import { Client } from "ssh2"; import { findServerById } from "../services/server"; // Thanks for the idea to https://github.com/healthyhost/audit-vps-script/tree/main const validateUfw = () => ` if command -v ufw >/dev/null 2>&1; then isInstalled=true isActive=$(sudo ufw status | grep -q "Status: active" && echo true || echo false) defaultIncoming=$(sudo ufw status verbose | grep "Default:" | grep "incoming" | awk '{print $2}') echo "{\\"installed\\": $isInstalled, \\"active\\": $isActive, \\"defaultIncoming\\": \\"$defaultIncoming\\"}" else echo "{\\"installed\\": false, \\"active\\": false, \\"defaultIncoming\\": \\"unknown\\"}" fi `; const validateSsh = () => ` if systemctl is-active --quiet sshd || systemctl is-active --quiet ssh; then isEnabled=true # Get the sshd config file path sshd_config=$(sudo sshd -T 2>/dev/null | grep -i "^configfile" | awk '{print $2}') # If we couldn't get the path, use the default if [ -z "$sshd_config" ]; then sshd_config="/etc/ssh/sshd_config" fi # Check for key authentication # SSH key auth is enabled by default unless explicitly disabled pubkey_line=$(sudo grep -i "^PubkeyAuthentication" "$sshd_config" 2>/dev/null | grep -v "#") if [ -z "$pubkey_line" ] || echo "$pubkey_line" | grep -q -i "yes"; then keyAuth=true else keyAuth=false fi # Get the exact PermitRootLogin value from config # This preserves values like "prohibit-password" without normalization permitRootLogin=$(sudo grep -i "^PermitRootLogin" "$sshd_config" 2>/dev/null | grep -v "#" | awk '{print $2}') if [ -z "$permitRootLogin" ]; then # Default is prohibit-password in newer versions permitRootLogin="prohibit-password" fi # Get the exact PasswordAuthentication value from config passwordAuth=$(sudo grep -i "^PasswordAuthentication" "$sshd_config" 2>/dev/null | grep -v "#" | awk '{print $2}') if [ -z "$passwordAuth" ]; then # Default is yes passwordAuth="yes" fi # Get the exact UsePAM value from config usePam=$(sudo grep -i "^UsePAM" "$sshd_config" 2>/dev/null | grep -v "#" | awk '{print $2}') if [ -z "$usePam" ]; then # Default is yes in most distros usePam="yes" fi # Return the results with exact values from config file echo "{\\"enabled\\": $isEnabled, \\"keyAuth\\": $keyAuth, \\"permitRootLogin\\": \\"$permitRootLogin\\", \\"passwordAuth\\": \\"$passwordAuth\\", \\"usePam\\": \\"$usePam\\"}" else echo "{\\"enabled\\": false, \\"keyAuth\\": false, \\"permitRootLogin\\": \\"unknown\\", \\"passwordAuth\\": \\"unknown\\", \\"usePam\\": \\"unknown\\"}" fi `; const validateFail2ban = () => ` if dpkg -l | grep -q "fail2ban"; then isInstalled=true isEnabled=$(systemctl is-enabled --quiet fail2ban.service && echo true || echo false) isActive=$(systemctl is-active --quiet fail2ban.service && echo true || echo false) if [ -f "/etc/fail2ban/jail.local" ]; then sshEnabled=$(grep -A10 "^\\[sshd\\]" /etc/fail2ban/jail.local | grep "enabled" | awk '{print $NF}' | tr -d '[:space:]') sshMode=$(grep -A10 "^\\[sshd\\]" /etc/fail2ban/jail.local | grep "^mode[[:space:]]*=[[:space:]]*aggressive" >/dev/null && echo "aggressive" || echo "normal") echo "{\\"installed\\": $isInstalled, \\"enabled\\": $isEnabled, \\"active\\": $isActive, \\"sshEnabled\\": \\"$sshEnabled\\", \\"sshMode\\": \\"$sshMode\\"}" else echo "{\\"installed\\": $isInstalled, \\"enabled\\": $isEnabled, \\"active\\": $isActive, \\"sshEnabled\\": \\"false\\", \\"sshMode\\": \\"normal\\"}" fi else echo "{\\"installed\\": false, \\"enabled\\": false, \\"active\\": false, \\"sshEnabled\\": \\"false\\", \\"sshMode\\": \\"normal\\"}" fi `; export const serverAudit = async (serverId: string) => { const client = new Client(); const server = await findServerById(serverId); if (!server.sshKeyId) { throw new Error("No SSH Key found"); } return new Promise((resolve, reject) => { client .once("ready", () => { const bashCommand = ` command_exists() { command -v "$@" > /dev/null 2>&1 } ufwStatus=$(${validateUfw()}) sshStatus=$(${validateSsh()}) fail2banStatus=$(${validateFail2ban()}) echo "{\\"ufw\\": $ufwStatus, \\"ssh\\": $sshStatus, \\"fail2ban\\": $fail2banStatus}" `; client.exec(bashCommand, (err, stream) => { if (err) { reject(err); return; } let output = ""; stream .on("close", () => { client.end(); try { const result = JSON.parse(output.trim()); resolve(result); } catch (parseError) { reject( new Error( `Failed to parse output: ${parseError instanceof Error ? parseError.message : parseError}`, ), ); } }) .on("data", (data: string) => { output += data; }) .stderr.on("data", (_data) => {}); }); }) .on("error", (err) => { client.end(); if (err.level === "client-authentication") { reject( new Error( `Authentication failed: Invalid SSH private key. ❌ Error: ${err.message} ${err.level}`, ), ); } else { reject(new Error(`SSH connection error: ${err.message}`)); } }) .connect({ host: server.ipAddress, port: server.port, username: server.username, privateKey: server.sshKey?.privateKey, }); }); };