init.sh
                        
                             · 10 KiB · Bash
                        
                    
                    
                      
                        Eredeti
                      
                    
                      
                    
                        
                          
                        
                    
                    
                
                
                
            #!/usr/bin/env bash
#===============================================================================
# Concise server preparation script with error confirmation (idempotent)
#===============================================================================
set -euo pipefail
export LC_ALL=C
export LANG=en_US.UTF-8
export DEBIAN_FRONTEND=noninteractive
#-----------------------------------
# Colors & Prompts
#-----------------------------------
Green="\033[32m"; Red="\033[31m"; Yellow="\033[33m"; Blue="\033[36m"; Font="\033[0m"
OK="${Green}[  OK  ]${Font}"; ERROR="${Red}[FAILED]${Font}"; WARN="${Yellow}[ WARN ]${Font}"
print_ok(){   echo -e "${OK} $1"; }
print_error(){ echo -e "${ERROR} $1"; }
print_warn(){ echo -e "${WARN} $1"; }
#-----------------------------------
# Error handling & confirmation
#-----------------------------------
on_error(){ print_error "Error at line $1."; areYouSure; }
trap 'on_error $LINENO' ERR
areYouSure(){
  print_warn "Continue despite errors? [y/N]"
  read -r ans
  case $ans in [yY]*) print_ok "Continuing...";; *) print_error "Aborted."; exit 1;; esac
}
#-----------------------------------
# Helpers
#-----------------------------------
run_local(){   print_ok "Local: $*"; "$@"; }
run_remote(){  sshpass -p "$REMOTE_PASS" ssh -o StrictHostKeyChecking=no "$REMOTE_USER@$SERVER" "$*"; }
wait_ssh(){
  print_ok "Waiting for SSH on $SERVER... (Running ssh $REMOTE_USER@$SERVER)"
  until sshpass -p "$REMOTE_PASS" ssh -q \
      -o StrictHostKeyChecking=no \
      -o ConnectTimeout=5 \
      "$REMOTE_USER@$SERVER" exit; do
    print_warn "SSH not ready, retrying in 5s..."
    sleep 5
  done
  print_ok "SSH available."
}
usage(){ echo "Usage: $0 <orig_user> <orig_pass> <server> <new_hostname> <new_user>"; exit 1; }
#-----------------------------------
# Main
#-----------------------------------
[ $# -ne 5 ] && usage
USER="$1"; PASS="$2"; SERVER="$3"; HOSTNAME="$4"; NEWUSER="$5"
REMOTE_USER="$USER"; REMOTE_PASS="$PASS"
# 1) Install sshpass locally
run_local sudo apt-get update -y
run_local sudo apt-get install -y sshpass
# 2) Clear known_hosts, wait for SSH
run_local ssh-keygen -R "$SERVER" -f ~/.ssh/known_hosts
wait_ssh
# 3) Hostname & reboot (only if changed)
CURRENT_HOST=$(run_remote "hostname")
if [[ "$CURRENT_HOST" != "$HOSTNAME" ]]; then
  print_ok "Setting hostname to $HOSTNAME"
  run_remote "sudo hostnamectl set-hostname $HOSTNAME"
  run_remote "sudo reboot" || true
  print_ok "Server rebooting..."
  sleep 5
  wait_ssh
else
  print_ok "Hostname already '$HOSTNAME', skipping"
fi
# 4) Create or verify new user
if run_remote "id -u $NEWUSER" &>/dev/null; then
  print_ok "User $NEWUSER exists"
else
  print_ok "Creating user $NEWUSER"
  run_remote "sudo adduser --disabled-password --gecos '' $NEWUSER"
fi
# 5) Grant sudo & set up passwordless
print_ok "Granting sudo to $NEWUSER"
run_remote "sudo usermod -aG sudo $NEWUSER"
print_ok "Setting passwordless sudo for $NEWUSER"
run_remote "echo '$NEWUSER ALL=(ALL) NOPASSWD:ALL' | sudo tee /etc/sudoers.d/$NEWUSER"
# 6) Generate & persist random password (once)
if run_remote "[ -f /etc/$NEWUSER.pass ]" &>/dev/null; then
  # In this case, the password is already set
  print_ok "Don't have to change password. Reusing existing password for $NEWUSER"
  PASS_NEW=$(run_remote "sudo cat /etc/$NEWUSER.pass")
else
  PASS_NEW=$(uuidgen)
  print_ok "Setting password for $NEWUSER"
  run_remote "echo '$NEWUSER:$PASS_NEW' | sudo chpasswd"
  run_remote "echo '$PASS_NEW' | sudo tee /etc/$NEWUSER.pass > /dev/null"
  run_remote "sudo chmod 600 /etc/$NEWUSER.pass"
  run_remote "sudo chown root:root /etc/$NEWUSER.pass"
  print_ok "New password generated for $NEWUSER and persisted at /etc/$NEWUSER.pass. Please back it up! It can still be used to log in via serial console or rescue mode!"
fi
local_pass_file="./password_${NEWUSER}_at_${SERVER}.txt"
rm -f "$local_pass_file" 2>/dev/null || true
sshpass -p "$REMOTE_PASS" ssh -q -o StrictHostKeyChecking=no \
  "$REMOTE_USER@$SERVER" "sudo cat /etc/$NEWUSER.pass" \
  > "$local_pass_file"
chmod 600 "$local_pass_file"
chown "$USER:$USER" "$local_pass_file"
print_ok "Password for $NEWUSER saved locally at $local_pass_file [DO NOT SHARE THIS FILE! IT CAN BE USED TO LOG IN VIA SERIAL CONSOLE OR RESCUE MODE!]"
# 7) Copy SSH key (only if absent)
[ ! -f ~/.ssh/id_rsa.pub ] && run_local ssh-keygen -t rsa -N "" -f ~/.ssh/id_rsa
PUBKEY=$(<~/.ssh/id_rsa.pub)
print_ok "Ensuring SSH key in authorized_keys"
run_remote "mkdir -p /home/$NEWUSER/.ssh && \
  sudo bash -c 'grep -qxF \"$PUBKEY\" /home/$NEWUSER/.ssh/authorized_keys 2>/dev/null || \
  echo \"$PUBKEY\" >> /home/$NEWUSER/.ssh/authorized_keys' && \
  sudo chown -R $NEWUSER:$NEWUSER /home/$NEWUSER/.ssh && \
  sudo chmod 700 /home/$NEWUSER/.ssh && \
  sudo chmod 600 /home/$NEWUSER/.ssh/authorized_keys"
# Switch to new user for subsequent operations
print_ok "Switching to new user $NEWUSER"
REMOTE_USER="$NEWUSER"; REMOTE_PASS="$PASS_NEW"
wait_ssh
# 8) Harden SSH
print_ok "Hardening SSH settings"
run_remote "sudo sed -i 's/PermitRootLogin yes/PermitRootLogin no/; \
  s/PasswordAuthentication yes/PasswordAuthentication no/; \
  s/#PubkeyAuthentication yes/PubkeyAuthentication yes/' /etc/ssh/sshd_config && \
  sudo systemctl restart sshd || sudo systemctl restart ssh"
# 9) Remove other non-system users
print_ok "Removing other users"
others=$(run_remote "awk -F: -v skip='$NEWUSER' '\$3>=1000 && \$1!=skip {print \$1}' /etc/passwd")
for u in $others; do
  print_warn "Deleting user $u"
  run_remote "sudo pkill -u $u || true; sudo deluser --remove-home $u"
done
# 10) Reset machine-id
print_ok "Resetting machine-id"
run_remote "sudo rm -f /etc/machine-id /var/lib/dbus/machine-id && \
  sudo systemd-machine-id-setup && \
  sudo cp /etc/machine-id /var/lib/dbus/machine-id"
# 11) Enable UFW & OpenSSH
print_ok "Enabling UFW firewall"
run_remote "sudo apt-get install -y ufw && sudo ufw allow OpenSSH && echo y | sudo ufw enable"
# 12) Install & configure Fail2Ban
print_ok "Installing Fail2Ban"
run_remote "sudo apt-get update && sudo apt-get install -y fail2ban"
print_ok "Configuring Fail2Ban"
run_remote <<'EOF'
sudo tee /etc/fail2ban/jail.local > /dev/null <<EOJ
[sshd]
enabled   = true
port      = ssh
filter    = sshd
backend  = systemd
logpath  = journal
maxretry  = 3
findtime  = 600
bantime   = 3600
EOJ
sudo systemctl restart fail2ban
EOF
print_ok "Fail2Ban setup complete"
# 13) Enable BBR (only once)
print_ok "Enabling BBR congestion control"
run_remote <<'EOF'
grep -q 'net.ipv4.tcp_congestion_control = bbr' /etc/sysctl.d/99-bbr.conf 2>/dev/null || {
  sudo tee /etc/sysctl.d/99-bbr.conf > /dev/null <<SYSCTL
net.core.default_qdisc = fq
net.ipv4.tcp_congestion_control = bbr
SYSCTL
  sudo sysctl --system
}
EOF
# 14) Select best mirror & update
print_ok "Selecting best mirror & updating"
run_remote "curl -s https://gist.aiursoft.cn/anduin/879917820a6c4b268fc12c21f1b3fe7a/raw/HEAD/mirror.sh | bash"
run_remote "sudo apt-get update"
# 15) Install or upgrade latest HWE kernel if needed
print_ok "Checking HWE kernel package on remote"
run_remote <<'EOF'
set -euo pipefail
HWE_PKG="$(apt search linux-generic-hwe- \
  | awk -F/ '/linux-generic-hwe-/{print $1; exit}')"
inst="\$(apt-cache policy \$HWE_PKG | awk '/Installed:/ {print \$2}')"
cand="\$(apt-cache policy \$HWE_PKG | awk '/Candidate:/ {print \$2}')"
if dpkg -s "\$HWE_PKG" &>/dev/null; then
  if [ "\$inst" != "\$cand" ]; then
    echo "[  OK  ] Upgrading \$HWE_PKG from \$inst to \$cand"
    sudo apt-get update
    sudo apt-get install -y "\$HWE_PKG"
    echo reboot_required > /tmp/.reboot_flag
  else
    echo "[  OK  ] \$HWE_PKG is already at latest version (\$inst), skipping"
  fi
else
  echo "[  OK  ] Installing \$HWE_PKG (\$cand)"
  sudo apt-get update
  sudo apt-get install -y "\$HWE_PKG"
  echo reboot_required > /tmp/.reboot_flag
fi
EOF
# 16) Conditionally reboot & wait
if run_remote 'test -f /tmp/.reboot_flag'; then
  print_ok "Rebooting server to apply new kernel"
  run_remote "sudo reboot" || true
  sleep 5
  wait_ssh
else
  print_ok "No new kernel installed, skipping reboot"
fi
# 17) Final updates & cleanup
print_ok "Installing upgrades & cleanup"
run_remote "sudo apt-get update && sudo apt-get upgrade -y && sudo apt-get autoremove -y"
# 18) Performance tuning
print_ok "Tuning CPU performance & timezone"
run_remote "sudo apt-get install -y linux-tools-$(uname -r) cpupower && \
  sudo cpupower frequency-set -g performance || true && \
  sudo timedatectl set-timezone GMT"
# 19) Remove snap
print_ok "Removing snapd"
run_remote <<'EOF'
# 1) 如果 snapd.service 存在,就 disable 一下;否则跳过
if systemctl list-unit-files | grep -q '^snapd\.service'; then
  sudo systemctl disable --now snapd || true
else
  echo "[  OK  ] snapd.service not found, skipping disable"
fi
# 2) 如果 dpkg 里检测到 snapd 包,就 purge 并清理数据目录
if dpkg -l snapd &>/dev/null; then
  sudo apt-get purge -y snapd
  sudo rm -rf /snap /var/lib/snapd /var/cache/snapd
else
  echo "[  OK  ] snapd package not installed, skipping purge"
fi
# 3) 在所有机器都写上 no-snap 的 pin
sudo tee /etc/apt/preferences.d/no-snap.pref > /dev/null <<EOP
Package: snapd
Pin: release a=*
Pin-Priority: -10
EOP
EOF
# 20) Final cleanup & benchmark
print_ok "Final autoremove & benchmark"
run_remote "sudo apt-get autoremove -y --purge && \
  sudo apt-get install -y sysbench && sysbench cpu --threads=$(nproc) run && \
  sudo apt-get autoremove -y sysbench --purge"
print_ok "Setup complete. Connect via: ssh $NEWUSER@$SERVER"
# After this script, server will:
# * Only allow SSH key login
# * Root login disabled, password authentication disabled
# * Have a new hostname set
# * Have a new user with sudo privileges and can log in via SSH
# * Have a random password stored securely at /etc/<new_user>.pass
# * Have SSH key copied to authorized_keys so you can log in without a password
# * Be hardened with UFW, Fail2Ban and allowed SSH connections(only)
# * Have BBR enabled for better network performance
# * Have the latest HWE kernel installed
# * Have the best mirror selected for package updates
# * Have snap removed
# * Have CPU performance tuned to 'performance' mode
# * Have timezone set to GMT
# * Have all unnecessary users removed (Check /etc/passwd for remaining users)
# * Have all unnecessary packages removed
# * Have the latest updates installed
# * Have sysbench installed for performance testing
# * Have a final benchmark run to verify CPU performance
# * Have a final cleanup of unnecessary packages
                | 1 | #!/usr/bin/env bash | 
| 2 | #=============================================================================== | 
| 3 | # Concise server preparation script with error confirmation (idempotent) | 
| 4 | #=============================================================================== | 
| 5 | |
| 6 | set -euo pipefail | 
| 7 | export LC_ALL=C | 
| 8 | export LANG=en_US.UTF-8 | 
| 9 | export DEBIAN_FRONTEND=noninteractive | 
| 10 | |
| 11 | #----------------------------------- | 
| 12 | # Colors & Prompts | 
| 13 | #----------------------------------- | 
| 14 | Green="\033[32m"; Red="\033[31m"; Yellow="\033[33m"; Blue="\033[36m"; Font="\033[0m" | 
| 15 | OK="${Green}[ OK ]${Font}"; ERROR="${Red}[FAILED]${Font}"; WARN="${Yellow}[ WARN ]${Font}" | 
| 16 | |
| 17 | print_ok(){ echo -e "${OK} $1"; } | 
| 18 | print_error(){ echo -e "${ERROR} $1"; } | 
| 19 | print_warn(){ echo -e "${WARN} $1"; } | 
| 20 | |
| 21 | #----------------------------------- | 
| 22 | # Error handling & confirmation | 
| 23 | #----------------------------------- | 
| 24 | on_error(){ print_error "Error at line $1."; areYouSure; } | 
| 25 | trap 'on_error $LINENO' ERR | 
| 26 | |
| 27 | areYouSure(){ | 
| 28 | print_warn "Continue despite errors? [y/N]" | 
| 29 | read -r ans | 
| 30 | case $ans in [yY]*) print_ok "Continuing...";; *) print_error "Aborted."; exit 1;; esac | 
| 31 | } | 
| 32 | |
| 33 | #----------------------------------- | 
| 34 | # Helpers | 
| 35 | #----------------------------------- | 
| 36 | run_local(){ print_ok "Local: $*"; "$@"; } | 
| 37 | run_remote(){ sshpass -p "$REMOTE_PASS" ssh -o StrictHostKeyChecking=no "$REMOTE_USER@$SERVER" "$*"; } | 
| 38 | wait_ssh(){ | 
| 39 | print_ok "Waiting for SSH on $SERVER... (Running ssh $REMOTE_USER@$SERVER)" | 
| 40 | until sshpass -p "$REMOTE_PASS" ssh -q \ | 
| 41 | -o StrictHostKeyChecking=no \ | 
| 42 | -o ConnectTimeout=5 \ | 
| 43 | "$REMOTE_USER@$SERVER" exit; do | 
| 44 | print_warn "SSH not ready, retrying in 5s..." | 
| 45 | sleep 5 | 
| 46 | done | 
| 47 | print_ok "SSH available." | 
| 48 | } | 
| 49 | |
| 50 | usage(){ echo "Usage: $0 <orig_user> <orig_pass> <server> <new_hostname> <new_user>"; exit 1; } | 
| 51 | |
| 52 | #----------------------------------- | 
| 53 | # Main | 
| 54 | #----------------------------------- | 
| 55 | [ $# -ne 5 ] && usage | 
| 56 | USER="$1"; PASS="$2"; SERVER="$3"; HOSTNAME="$4"; NEWUSER="$5" | 
| 57 | REMOTE_USER="$USER"; REMOTE_PASS="$PASS" | 
| 58 | |
| 59 | # 1) Install sshpass locally | 
| 60 | run_local sudo apt-get update -y | 
| 61 | run_local sudo apt-get install -y sshpass | 
| 62 | |
| 63 | # 2) Clear known_hosts, wait for SSH | 
| 64 | run_local ssh-keygen -R "$SERVER" -f ~/.ssh/known_hosts | 
| 65 | wait_ssh | 
| 66 | |
| 67 | # 3) Hostname & reboot (only if changed) | 
| 68 | CURRENT_HOST=$(run_remote "hostname") | 
| 69 | if [[ "$CURRENT_HOST" != "$HOSTNAME" ]]; then | 
| 70 | print_ok "Setting hostname to $HOSTNAME" | 
| 71 | run_remote "sudo hostnamectl set-hostname $HOSTNAME" | 
| 72 | run_remote "sudo reboot" || true | 
| 73 | print_ok "Server rebooting..." | 
| 74 | sleep 5 | 
| 75 | wait_ssh | 
| 76 | else | 
| 77 | print_ok "Hostname already '$HOSTNAME', skipping" | 
| 78 | fi | 
| 79 | |
| 80 | # 4) Create or verify new user | 
| 81 | if run_remote "id -u $NEWUSER" &>/dev/null; then | 
| 82 | print_ok "User $NEWUSER exists" | 
| 83 | else | 
| 84 | print_ok "Creating user $NEWUSER" | 
| 85 | run_remote "sudo adduser --disabled-password --gecos '' $NEWUSER" | 
| 86 | fi | 
| 87 | |
| 88 | # 5) Grant sudo & set up passwordless | 
| 89 | print_ok "Granting sudo to $NEWUSER" | 
| 90 | run_remote "sudo usermod -aG sudo $NEWUSER" | 
| 91 | print_ok "Setting passwordless sudo for $NEWUSER" | 
| 92 | run_remote "echo '$NEWUSER ALL=(ALL) NOPASSWD:ALL' | sudo tee /etc/sudoers.d/$NEWUSER" | 
| 93 | |
| 94 | # 6) Generate & persist random password (once) | 
| 95 | if run_remote "[ -f /etc/$NEWUSER.pass ]" &>/dev/null; then | 
| 96 | # In this case, the password is already set | 
| 97 | print_ok "Don't have to change password. Reusing existing password for $NEWUSER" | 
| 98 | PASS_NEW=$(run_remote "sudo cat /etc/$NEWUSER.pass") | 
| 99 | else | 
| 100 | PASS_NEW=$(uuidgen) | 
| 101 | print_ok "Setting password for $NEWUSER" | 
| 102 | run_remote "echo '$NEWUSER:$PASS_NEW' | sudo chpasswd" | 
| 103 | run_remote "echo '$PASS_NEW' | sudo tee /etc/$NEWUSER.pass > /dev/null" | 
| 104 | run_remote "sudo chmod 600 /etc/$NEWUSER.pass" | 
| 105 | run_remote "sudo chown root:root /etc/$NEWUSER.pass" | 
| 106 | print_ok "New password generated for $NEWUSER and persisted at /etc/$NEWUSER.pass. Please back it up! It can still be used to log in via serial console or rescue mode!" | 
| 107 | fi | 
| 108 | |
| 109 | local_pass_file="./password_${NEWUSER}_at_${SERVER}.txt" | 
| 110 | rm -f "$local_pass_file" 2>/dev/null || true | 
| 111 | sshpass -p "$REMOTE_PASS" ssh -q -o StrictHostKeyChecking=no \ | 
| 112 | "$REMOTE_USER@$SERVER" "sudo cat /etc/$NEWUSER.pass" \ | 
| 113 | > "$local_pass_file" | 
| 114 | chmod 600 "$local_pass_file" | 
| 115 | chown "$USER:$USER" "$local_pass_file" | 
| 116 | print_ok "Password for $NEWUSER saved locally at $local_pass_file [DO NOT SHARE THIS FILE! IT CAN BE USED TO LOG IN VIA SERIAL CONSOLE OR RESCUE MODE!]" | 
| 117 | |
| 118 | # 7) Copy SSH key (only if absent) | 
| 119 | [ ! -f ~/.ssh/id_rsa.pub ] && run_local ssh-keygen -t rsa -N "" -f ~/.ssh/id_rsa | 
| 120 | PUBKEY=$(<~/.ssh/id_rsa.pub) | 
| 121 | print_ok "Ensuring SSH key in authorized_keys" | 
| 122 | run_remote "mkdir -p /home/$NEWUSER/.ssh && \ | 
| 123 | sudo bash -c 'grep -qxF \"$PUBKEY\" /home/$NEWUSER/.ssh/authorized_keys 2>/dev/null || \ | 
| 124 | echo \"$PUBKEY\" >> /home/$NEWUSER/.ssh/authorized_keys' && \ | 
| 125 | sudo chown -R $NEWUSER:$NEWUSER /home/$NEWUSER/.ssh && \ | 
| 126 | sudo chmod 700 /home/$NEWUSER/.ssh && \ | 
| 127 | sudo chmod 600 /home/$NEWUSER/.ssh/authorized_keys" | 
| 128 | |
| 129 | # Switch to new user for subsequent operations | 
| 130 | print_ok "Switching to new user $NEWUSER" | 
| 131 | REMOTE_USER="$NEWUSER"; REMOTE_PASS="$PASS_NEW" | 
| 132 | wait_ssh | 
| 133 | |
| 134 | # 8) Harden SSH | 
| 135 | print_ok "Hardening SSH settings" | 
| 136 | run_remote "sudo sed -i 's/PermitRootLogin yes/PermitRootLogin no/; \ | 
| 137 | s/PasswordAuthentication yes/PasswordAuthentication no/; \ | 
| 138 | s/#PubkeyAuthentication yes/PubkeyAuthentication yes/' /etc/ssh/sshd_config && \ | 
| 139 | sudo systemctl restart sshd || sudo systemctl restart ssh" | 
| 140 | |
| 141 | # 9) Remove other non-system users | 
| 142 | print_ok "Removing other users" | 
| 143 | others=$(run_remote "awk -F: -v skip='$NEWUSER' '\$3>=1000 && \$1!=skip {print \$1}' /etc/passwd") | 
| 144 | for u in $others; do | 
| 145 | print_warn "Deleting user $u" | 
| 146 | run_remote "sudo pkill -u $u || true; sudo deluser --remove-home $u" | 
| 147 | done | 
| 148 | |
| 149 | # 10) Reset machine-id | 
| 150 | print_ok "Resetting machine-id" | 
| 151 | run_remote "sudo rm -f /etc/machine-id /var/lib/dbus/machine-id && \ | 
| 152 | sudo systemd-machine-id-setup && \ | 
| 153 | sudo cp /etc/machine-id /var/lib/dbus/machine-id" | 
| 154 | |
| 155 | # 11) Enable UFW & OpenSSH | 
| 156 | print_ok "Enabling UFW firewall" | 
| 157 | run_remote "sudo apt-get install -y ufw && sudo ufw allow OpenSSH && echo y | sudo ufw enable" | 
| 158 | |
| 159 | # 12) Install & configure Fail2Ban | 
| 160 | print_ok "Installing Fail2Ban" | 
| 161 | run_remote "sudo apt-get update && sudo apt-get install -y fail2ban" | 
| 162 | print_ok "Configuring Fail2Ban" | 
| 163 | run_remote <<'EOF' | 
| 164 | sudo tee /etc/fail2ban/jail.local > /dev/null <<EOJ | 
| 165 | [sshd] | 
| 166 | enabled = true | 
| 167 | port = ssh | 
| 168 | filter = sshd | 
| 169 | backend = systemd | 
| 170 | logpath = journal | 
| 171 | maxretry = 3 | 
| 172 | findtime = 600 | 
| 173 | bantime = 3600 | 
| 174 | EOJ | 
| 175 | sudo systemctl restart fail2ban | 
| 176 | EOF | 
| 177 | print_ok "Fail2Ban setup complete" | 
| 178 | |
| 179 | # 13) Enable BBR (only once) | 
| 180 | print_ok "Enabling BBR congestion control" | 
| 181 | run_remote <<'EOF' | 
| 182 | grep -q 'net.ipv4.tcp_congestion_control = bbr' /etc/sysctl.d/99-bbr.conf 2>/dev/null || { | 
| 183 | sudo tee /etc/sysctl.d/99-bbr.conf > /dev/null <<SYSCTL | 
| 184 | net.core.default_qdisc = fq | 
| 185 | net.ipv4.tcp_congestion_control = bbr | 
| 186 | SYSCTL | 
| 187 | sudo sysctl --system | 
| 188 | } | 
| 189 | EOF | 
| 190 | |
| 191 | # 14) Select best mirror & update | 
| 192 | print_ok "Selecting best mirror & updating" | 
| 193 | run_remote "curl -s https://gist.aiursoft.cn/anduin/879917820a6c4b268fc12c21f1b3fe7a/raw/HEAD/mirror.sh | bash" | 
| 194 | run_remote "sudo apt-get update" | 
| 195 | |
| 196 | # 15) Install or upgrade latest HWE kernel if needed | 
| 197 | print_ok "Checking HWE kernel package on remote" | 
| 198 | run_remote <<'EOF' | 
| 199 | set -euo pipefail | 
| 200 | |
| 201 | HWE_PKG="$(apt search linux-generic-hwe- \ | 
| 202 | | awk -F/ '/linux-generic-hwe-/{print $1; exit}')" | 
| 203 | |
| 204 | inst="\$(apt-cache policy \$HWE_PKG | awk '/Installed:/ {print \$2}')" | 
| 205 | cand="\$(apt-cache policy \$HWE_PKG | awk '/Candidate:/ {print \$2}')" | 
| 206 | |
| 207 | if dpkg -s "\$HWE_PKG" &>/dev/null; then | 
| 208 | if [ "\$inst" != "\$cand" ]; then | 
| 209 | echo "[ OK ] Upgrading \$HWE_PKG from \$inst to \$cand" | 
| 210 | sudo apt-get update | 
| 211 | sudo apt-get install -y "\$HWE_PKG" | 
| 212 | echo reboot_required > /tmp/.reboot_flag | 
| 213 | else | 
| 214 | echo "[ OK ] \$HWE_PKG is already at latest version (\$inst), skipping" | 
| 215 | fi | 
| 216 | else | 
| 217 | echo "[ OK ] Installing \$HWE_PKG (\$cand)" | 
| 218 | sudo apt-get update | 
| 219 | sudo apt-get install -y "\$HWE_PKG" | 
| 220 | echo reboot_required > /tmp/.reboot_flag | 
| 221 | fi | 
| 222 | EOF | 
| 223 | |
| 224 | # 16) Conditionally reboot & wait | 
| 225 | if run_remote 'test -f /tmp/.reboot_flag'; then | 
| 226 | print_ok "Rebooting server to apply new kernel" | 
| 227 | run_remote "sudo reboot" || true | 
| 228 | sleep 5 | 
| 229 | wait_ssh | 
| 230 | else | 
| 231 | print_ok "No new kernel installed, skipping reboot" | 
| 232 | fi | 
| 233 | |
| 234 | # 17) Final updates & cleanup | 
| 235 | print_ok "Installing upgrades & cleanup" | 
| 236 | run_remote "sudo apt-get update && sudo apt-get upgrade -y && sudo apt-get autoremove -y" | 
| 237 | |
| 238 | # 18) Performance tuning | 
| 239 | print_ok "Tuning CPU performance & timezone" | 
| 240 | run_remote "sudo apt-get install -y linux-tools-$(uname -r) cpupower && \ | 
| 241 | sudo cpupower frequency-set -g performance || true && \ | 
| 242 | sudo timedatectl set-timezone GMT" | 
| 243 | |
| 244 | # 19) Remove snap | 
| 245 | print_ok "Removing snapd" | 
| 246 | run_remote <<'EOF' | 
| 247 | # 1) 如果 snapd.service 存在,就 disable 一下;否则跳过 | 
| 248 | if systemctl list-unit-files | grep -q '^snapd\.service'; then | 
| 249 | sudo systemctl disable --now snapd || true | 
| 250 | else | 
| 251 | echo "[ OK ] snapd.service not found, skipping disable" | 
| 252 | fi | 
| 253 | |
| 254 | # 2) 如果 dpkg 里检测到 snapd 包,就 purge 并清理数据目录 | 
| 255 | if dpkg -l snapd &>/dev/null; then | 
| 256 | sudo apt-get purge -y snapd | 
| 257 | sudo rm -rf /snap /var/lib/snapd /var/cache/snapd | 
| 258 | else | 
| 259 | echo "[ OK ] snapd package not installed, skipping purge" | 
| 260 | fi | 
| 261 | |
| 262 | # 3) 在所有机器都写上 no-snap 的 pin | 
| 263 | sudo tee /etc/apt/preferences.d/no-snap.pref > /dev/null <<EOP | 
| 264 | Package: snapd | 
| 265 | Pin: release a=* | 
| 266 | Pin-Priority: -10 | 
| 267 | EOP | 
| 268 | EOF | 
| 269 | |
| 270 | # 20) Final cleanup & benchmark | 
| 271 | print_ok "Final autoremove & benchmark" | 
| 272 | run_remote "sudo apt-get autoremove -y --purge && \ | 
| 273 | sudo apt-get install -y sysbench && sysbench cpu --threads=$(nproc) run && \ | 
| 274 | sudo apt-get autoremove -y sysbench --purge" | 
| 275 | |
| 276 | print_ok "Setup complete. Connect via: ssh $NEWUSER@$SERVER" | 
| 277 | |
| 278 | # After this script, server will: | 
| 279 | |
| 280 | # * Only allow SSH key login | 
| 281 | # * Root login disabled, password authentication disabled | 
| 282 | # * Have a new hostname set | 
| 283 | # * Have a new user with sudo privileges and can log in via SSH | 
| 284 | # * Have a random password stored securely at /etc/<new_user>.pass | 
| 285 | # * Have SSH key copied to authorized_keys so you can log in without a password | 
| 286 | # * Be hardened with UFW, Fail2Ban and allowed SSH connections(only) | 
| 287 | # * Have BBR enabled for better network performance | 
| 288 | # * Have the latest HWE kernel installed | 
| 289 | # * Have the best mirror selected for package updates | 
| 290 | # * Have snap removed | 
| 291 | # * Have CPU performance tuned to 'performance' mode | 
| 292 | # * Have timezone set to GMT | 
| 293 | # * Have all unnecessary users removed (Check /etc/passwd for remaining users) | 
| 294 | # * Have all unnecessary packages removed | 
| 295 | # * Have the latest updates installed | 
| 296 | # * Have sysbench installed for performance testing | 
| 297 | # * Have a final benchmark run to verify CPU performance | 
| 298 | # * Have a final cleanup of unnecessary packages | 
                    
                        
                        install_fail2ban.sh
                        
                             · 1.1 KiB · Bash
                        
                    
                    
                      
                        Eredeti
                      
                    
                      
                    
                        
                          
                        
                    
                    
                
                
                
            #!/usr/bin/env bash
set -euo pipefail
echo "[+] Updating package index and installing fail2ban..."
sudo apt update
sudo apt install -y fail2ban
echo "[+] Writing /etc/fail2ban/jail.local..."
sudo tee /etc/fail2ban/jail.local > /dev/null <<'EOF'
[sshd]
enabled  = true
port     = ssh
filter   = sshd
logpath  = /var/log/auth.log
maxretry = 3
findtime = 600
bantime  = 3600
EOF
sleep 1
echo "[+] Restarting fail2ban service..."
sudo systemctl restart fail2ban
echo "=== Fail2Ban global status ==="
# Allow script to continue even if fail2ban-client status fails (e.g., socket not yet ready)
sudo fail2ban-client status || true
echo "=== SSHD jail status ==="
sudo fail2ban-client status sshd || true
echo "Tip: To view the currently banned IP list again, run:"
echo "sudo fail2ban-client status sshd"
echo "Tip: To unban an IP address, run:"
echo "sudo fail2ban-client set sshd unbanip <IP_ADDRESS>"
echo "Tip: To ban an IP address manually, run:"
echo "sudo fail2ban-client set sshd banip <IP_ADDRESS>"
echo "Tip: To view the fail2ban logs, run:"
echo "sudo journalctl -u fail2ban"
                | 1 | #!/usr/bin/env bash | 
| 2 | set -euo pipefail | 
| 3 | |
| 4 | echo "[+] Updating package index and installing fail2ban..." | 
| 5 | sudo apt update | 
| 6 | sudo apt install -y fail2ban | 
| 7 | |
| 8 | echo "[+] Writing /etc/fail2ban/jail.local..." | 
| 9 | sudo tee /etc/fail2ban/jail.local > /dev/null <<'EOF' | 
| 10 | [sshd] | 
| 11 | enabled = true | 
| 12 | port = ssh | 
| 13 | filter = sshd | 
| 14 | logpath = /var/log/auth.log | 
| 15 | maxretry = 3 | 
| 16 | findtime = 600 | 
| 17 | bantime = 3600 | 
| 18 | EOF | 
| 19 | sleep 1 | 
| 20 | |
| 21 | echo "[+] Restarting fail2ban service..." | 
| 22 | sudo systemctl restart fail2ban | 
| 23 | |
| 24 | echo "=== Fail2Ban global status ===" | 
| 25 | # Allow script to continue even if fail2ban-client status fails (e.g., socket not yet ready) | 
| 26 | sudo fail2ban-client status || true | 
| 27 | |
| 28 | echo "=== SSHD jail status ===" | 
| 29 | sudo fail2ban-client status sshd || true | 
| 30 | |
| 31 | echo "Tip: To view the currently banned IP list again, run:" | 
| 32 | echo "sudo fail2ban-client status sshd" | 
| 33 | |
| 34 | echo "Tip: To unban an IP address, run:" | 
| 35 | echo "sudo fail2ban-client set sshd unbanip <IP_ADDRESS>" | 
| 36 | |
| 37 | echo "Tip: To ban an IP address manually, run:" | 
| 38 | echo "sudo fail2ban-client set sshd banip <IP_ADDRESS>" | 
| 39 | |
| 40 | echo "Tip: To view the fail2ban logs, run:" | 
| 41 | echo "sudo journalctl -u fail2ban" | 
| 42 | 
                    
                        
                        mirror.sh
                        
                             · 4.9 KiB · Bash
                        
                    
                    
                      
                        Eredeti
                      
                    
                      
                    
                        
                          
                        
                    
                    
                
                
                
            #!/usr/bin/env bash
# Step 1: Ensure required packages are installed
sudo apt update
sudo apt install -y curl apt-transport-https lsb-release
function switchSource() {
  # Get current Ubuntu codename (e.g., jammy, focal, bionic)
  codename=$(lsb_release -cs)
  # Define a list of potential mirrors
  mirrors=(
    "https://archive.ubuntu.com/ubuntu/"
    "https://mirror.aarnet.edu.au/pub/ubuntu/archive/" # Australia
    "https://mirror.fsmg.org.nz/ubuntu/"               # New Zealand
    "https://mirrors.neterra.net/ubuntu/archive/"       # Bulgaria
    "https://mirror.csclub.uwaterloo.ca/ubuntu/"        # Canada
    "https://mirrors.dotsrc.org/ubuntu/"                # Denmark
    "https://mirrors.nic.funet.fi/ubuntu/"              # Finland
    "https://mirror.ubuntu.ikoula.com/"                 # France
    "https://mirror.xtom.com.hk/ubuntu/"                # Hong Kong
    "https://mirrors.piconets.webwerks.in/ubuntu-mirror/ubuntu/" # India
    "https://ftp.udx.icscoe.jp/Linux/ubuntu/"           # Japan
    "https://ftp.kaist.ac.kr/ubuntu/"                   # Korea
    "https://ubuntu.mirror.garr.it/ubuntu/"             # Italy
    "https://ftp.uni-stuttgart.de/ubuntu/"              # Germany
    "https://mirror.i3d.net/pub/ubuntu/"                # Netherlands
    "https://mirroronet.pl/pub/mirrors/ubuntu/"         # Poland
    "https://ubuntu.mobinhost.com/ubuntu/"              # Iran
    "http://sg.archive.ubuntu.com/ubuntu/"              # Singapore
    "http://ossmirror.mycloud.services/os/linux/ubuntu/" # Singapore
    "https://mirror.enzu.com/ubuntu/"                   # United States
    "http://jp.archive.ubuntu.com/ubuntu/"              # Japan
    "http://kr.archive.ubuntu.com/ubuntu/"              # Korea
    "http://us.archive.ubuntu.com/ubuntu/"              # United States
    "http://tw.archive.ubuntu.com/ubuntu/"              # Taiwan
    "https://mirror.twds.com.tw/ubuntu/"                # Taiwan
    "https://ubuntu.mirrors.uk2.net/ubuntu/"            # United Kingdom
    "http://mirrors.ustc.edu.cn/ubuntu/"                # 中国科学技术大学
    "http://ftp.sjtu.edu.cn/ubuntu/"                    # 上海交通大学
    "http://mirrors.tuna.tsinghua.edu.cn/ubuntu/"       # 清华大学
    "http://mirrors.aliyun.com/ubuntu/"                 # 阿里云
    "http://mirrors.163.com/ubuntu/"                    # 网易
    "http://mirrors.cloud.tencent.com/ubuntu/"          # 腾讯云
    "http://mirror.aiursoft.cn/ubuntu/"                 # Aiursoft
    "http://mirrors.huaweicloud.com/ubuntu/"            # 华为云
    "http://mirrors.zju.edu.cn/ubuntu/"                 # 浙江大学
    "http://azure.archive.ubuntu.com/ubuntu/"           # Azure
    "https://mirrors.isu.net.sa/apt-mirror/"            # Saudi Arabia
    "https://mirror.team-host.ru/ubuntu/"               # Russia
    "https://labs.eif.urjc.es/mirror/ubuntu/"           # Spain
    "https://mirror.alastyr.com/ubuntu/ubuntu-archive/" # Turkey
    "https://ftp.acc.umu.se/ubuntu/"                    # Sweden
    "https://mirror.kku.ac.th/ubuntu/"                  # Thailand
    "https://mirror.bizflycloud.vn/ubuntu/"             # Vietnam
  )
  declare -A results
  # Function to test speed of a single mirror
  test_speed() {
    url="$1"
    # Attempt to do a quick GET and measure total time
    response="$(curl -o /dev/null -s -w "%{http_code} %{time_total}\n" \
                --connect-timeout 1 --max-time 2 "$url")"
    http_code=$(echo "$response" | awk '{print $1}')
    time_total=$(echo "$response" | awk '{print $2}')
    # If HTTP code == 200, mark the measured time; otherwise use a large value
    if [ "$http_code" -eq 200 ]; then
      results["$url"]="$time_total"
    else
      echo "Failed to access $url (HTTP code: $http_code)"
      results["$url"]="9999"
    fi
  }
  echo "Testing all mirrors for Ubuntu '$codename'..."
  for mirror in "${mirrors[@]}"; do
    test_speed "$mirror"
  done
  # Sort mirrors by time_total
  # Example of sorted_mirrors entry: "https://archive.ubuntu.com/ubuntu/ 0.034"
  sorted_mirrors="$(
    for url in "${!results[@]}"; do
      echo "$url ${results[$url]}"
    done | sort -k2 -n
  )"
  echo
  echo "=== Sorted mirrors by response time (ascending) ==="
  echo "$sorted_mirrors"
  echo
  # Pick the top (fastest) mirror from the sorted list
  fastest_mirror="$(echo "$sorted_mirrors" | head -n 1 | awk '{print $1}')"
  echo "Fastest mirror found: $fastest_mirror"
  echo "Updating /etc/apt/sources.list..."
  # Update /etc/apt/sources.list with the fastest mirror
  sudo tee /etc/apt/sources.list >/dev/null <<EOF
deb $fastest_mirror $codename main restricted universe multiverse
deb $fastest_mirror $codename-updates main restricted universe multiverse
deb $fastest_mirror $codename-backports main restricted universe multiverse
deb $fastest_mirror $codename-security main restricted universe multiverse
EOF
  # Final check
  sudo apt update
  echo "All done!"
}
# Call the main function
switchSource
                | 1 | #!/usr/bin/env bash | 
| 2 | # Step 1: Ensure required packages are installed | 
| 3 | sudo apt update | 
| 4 | sudo apt install -y curl apt-transport-https lsb-release | 
| 5 | |
| 6 | function switchSource() { | 
| 7 | # Get current Ubuntu codename (e.g., jammy, focal, bionic) | 
| 8 | codename=$(lsb_release -cs) | 
| 9 | |
| 10 | # Define a list of potential mirrors | 
| 11 | mirrors=( | 
| 12 | "https://archive.ubuntu.com/ubuntu/" | 
| 13 | "https://mirror.aarnet.edu.au/pub/ubuntu/archive/" # Australia | 
| 14 | "https://mirror.fsmg.org.nz/ubuntu/" # New Zealand | 
| 15 | "https://mirrors.neterra.net/ubuntu/archive/" # Bulgaria | 
| 16 | "https://mirror.csclub.uwaterloo.ca/ubuntu/" # Canada | 
| 17 | "https://mirrors.dotsrc.org/ubuntu/" # Denmark | 
| 18 | "https://mirrors.nic.funet.fi/ubuntu/" # Finland | 
| 19 | "https://mirror.ubuntu.ikoula.com/" # France | 
| 20 | "https://mirror.xtom.com.hk/ubuntu/" # Hong Kong | 
| 21 | "https://mirrors.piconets.webwerks.in/ubuntu-mirror/ubuntu/" # India | 
| 22 | "https://ftp.udx.icscoe.jp/Linux/ubuntu/" # Japan | 
| 23 | "https://ftp.kaist.ac.kr/ubuntu/" # Korea | 
| 24 | "https://ubuntu.mirror.garr.it/ubuntu/" # Italy | 
| 25 | "https://ftp.uni-stuttgart.de/ubuntu/" # Germany | 
| 26 | "https://mirror.i3d.net/pub/ubuntu/" # Netherlands | 
| 27 | "https://mirroronet.pl/pub/mirrors/ubuntu/" # Poland | 
| 28 | "https://ubuntu.mobinhost.com/ubuntu/" # Iran | 
| 29 | "http://sg.archive.ubuntu.com/ubuntu/" # Singapore | 
| 30 | "http://ossmirror.mycloud.services/os/linux/ubuntu/" # Singapore | 
| 31 | "https://mirror.enzu.com/ubuntu/" # United States | 
| 32 | "http://jp.archive.ubuntu.com/ubuntu/" # Japan | 
| 33 | "http://kr.archive.ubuntu.com/ubuntu/" # Korea | 
| 34 | "http://us.archive.ubuntu.com/ubuntu/" # United States | 
| 35 | "http://tw.archive.ubuntu.com/ubuntu/" # Taiwan | 
| 36 | "https://mirror.twds.com.tw/ubuntu/" # Taiwan | 
| 37 | "https://ubuntu.mirrors.uk2.net/ubuntu/" # United Kingdom | 
| 38 | "http://mirrors.ustc.edu.cn/ubuntu/" # 中国科学技术大学 | 
| 39 | "http://ftp.sjtu.edu.cn/ubuntu/" # 上海交通大学 | 
| 40 | "http://mirrors.tuna.tsinghua.edu.cn/ubuntu/" # 清华大学 | 
| 41 | "http://mirrors.aliyun.com/ubuntu/" # 阿里云 | 
| 42 | "http://mirrors.163.com/ubuntu/" # 网易 | 
| 43 | "http://mirrors.cloud.tencent.com/ubuntu/" # 腾讯云 | 
| 44 | "http://mirror.aiursoft.cn/ubuntu/" # Aiursoft | 
| 45 | "http://mirrors.huaweicloud.com/ubuntu/" # 华为云 | 
| 46 | "http://mirrors.zju.edu.cn/ubuntu/" # 浙江大学 | 
| 47 | "http://azure.archive.ubuntu.com/ubuntu/" # Azure | 
| 48 | "https://mirrors.isu.net.sa/apt-mirror/" # Saudi Arabia | 
| 49 | "https://mirror.team-host.ru/ubuntu/" # Russia | 
| 50 | "https://labs.eif.urjc.es/mirror/ubuntu/" # Spain | 
| 51 | "https://mirror.alastyr.com/ubuntu/ubuntu-archive/" # Turkey | 
| 52 | "https://ftp.acc.umu.se/ubuntu/" # Sweden | 
| 53 | "https://mirror.kku.ac.th/ubuntu/" # Thailand | 
| 54 | "https://mirror.bizflycloud.vn/ubuntu/" # Vietnam | 
| 55 | ) | 
| 56 | |
| 57 | declare -A results | 
| 58 | |
| 59 | # Function to test speed of a single mirror | 
| 60 | test_speed() { | 
| 61 | url="$1" | 
| 62 | # Attempt to do a quick GET and measure total time | 
| 63 | response="$(curl -o /dev/null -s -w "%{http_code} %{time_total}\n" \ | 
| 64 | --connect-timeout 1 --max-time 2 "$url")" | 
| 65 | |
| 66 | http_code=$(echo "$response" | awk '{print $1}') | 
| 67 | time_total=$(echo "$response" | awk '{print $2}') | 
| 68 | |
| 69 | # If HTTP code == 200, mark the measured time; otherwise use a large value | 
| 70 | if [ "$http_code" -eq 200 ]; then | 
| 71 | results["$url"]="$time_total" | 
| 72 | else | 
| 73 | echo "Failed to access $url (HTTP code: $http_code)" | 
| 74 | results["$url"]="9999" | 
| 75 | fi | 
| 76 | } | 
| 77 | |
| 78 | echo "Testing all mirrors for Ubuntu '$codename'..." | 
| 79 | for mirror in "${mirrors[@]}"; do | 
| 80 | test_speed "$mirror" | 
| 81 | done | 
| 82 | |
| 83 | # Sort mirrors by time_total | 
| 84 | # Example of sorted_mirrors entry: "https://archive.ubuntu.com/ubuntu/ 0.034" | 
| 85 | sorted_mirrors="$( | 
| 86 | for url in "${!results[@]}"; do | 
| 87 | echo "$url ${results[$url]}" | 
| 88 | done | sort -k2 -n | 
| 89 | )" | 
| 90 | |
| 91 | echo | 
| 92 | echo "=== Sorted mirrors by response time (ascending) ===" | 
| 93 | echo "$sorted_mirrors" | 
| 94 | echo | 
| 95 | |
| 96 | # Pick the top (fastest) mirror from the sorted list | 
| 97 | fastest_mirror="$(echo "$sorted_mirrors" | head -n 1 | awk '{print $1}')" | 
| 98 | |
| 99 | echo "Fastest mirror found: $fastest_mirror" | 
| 100 | echo "Updating /etc/apt/sources.list..." | 
| 101 | |
| 102 | # Update /etc/apt/sources.list with the fastest mirror | 
| 103 | sudo tee /etc/apt/sources.list >/dev/null <<EOF | 
| 104 | deb $fastest_mirror $codename main restricted universe multiverse | 
| 105 | deb $fastest_mirror $codename-updates main restricted universe multiverse | 
| 106 | deb $fastest_mirror $codename-backports main restricted universe multiverse | 
| 107 | deb $fastest_mirror $codename-security main restricted universe multiverse | 
| 108 | EOF | 
| 109 | |
| 110 | # Final check | 
| 111 | sudo apt update | 
| 112 | echo "All done!" | 
| 113 | } | 
| 114 | |
| 115 | # Call the main function | 
| 116 | switchSource |