|
if [ -z "$usePam" ]; then |
|
|
# Default is yes in most distros |
|
|
usePam="yes" |
|
|
fi |
|
|
|
|
|
# Return the results with exact values from config file |
|
|
echo "{\\"enabled\\": $isEnabled, \\"keyAuth\\": $keyAuth, \\"permitRootLogin\\": \\"$permitRootLogin\\", \\"passwordAuth\\": \\"$passwordAuth\\", \\"usePam\\": \\"$usePam\\"}" |
|
|
else |
|
|
echo "{\\"enabled\\": false, \\"keyAuth\\": false, \\"permitRootLogin\\": \\"unknown\\", \\"passwordAuth\\": \\"unknown\\", \\"usePam\\": \\"unknown\\"}" |
|
|
fi |
|
|
`; |
|
|
|
|
|
const validateFail2ban = () => ` |
|
|
if dpkg -l | grep -q "fail2ban"; then |
|
|
isInstalled=true |
|
|
isEnabled=$(systemctl is-enabled --quiet fail2ban.service && echo true || echo false) |
|
|
isActive=$(systemctl is-active --quiet fail2ban.service && echo true || echo false) |
|
|
|
|
|
if [ -f "/etc/fail2ban/jail.local" ]; then |
|
|
sshEnabled=$(grep -A10 "^\\[sshd\\]" /etc/fail2ban/jail.local | grep "enabled" | awk '{print $NF}' | tr -d '[:space:]') |
|
|
sshMode=$(grep -A10 "^\\[sshd\\]" /etc/fail2ban/jail.local | grep "^mode[[:space:]]*=[[:space:]]*aggressive" >/dev/null && echo "aggressive" || echo "normal") |
|
|
echo "{\\"installed\\": $isInstalled, \\"enabled\\": $isEnabled, \\"active\\": $isActive, \\"sshEnabled\\": \\"$sshEnabled\\", \\"sshMode\\": \\"$sshMode\\"}" |
|
|
else |
|
|
echo "{\\"installed\\": $isInstalled, \\"enabled\\": $isEnabled, \\"active\\": $isActive, \\"sshEnabled\\": \\"false\\", \\"sshMode\\": \\"normal\\"}" |
|
|
fi |
|
|
else |
|
|
echo "{\\"installed\\": false, \\"enabled\\": false, \\"active\\": false, \\"sshEnabled\\": \\"false\\", \\"sshMode\\": \\"normal\\"}" |
|
|
fi |
|
|
`; |
|
|
|
|
|
export const serverAudit = async (serverId: string) => { |
|
|
const client = new Client(); |
|
|
const server = await findServerById(serverId); |
|
|
if (!server.sshKeyId) { |
|
|
throw new Error("No SSH Key found"); |
|
|
} |
|
|
|
|
|
return new Promise<any>((resolve, reject) => { |
|
|
client |
|
|
.once("ready", () => { |
|
|
const bashCommand = ` |
|
|
command_exists() { |
|
|
command -v "$@" > /dev/null 2>&1 |
|
|
} |
|
|
|
|
|
ufwStatus=$(${validateUfw()}) |
|
|
sshStatus=$(${validateSsh()}) |
|
|
fail2banStatus=$(${validateFail2ban()}) |
|
|
|
|
|
echo "{\\"ufw\\": $ufwStatus, \\"ssh\\": $sshStatus, \\"fail2ban\\": $fail2banStatus}" |
|
|
`; |
|
|
|
|
|
client.exec(bashCommand, (err, stream) => { |
|
|
if (err) { |
|
|
reject(err); |
|
|
return; |
|
|
} |
|
|
let output = ""; |
|
|
stream |
|
|
.on("close", () => { |
|
|
client.end(); |
|
|
try { |
|
|
const result = JSON.parse(output.trim()); |
|
|
resolve(result); |
|
|
} catch (parseError) { |
|
|
reject( |
|
|
new Error( |
|
|
`Failed to parse output: ${parseError instanceof Error ? parseError.message : parseError}`, |
|
|
), |
|
|
); |
|
|
} |
|
|
}) |
|
|
.on("data", (data: string) => { |
|
|
output += data; |
|
|
}) |
|
|
.stderr.on("data", (_data) => {}); |
|
|
}); |
|
|
}) |
|
|
.on("error", (err) => { |
|
|
client.end(); |
|
|
if (err.level === "client-authentication") { |
|
|
reject( |
|
|
new Error( |
|
|
`Authentication failed: Invalid SSH private key. ❌ Error: ${err.message} ${err.level}`, |
|
|
), |
|
|
); |
|
|
} else { |
|
|
reject(new Error(`SSH connection error: ${err.message}`)); |
|
|
} |
|
|
}) |
|
|
.connect({ |
|
|
host: server.ipAddress, |
|
|
port: server.port, |
|
|
username: server.username, |
|
|
privateKey: server.sshKey?.privateKey, |
|
|
}); |
|
|
}); |
|
|
}; |
|
|
|