init.sh
· 10 KiB · Bash
Raw
#!/usr/bin/env bash
#===============================================================================
# Concise server preparation script with error confirmation (idempotent)
#===============================================================================
set -euo pipefail
export LC_ALL=C
export LANG=en_US.UTF-8
export DEBIAN_FRONTEND=noninteractive
#-----------------------------------
# Colors & Prompts
#-----------------------------------
Green="\033[32m"; Red="\033[31m"; Yellow="\033[33m"; Blue="\033[36m"; Font="\033[0m"
OK="${Green}[ OK ]${Font}"; ERROR="${Red}[FAILED]${Font}"; WARN="${Yellow}[ WARN ]${Font}"
print_ok(){ echo -e "${OK} $1"; }
print_error(){ echo -e "${ERROR} $1"; }
print_warn(){ echo -e "${WARN} $1"; }
#-----------------------------------
# Error handling & confirmation
#-----------------------------------
on_error(){ print_error "Error at line $1."; areYouSure; }
trap 'on_error $LINENO' ERR
areYouSure(){
print_warn "Continue despite errors? [y/N]"
read -r ans
case $ans in [yY]*) print_ok "Continuing...";; *) print_error "Aborted."; exit 1;; esac
}
#-----------------------------------
# Helpers
#-----------------------------------
run_local(){ print_ok "Local: $*"; "$@"; }
run_remote(){ sshpass -p "$REMOTE_PASS" ssh -o StrictHostKeyChecking=no "$REMOTE_USER@$SERVER" "$*"; }
wait_ssh(){
print_ok "Waiting for SSH on $SERVER... (Running ssh $REMOTE_USER@$SERVER)"
until sshpass -p "$REMOTE_PASS" ssh -q \
-o StrictHostKeyChecking=no \
-o ConnectTimeout=5 \
"$REMOTE_USER@$SERVER" exit; do
print_warn "SSH not ready, retrying in 5s..."
sleep 5
done
print_ok "SSH available."
}
usage(){ echo "Usage: $0 <orig_user> <orig_pass> <server> <new_hostname> <new_user>"; exit 1; }
#-----------------------------------
# Main
#-----------------------------------
[ $# -ne 5 ] && usage
USER="$1"; PASS="$2"; SERVER="$3"; HOSTNAME="$4"; NEWUSER="$5"
REMOTE_USER="$USER"; REMOTE_PASS="$PASS"
# 1) Install sshpass locally
run_local sudo apt-get update -y
run_local sudo apt-get install -y sshpass
# 2) Clear known_hosts, wait for SSH
run_local ssh-keygen -R "$SERVER" -f ~/.ssh/known_hosts
wait_ssh
# 3) Hostname & reboot (only if changed)
CURRENT_HOST=$(run_remote "hostname")
if [[ "$CURRENT_HOST" != "$HOSTNAME" ]]; then
print_ok "Setting hostname to $HOSTNAME"
run_remote "sudo hostnamectl set-hostname $HOSTNAME"
run_remote "sudo reboot" || true
print_ok "Server rebooting..."
sleep 5
wait_ssh
else
print_ok "Hostname already '$HOSTNAME', skipping"
fi
# 4) Create or verify new user
if run_remote "id -u $NEWUSER" &>/dev/null; then
print_ok "User $NEWUSER exists"
else
print_ok "Creating user $NEWUSER"
run_remote "sudo adduser --disabled-password --gecos '' $NEWUSER"
fi
# 5) Grant sudo & set up passwordless
print_ok "Granting sudo to $NEWUSER"
run_remote "sudo usermod -aG sudo $NEWUSER"
print_ok "Setting passwordless sudo for $NEWUSER"
run_remote "echo '$NEWUSER ALL=(ALL) NOPASSWD:ALL' | sudo tee /etc/sudoers.d/$NEWUSER"
# 6) Generate & persist random password (once)
if run_remote "[ -f /etc/$NEWUSER.pass ]" &>/dev/null; then
# In this case, the password is already set
print_ok "Don't have to change password. Reusing existing password for $NEWUSER"
PASS_NEW=$(run_remote "sudo cat /etc/$NEWUSER.pass")
else
PASS_NEW=$(uuidgen)
print_ok "Setting password for $NEWUSER"
run_remote "echo '$NEWUSER:$PASS_NEW' | sudo chpasswd"
run_remote "echo '$PASS_NEW' | sudo tee /etc/$NEWUSER.pass > /dev/null"
run_remote "sudo chmod 600 /etc/$NEWUSER.pass"
run_remote "sudo chown root:root /etc/$NEWUSER.pass"
print_ok "New password generated for $NEWUSER and persisted at /etc/$NEWUSER.pass. Please back it up! It can still be used to log in via serial console or rescue mode!"
fi
local_pass_file="./password_${NEWUSER}_at_${SERVER}.txt"
rm -f "$local_pass_file" 2>/dev/null || true
sshpass -p "$REMOTE_PASS" ssh -q -o StrictHostKeyChecking=no \
"$REMOTE_USER@$SERVER" "sudo cat /etc/$NEWUSER.pass" \
> "$local_pass_file"
chmod 600 "$local_pass_file"
chown "$USER:$USER" "$local_pass_file"
print_ok "Password for $NEWUSER saved locally at $local_pass_file [DO NOT SHARE THIS FILE! IT CAN BE USED TO LOG IN VIA SERIAL CONSOLE OR RESCUE MODE!]"
# 7) Copy SSH key (only if absent)
[ ! -f ~/.ssh/id_rsa.pub ] && run_local ssh-keygen -t rsa -N "" -f ~/.ssh/id_rsa
PUBKEY=$(<~/.ssh/id_rsa.pub)
print_ok "Ensuring SSH key in authorized_keys"
run_remote "mkdir -p /home/$NEWUSER/.ssh && \
sudo bash -c 'grep -qxF \"$PUBKEY\" /home/$NEWUSER/.ssh/authorized_keys 2>/dev/null || \
echo \"$PUBKEY\" >> /home/$NEWUSER/.ssh/authorized_keys' && \
sudo chown -R $NEWUSER:$NEWUSER /home/$NEWUSER/.ssh && \
sudo chmod 700 /home/$NEWUSER/.ssh && \
sudo chmod 600 /home/$NEWUSER/.ssh/authorized_keys"
# Switch to new user for subsequent operations
print_ok "Switching to new user $NEWUSER"
REMOTE_USER="$NEWUSER"; REMOTE_PASS="$PASS_NEW"
wait_ssh
# 8) Harden SSH
print_ok "Hardening SSH settings"
run_remote "sudo sed -i 's/PermitRootLogin yes/PermitRootLogin no/; \
s/PasswordAuthentication yes/PasswordAuthentication no/; \
s/#PubkeyAuthentication yes/PubkeyAuthentication yes/' /etc/ssh/sshd_config && \
sudo systemctl restart sshd || sudo systemctl restart ssh"
# 9) Remove other non-system users
print_ok "Removing other users"
others=$(run_remote "awk -F: -v skip='$NEWUSER' '\$3>=1000 && \$1!=skip {print \$1}' /etc/passwd")
for u in $others; do
print_warn "Deleting user $u"
run_remote "sudo pkill -u $u || true; sudo deluser --remove-home $u"
done
# 10) Reset machine-id
print_ok "Resetting machine-id"
run_remote "sudo rm -f /etc/machine-id /var/lib/dbus/machine-id && \
sudo systemd-machine-id-setup && \
sudo cp /etc/machine-id /var/lib/dbus/machine-id"
# 11) Enable UFW & OpenSSH
print_ok "Enabling UFW firewall"
run_remote "sudo apt-get install -y ufw && sudo ufw allow OpenSSH && echo y | sudo ufw enable"
# 12) Install & configure Fail2Ban
print_ok "Installing Fail2Ban"
run_remote "sudo apt-get update && sudo apt-get install -y fail2ban"
print_ok "Configuring Fail2Ban"
run_remote <<'EOF'
sudo tee /etc/fail2ban/jail.local > /dev/null <<EOJ
[sshd]
enabled = true
port = ssh
filter = sshd
backend = systemd
logpath = journal
maxretry = 3
findtime = 600
bantime = 3600
EOJ
sudo systemctl restart fail2ban
EOF
print_ok "Fail2Ban setup complete"
# 13) Enable BBR (only once)
print_ok "Enabling BBR congestion control"
run_remote <<'EOF'
grep -q 'net.ipv4.tcp_congestion_control = bbr' /etc/sysctl.d/99-bbr.conf 2>/dev/null || {
sudo tee /etc/sysctl.d/99-bbr.conf > /dev/null <<SYSCTL
net.core.default_qdisc = fq
net.ipv4.tcp_congestion_control = bbr
SYSCTL
sudo sysctl --system
}
EOF
# 14) Select best mirror & update
print_ok "Selecting best mirror & updating"
run_remote "curl -s https://gist.aiursoft.cn/anduin/879917820a6c4b268fc12c21f1b3fe7a/raw/HEAD/mirror.sh | bash"
run_remote "sudo apt-get update"
# 15) Install or upgrade latest HWE kernel if needed
print_ok "Checking HWE kernel package on remote"
run_remote <<'EOF'
set -euo pipefail
HWE_PKG="$(apt search linux-generic-hwe- \
| awk -F/ '/linux-generic-hwe-/{print $1; exit}')"
inst="\$(apt-cache policy \$HWE_PKG | awk '/Installed:/ {print \$2}')"
cand="\$(apt-cache policy \$HWE_PKG | awk '/Candidate:/ {print \$2}')"
if dpkg -s "\$HWE_PKG" &>/dev/null; then
if [ "\$inst" != "\$cand" ]; then
echo "[ OK ] Upgrading \$HWE_PKG from \$inst to \$cand"
sudo apt-get update
sudo apt-get install -y "\$HWE_PKG"
echo reboot_required > /tmp/.reboot_flag
else
echo "[ OK ] \$HWE_PKG is already at latest version (\$inst), skipping"
fi
else
echo "[ OK ] Installing \$HWE_PKG (\$cand)"
sudo apt-get update
sudo apt-get install -y "\$HWE_PKG"
echo reboot_required > /tmp/.reboot_flag
fi
EOF
# 16) Conditionally reboot & wait
if run_remote 'test -f /tmp/.reboot_flag'; then
print_ok "Rebooting server to apply new kernel"
run_remote "sudo reboot" || true
sleep 5
wait_ssh
else
print_ok "No new kernel installed, skipping reboot"
fi
# 17) Final updates & cleanup
print_ok "Installing upgrades & cleanup"
run_remote "sudo apt-get update && sudo apt-get upgrade -y && sudo apt-get autoremove -y"
# 18) Performance tuning
print_ok "Tuning CPU performance & timezone"
run_remote "sudo apt-get install -y linux-tools-$(uname -r) cpupower && \
sudo cpupower frequency-set -g performance || true && \
sudo timedatectl set-timezone GMT"
# 19) Remove snap
print_ok "Removing snapd"
run_remote <<'EOF'
# 1) 如果 snapd.service 存在,就 disable 一下;否则跳过
if systemctl list-unit-files | grep -q '^snapd\.service'; then
sudo systemctl disable --now snapd || true
else
echo "[ OK ] snapd.service not found, skipping disable"
fi
# 2) 如果 dpkg 里检测到 snapd 包,就 purge 并清理数据目录
if dpkg -l snapd &>/dev/null; then
sudo apt-get purge -y snapd
sudo rm -rf /snap /var/lib/snapd /var/cache/snapd
else
echo "[ OK ] snapd package not installed, skipping purge"
fi
# 3) 在所有机器都写上 no-snap 的 pin
sudo tee /etc/apt/preferences.d/no-snap.pref > /dev/null <<EOP
Package: snapd
Pin: release a=*
Pin-Priority: -10
EOP
EOF
# 20) Final cleanup & benchmark
print_ok "Final autoremove & benchmark"
run_remote "sudo apt-get autoremove -y --purge && \
sudo apt-get install -y sysbench && sysbench cpu --threads=$(nproc) run && \
sudo apt-get autoremove -y sysbench --purge"
print_ok "Setup complete. Connect via: ssh $NEWUSER@$SERVER"
# After this script, server will:
# * Only allow SSH key login
# * Root login disabled, password authentication disabled
# * Have a new hostname set
# * Have a new user with sudo privileges and can log in via SSH
# * Have a random password stored securely at /etc/<new_user>.pass
# * Have SSH key copied to authorized_keys so you can log in without a password
# * Be hardened with UFW, Fail2Ban and allowed SSH connections(only)
# * Have BBR enabled for better network performance
# * Have the latest HWE kernel installed
# * Have the best mirror selected for package updates
# * Have snap removed
# * Have CPU performance tuned to 'performance' mode
# * Have timezone set to GMT
# * Have all unnecessary users removed (Check /etc/passwd for remaining users)
# * Have all unnecessary packages removed
# * Have the latest updates installed
# * Have sysbench installed for performance testing
# * Have a final benchmark run to verify CPU performance
# * Have a final cleanup of unnecessary packages
1 | #!/usr/bin/env bash |
2 | #=============================================================================== |
3 | # Concise server preparation script with error confirmation (idempotent) |
4 | #=============================================================================== |
5 | |
6 | set -euo pipefail |
7 | export LC_ALL=C |
8 | export LANG=en_US.UTF-8 |
9 | export DEBIAN_FRONTEND=noninteractive |
10 | |
11 | #----------------------------------- |
12 | # Colors & Prompts |
13 | #----------------------------------- |
14 | Green="\033[32m"; Red="\033[31m"; Yellow="\033[33m"; Blue="\033[36m"; Font="\033[0m" |
15 | OK="${Green}[ OK ]${Font}"; ERROR="${Red}[FAILED]${Font}"; WARN="${Yellow}[ WARN ]${Font}" |
16 | |
17 | print_ok(){ echo -e "${OK} $1"; } |
18 | print_error(){ echo -e "${ERROR} $1"; } |
19 | print_warn(){ echo -e "${WARN} $1"; } |
20 | |
21 | #----------------------------------- |
22 | # Error handling & confirmation |
23 | #----------------------------------- |
24 | on_error(){ print_error "Error at line $1."; areYouSure; } |
25 | trap 'on_error $LINENO' ERR |
26 | |
27 | areYouSure(){ |
28 | print_warn "Continue despite errors? [y/N]" |
29 | read -r ans |
30 | case $ans in [yY]*) print_ok "Continuing...";; *) print_error "Aborted."; exit 1;; esac |
31 | } |
32 | |
33 | #----------------------------------- |
34 | # Helpers |
35 | #----------------------------------- |
36 | run_local(){ print_ok "Local: $*"; "$@"; } |
37 | run_remote(){ sshpass -p "$REMOTE_PASS" ssh -o StrictHostKeyChecking=no "$REMOTE_USER@$SERVER" "$*"; } |
38 | wait_ssh(){ |
39 | print_ok "Waiting for SSH on $SERVER... (Running ssh $REMOTE_USER@$SERVER)" |
40 | until sshpass -p "$REMOTE_PASS" ssh -q \ |
41 | -o StrictHostKeyChecking=no \ |
42 | -o ConnectTimeout=5 \ |
43 | "$REMOTE_USER@$SERVER" exit; do |
44 | print_warn "SSH not ready, retrying in 5s..." |
45 | sleep 5 |
46 | done |
47 | print_ok "SSH available." |
48 | } |
49 | |
50 | usage(){ echo "Usage: $0 <orig_user> <orig_pass> <server> <new_hostname> <new_user>"; exit 1; } |
51 | |
52 | #----------------------------------- |
53 | # Main |
54 | #----------------------------------- |
55 | [ $# -ne 5 ] && usage |
56 | USER="$1"; PASS="$2"; SERVER="$3"; HOSTNAME="$4"; NEWUSER="$5" |
57 | REMOTE_USER="$USER"; REMOTE_PASS="$PASS" |
58 | |
59 | # 1) Install sshpass locally |
60 | run_local sudo apt-get update -y |
61 | run_local sudo apt-get install -y sshpass |
62 | |
63 | # 2) Clear known_hosts, wait for SSH |
64 | run_local ssh-keygen -R "$SERVER" -f ~/.ssh/known_hosts |
65 | wait_ssh |
66 | |
67 | # 3) Hostname & reboot (only if changed) |
68 | CURRENT_HOST=$(run_remote "hostname") |
69 | if [[ "$CURRENT_HOST" != "$HOSTNAME" ]]; then |
70 | print_ok "Setting hostname to $HOSTNAME" |
71 | run_remote "sudo hostnamectl set-hostname $HOSTNAME" |
72 | run_remote "sudo reboot" || true |
73 | print_ok "Server rebooting..." |
74 | sleep 5 |
75 | wait_ssh |
76 | else |
77 | print_ok "Hostname already '$HOSTNAME', skipping" |
78 | fi |
79 | |
80 | # 4) Create or verify new user |
81 | if run_remote "id -u $NEWUSER" &>/dev/null; then |
82 | print_ok "User $NEWUSER exists" |
83 | else |
84 | print_ok "Creating user $NEWUSER" |
85 | run_remote "sudo adduser --disabled-password --gecos '' $NEWUSER" |
86 | fi |
87 | |
88 | # 5) Grant sudo & set up passwordless |
89 | print_ok "Granting sudo to $NEWUSER" |
90 | run_remote "sudo usermod -aG sudo $NEWUSER" |
91 | print_ok "Setting passwordless sudo for $NEWUSER" |
92 | run_remote "echo '$NEWUSER ALL=(ALL) NOPASSWD:ALL' | sudo tee /etc/sudoers.d/$NEWUSER" |
93 | |
94 | # 6) Generate & persist random password (once) |
95 | if run_remote "[ -f /etc/$NEWUSER.pass ]" &>/dev/null; then |
96 | # In this case, the password is already set |
97 | print_ok "Don't have to change password. Reusing existing password for $NEWUSER" |
98 | PASS_NEW=$(run_remote "sudo cat /etc/$NEWUSER.pass") |
99 | else |
100 | PASS_NEW=$(uuidgen) |
101 | print_ok "Setting password for $NEWUSER" |
102 | run_remote "echo '$NEWUSER:$PASS_NEW' | sudo chpasswd" |
103 | run_remote "echo '$PASS_NEW' | sudo tee /etc/$NEWUSER.pass > /dev/null" |
104 | run_remote "sudo chmod 600 /etc/$NEWUSER.pass" |
105 | run_remote "sudo chown root:root /etc/$NEWUSER.pass" |
106 | print_ok "New password generated for $NEWUSER and persisted at /etc/$NEWUSER.pass. Please back it up! It can still be used to log in via serial console or rescue mode!" |
107 | fi |
108 | |
109 | local_pass_file="./password_${NEWUSER}_at_${SERVER}.txt" |
110 | rm -f "$local_pass_file" 2>/dev/null || true |
111 | sshpass -p "$REMOTE_PASS" ssh -q -o StrictHostKeyChecking=no \ |
112 | "$REMOTE_USER@$SERVER" "sudo cat /etc/$NEWUSER.pass" \ |
113 | > "$local_pass_file" |
114 | chmod 600 "$local_pass_file" |
115 | chown "$USER:$USER" "$local_pass_file" |
116 | print_ok "Password for $NEWUSER saved locally at $local_pass_file [DO NOT SHARE THIS FILE! IT CAN BE USED TO LOG IN VIA SERIAL CONSOLE OR RESCUE MODE!]" |
117 | |
118 | # 7) Copy SSH key (only if absent) |
119 | [ ! -f ~/.ssh/id_rsa.pub ] && run_local ssh-keygen -t rsa -N "" -f ~/.ssh/id_rsa |
120 | PUBKEY=$(<~/.ssh/id_rsa.pub) |
121 | print_ok "Ensuring SSH key in authorized_keys" |
122 | run_remote "mkdir -p /home/$NEWUSER/.ssh && \ |
123 | sudo bash -c 'grep -qxF \"$PUBKEY\" /home/$NEWUSER/.ssh/authorized_keys 2>/dev/null || \ |
124 | echo \"$PUBKEY\" >> /home/$NEWUSER/.ssh/authorized_keys' && \ |
125 | sudo chown -R $NEWUSER:$NEWUSER /home/$NEWUSER/.ssh && \ |
126 | sudo chmod 700 /home/$NEWUSER/.ssh && \ |
127 | sudo chmod 600 /home/$NEWUSER/.ssh/authorized_keys" |
128 | |
129 | # Switch to new user for subsequent operations |
130 | print_ok "Switching to new user $NEWUSER" |
131 | REMOTE_USER="$NEWUSER"; REMOTE_PASS="$PASS_NEW" |
132 | wait_ssh |
133 | |
134 | # 8) Harden SSH |
135 | print_ok "Hardening SSH settings" |
136 | run_remote "sudo sed -i 's/PermitRootLogin yes/PermitRootLogin no/; \ |
137 | s/PasswordAuthentication yes/PasswordAuthentication no/; \ |
138 | s/#PubkeyAuthentication yes/PubkeyAuthentication yes/' /etc/ssh/sshd_config && \ |
139 | sudo systemctl restart sshd || sudo systemctl restart ssh" |
140 | |
141 | # 9) Remove other non-system users |
142 | print_ok "Removing other users" |
143 | others=$(run_remote "awk -F: -v skip='$NEWUSER' '\$3>=1000 && \$1!=skip {print \$1}' /etc/passwd") |
144 | for u in $others; do |
145 | print_warn "Deleting user $u" |
146 | run_remote "sudo pkill -u $u || true; sudo deluser --remove-home $u" |
147 | done |
148 | |
149 | # 10) Reset machine-id |
150 | print_ok "Resetting machine-id" |
151 | run_remote "sudo rm -f /etc/machine-id /var/lib/dbus/machine-id && \ |
152 | sudo systemd-machine-id-setup && \ |
153 | sudo cp /etc/machine-id /var/lib/dbus/machine-id" |
154 | |
155 | # 11) Enable UFW & OpenSSH |
156 | print_ok "Enabling UFW firewall" |
157 | run_remote "sudo apt-get install -y ufw && sudo ufw allow OpenSSH && echo y | sudo ufw enable" |
158 | |
159 | # 12) Install & configure Fail2Ban |
160 | print_ok "Installing Fail2Ban" |
161 | run_remote "sudo apt-get update && sudo apt-get install -y fail2ban" |
162 | print_ok "Configuring Fail2Ban" |
163 | run_remote <<'EOF' |
164 | sudo tee /etc/fail2ban/jail.local > /dev/null <<EOJ |
165 | [sshd] |
166 | enabled = true |
167 | port = ssh |
168 | filter = sshd |
169 | backend = systemd |
170 | logpath = journal |
171 | maxretry = 3 |
172 | findtime = 600 |
173 | bantime = 3600 |
174 | EOJ |
175 | sudo systemctl restart fail2ban |
176 | EOF |
177 | print_ok "Fail2Ban setup complete" |
178 | |
179 | # 13) Enable BBR (only once) |
180 | print_ok "Enabling BBR congestion control" |
181 | run_remote <<'EOF' |
182 | grep -q 'net.ipv4.tcp_congestion_control = bbr' /etc/sysctl.d/99-bbr.conf 2>/dev/null || { |
183 | sudo tee /etc/sysctl.d/99-bbr.conf > /dev/null <<SYSCTL |
184 | net.core.default_qdisc = fq |
185 | net.ipv4.tcp_congestion_control = bbr |
186 | SYSCTL |
187 | sudo sysctl --system |
188 | } |
189 | EOF |
190 | |
191 | # 14) Select best mirror & update |
192 | print_ok "Selecting best mirror & updating" |
193 | run_remote "curl -s https://gist.aiursoft.cn/anduin/879917820a6c4b268fc12c21f1b3fe7a/raw/HEAD/mirror.sh | bash" |
194 | run_remote "sudo apt-get update" |
195 | |
196 | # 15) Install or upgrade latest HWE kernel if needed |
197 | print_ok "Checking HWE kernel package on remote" |
198 | run_remote <<'EOF' |
199 | set -euo pipefail |
200 | |
201 | HWE_PKG="$(apt search linux-generic-hwe- \ |
202 | | awk -F/ '/linux-generic-hwe-/{print $1; exit}')" |
203 | |
204 | inst="\$(apt-cache policy \$HWE_PKG | awk '/Installed:/ {print \$2}')" |
205 | cand="\$(apt-cache policy \$HWE_PKG | awk '/Candidate:/ {print \$2}')" |
206 | |
207 | if dpkg -s "\$HWE_PKG" &>/dev/null; then |
208 | if [ "\$inst" != "\$cand" ]; then |
209 | echo "[ OK ] Upgrading \$HWE_PKG from \$inst to \$cand" |
210 | sudo apt-get update |
211 | sudo apt-get install -y "\$HWE_PKG" |
212 | echo reboot_required > /tmp/.reboot_flag |
213 | else |
214 | echo "[ OK ] \$HWE_PKG is already at latest version (\$inst), skipping" |
215 | fi |
216 | else |
217 | echo "[ OK ] Installing \$HWE_PKG (\$cand)" |
218 | sudo apt-get update |
219 | sudo apt-get install -y "\$HWE_PKG" |
220 | echo reboot_required > /tmp/.reboot_flag |
221 | fi |
222 | EOF |
223 | |
224 | # 16) Conditionally reboot & wait |
225 | if run_remote 'test -f /tmp/.reboot_flag'; then |
226 | print_ok "Rebooting server to apply new kernel" |
227 | run_remote "sudo reboot" || true |
228 | sleep 5 |
229 | wait_ssh |
230 | else |
231 | print_ok "No new kernel installed, skipping reboot" |
232 | fi |
233 | |
234 | # 17) Final updates & cleanup |
235 | print_ok "Installing upgrades & cleanup" |
236 | run_remote "sudo apt-get update && sudo apt-get upgrade -y && sudo apt-get autoremove -y" |
237 | |
238 | # 18) Performance tuning |
239 | print_ok "Tuning CPU performance & timezone" |
240 | run_remote "sudo apt-get install -y linux-tools-$(uname -r) cpupower && \ |
241 | sudo cpupower frequency-set -g performance || true && \ |
242 | sudo timedatectl set-timezone GMT" |
243 | |
244 | # 19) Remove snap |
245 | print_ok "Removing snapd" |
246 | run_remote <<'EOF' |
247 | # 1) 如果 snapd.service 存在,就 disable 一下;否则跳过 |
248 | if systemctl list-unit-files | grep -q '^snapd\.service'; then |
249 | sudo systemctl disable --now snapd || true |
250 | else |
251 | echo "[ OK ] snapd.service not found, skipping disable" |
252 | fi |
253 | |
254 | # 2) 如果 dpkg 里检测到 snapd 包,就 purge 并清理数据目录 |
255 | if dpkg -l snapd &>/dev/null; then |
256 | sudo apt-get purge -y snapd |
257 | sudo rm -rf /snap /var/lib/snapd /var/cache/snapd |
258 | else |
259 | echo "[ OK ] snapd package not installed, skipping purge" |
260 | fi |
261 | |
262 | # 3) 在所有机器都写上 no-snap 的 pin |
263 | sudo tee /etc/apt/preferences.d/no-snap.pref > /dev/null <<EOP |
264 | Package: snapd |
265 | Pin: release a=* |
266 | Pin-Priority: -10 |
267 | EOP |
268 | EOF |
269 | |
270 | # 20) Final cleanup & benchmark |
271 | print_ok "Final autoremove & benchmark" |
272 | run_remote "sudo apt-get autoremove -y --purge && \ |
273 | sudo apt-get install -y sysbench && sysbench cpu --threads=$(nproc) run && \ |
274 | sudo apt-get autoremove -y sysbench --purge" |
275 | |
276 | print_ok "Setup complete. Connect via: ssh $NEWUSER@$SERVER" |
277 | |
278 | # After this script, server will: |
279 | |
280 | # * Only allow SSH key login |
281 | # * Root login disabled, password authentication disabled |
282 | # * Have a new hostname set |
283 | # * Have a new user with sudo privileges and can log in via SSH |
284 | # * Have a random password stored securely at /etc/<new_user>.pass |
285 | # * Have SSH key copied to authorized_keys so you can log in without a password |
286 | # * Be hardened with UFW, Fail2Ban and allowed SSH connections(only) |
287 | # * Have BBR enabled for better network performance |
288 | # * Have the latest HWE kernel installed |
289 | # * Have the best mirror selected for package updates |
290 | # * Have snap removed |
291 | # * Have CPU performance tuned to 'performance' mode |
292 | # * Have timezone set to GMT |
293 | # * Have all unnecessary users removed (Check /etc/passwd for remaining users) |
294 | # * Have all unnecessary packages removed |
295 | # * Have the latest updates installed |
296 | # * Have sysbench installed for performance testing |
297 | # * Have a final benchmark run to verify CPU performance |
298 | # * Have a final cleanup of unnecessary packages |
install_fail2ban.sh
· 1.1 KiB · Bash
Raw
#!/usr/bin/env bash
set -euo pipefail
echo "[+] Updating package index and installing fail2ban..."
sudo apt update
sudo apt install -y fail2ban
echo "[+] Writing /etc/fail2ban/jail.local..."
sudo tee /etc/fail2ban/jail.local > /dev/null <<'EOF'
[sshd]
enabled = true
port = ssh
filter = sshd
logpath = /var/log/auth.log
maxretry = 3
findtime = 600
bantime = 3600
EOF
sleep 1
echo "[+] Restarting fail2ban service..."
sudo systemctl restart fail2ban
echo "=== Fail2Ban global status ==="
# Allow script to continue even if fail2ban-client status fails (e.g., socket not yet ready)
sudo fail2ban-client status || true
echo "=== SSHD jail status ==="
sudo fail2ban-client status sshd || true
echo "Tip: To view the currently banned IP list again, run:"
echo "sudo fail2ban-client status sshd"
echo "Tip: To unban an IP address, run:"
echo "sudo fail2ban-client set sshd unbanip <IP_ADDRESS>"
echo "Tip: To ban an IP address manually, run:"
echo "sudo fail2ban-client set sshd banip <IP_ADDRESS>"
echo "Tip: To view the fail2ban logs, run:"
echo "sudo journalctl -u fail2ban"
1 | #!/usr/bin/env bash |
2 | set -euo pipefail |
3 | |
4 | echo "[+] Updating package index and installing fail2ban..." |
5 | sudo apt update |
6 | sudo apt install -y fail2ban |
7 | |
8 | echo "[+] Writing /etc/fail2ban/jail.local..." |
9 | sudo tee /etc/fail2ban/jail.local > /dev/null <<'EOF' |
10 | [sshd] |
11 | enabled = true |
12 | port = ssh |
13 | filter = sshd |
14 | logpath = /var/log/auth.log |
15 | maxretry = 3 |
16 | findtime = 600 |
17 | bantime = 3600 |
18 | EOF |
19 | sleep 1 |
20 | |
21 | echo "[+] Restarting fail2ban service..." |
22 | sudo systemctl restart fail2ban |
23 | |
24 | echo "=== Fail2Ban global status ===" |
25 | # Allow script to continue even if fail2ban-client status fails (e.g., socket not yet ready) |
26 | sudo fail2ban-client status || true |
27 | |
28 | echo "=== SSHD jail status ===" |
29 | sudo fail2ban-client status sshd || true |
30 | |
31 | echo "Tip: To view the currently banned IP list again, run:" |
32 | echo "sudo fail2ban-client status sshd" |
33 | |
34 | echo "Tip: To unban an IP address, run:" |
35 | echo "sudo fail2ban-client set sshd unbanip <IP_ADDRESS>" |
36 | |
37 | echo "Tip: To ban an IP address manually, run:" |
38 | echo "sudo fail2ban-client set sshd banip <IP_ADDRESS>" |
39 | |
40 | echo "Tip: To view the fail2ban logs, run:" |
41 | echo "sudo journalctl -u fail2ban" |
42 |
mirror.sh
· 4.9 KiB · Bash
Raw
#!/usr/bin/env bash
# Step 1: Ensure required packages are installed
sudo apt update
sudo apt install -y curl apt-transport-https lsb-release
function switchSource() {
# Get current Ubuntu codename (e.g., jammy, focal, bionic)
codename=$(lsb_release -cs)
# Define a list of potential mirrors
mirrors=(
"https://archive.ubuntu.com/ubuntu/"
"https://mirror.aarnet.edu.au/pub/ubuntu/archive/" # Australia
"https://mirror.fsmg.org.nz/ubuntu/" # New Zealand
"https://mirrors.neterra.net/ubuntu/archive/" # Bulgaria
"https://mirror.csclub.uwaterloo.ca/ubuntu/" # Canada
"https://mirrors.dotsrc.org/ubuntu/" # Denmark
"https://mirrors.nic.funet.fi/ubuntu/" # Finland
"https://mirror.ubuntu.ikoula.com/" # France
"https://mirror.xtom.com.hk/ubuntu/" # Hong Kong
"https://mirrors.piconets.webwerks.in/ubuntu-mirror/ubuntu/" # India
"https://ftp.udx.icscoe.jp/Linux/ubuntu/" # Japan
"https://ftp.kaist.ac.kr/ubuntu/" # Korea
"https://ubuntu.mirror.garr.it/ubuntu/" # Italy
"https://ftp.uni-stuttgart.de/ubuntu/" # Germany
"https://mirror.i3d.net/pub/ubuntu/" # Netherlands
"https://mirroronet.pl/pub/mirrors/ubuntu/" # Poland
"https://ubuntu.mobinhost.com/ubuntu/" # Iran
"http://sg.archive.ubuntu.com/ubuntu/" # Singapore
"http://ossmirror.mycloud.services/os/linux/ubuntu/" # Singapore
"https://mirror.enzu.com/ubuntu/" # United States
"http://jp.archive.ubuntu.com/ubuntu/" # Japan
"http://kr.archive.ubuntu.com/ubuntu/" # Korea
"http://us.archive.ubuntu.com/ubuntu/" # United States
"http://tw.archive.ubuntu.com/ubuntu/" # Taiwan
"https://mirror.twds.com.tw/ubuntu/" # Taiwan
"https://ubuntu.mirrors.uk2.net/ubuntu/" # United Kingdom
"http://mirrors.ustc.edu.cn/ubuntu/" # 中国科学技术大学
"http://ftp.sjtu.edu.cn/ubuntu/" # 上海交通大学
"http://mirrors.tuna.tsinghua.edu.cn/ubuntu/" # 清华大学
"http://mirrors.aliyun.com/ubuntu/" # 阿里云
"http://mirrors.163.com/ubuntu/" # 网易
"http://mirrors.cloud.tencent.com/ubuntu/" # 腾讯云
"http://mirror.aiursoft.cn/ubuntu/" # Aiursoft
"http://mirrors.huaweicloud.com/ubuntu/" # 华为云
"http://mirrors.zju.edu.cn/ubuntu/" # 浙江大学
"http://azure.archive.ubuntu.com/ubuntu/" # Azure
"https://mirrors.isu.net.sa/apt-mirror/" # Saudi Arabia
"https://mirror.team-host.ru/ubuntu/" # Russia
"https://labs.eif.urjc.es/mirror/ubuntu/" # Spain
"https://mirror.alastyr.com/ubuntu/ubuntu-archive/" # Turkey
"https://ftp.acc.umu.se/ubuntu/" # Sweden
"https://mirror.kku.ac.th/ubuntu/" # Thailand
"https://mirror.bizflycloud.vn/ubuntu/" # Vietnam
)
declare -A results
# Function to test speed of a single mirror
test_speed() {
url="$1"
# Attempt to do a quick GET and measure total time
response="$(curl -o /dev/null -s -w "%{http_code} %{time_total}\n" \
--connect-timeout 1 --max-time 2 "$url")"
http_code=$(echo "$response" | awk '{print $1}')
time_total=$(echo "$response" | awk '{print $2}')
# If HTTP code == 200, mark the measured time; otherwise use a large value
if [ "$http_code" -eq 200 ]; then
results["$url"]="$time_total"
else
echo "Failed to access $url (HTTP code: $http_code)"
results["$url"]="9999"
fi
}
echo "Testing all mirrors for Ubuntu '$codename'..."
for mirror in "${mirrors[@]}"; do
test_speed "$mirror"
done
# Sort mirrors by time_total
# Example of sorted_mirrors entry: "https://archive.ubuntu.com/ubuntu/ 0.034"
sorted_mirrors="$(
for url in "${!results[@]}"; do
echo "$url ${results[$url]}"
done | sort -k2 -n
)"
echo
echo "=== Sorted mirrors by response time (ascending) ==="
echo "$sorted_mirrors"
echo
# Pick the top (fastest) mirror from the sorted list
fastest_mirror="$(echo "$sorted_mirrors" | head -n 1 | awk '{print $1}')"
echo "Fastest mirror found: $fastest_mirror"
echo "Updating /etc/apt/sources.list..."
# Update /etc/apt/sources.list with the fastest mirror
sudo tee /etc/apt/sources.list >/dev/null <<EOF
deb $fastest_mirror $codename main restricted universe multiverse
deb $fastest_mirror $codename-updates main restricted universe multiverse
deb $fastest_mirror $codename-backports main restricted universe multiverse
deb $fastest_mirror $codename-security main restricted universe multiverse
EOF
# Final check
sudo apt update
echo "All done!"
}
# Call the main function
switchSource
1 | #!/usr/bin/env bash |
2 | # Step 1: Ensure required packages are installed |
3 | sudo apt update |
4 | sudo apt install -y curl apt-transport-https lsb-release |
5 | |
6 | function switchSource() { |
7 | # Get current Ubuntu codename (e.g., jammy, focal, bionic) |
8 | codename=$(lsb_release -cs) |
9 | |
10 | # Define a list of potential mirrors |
11 | mirrors=( |
12 | "https://archive.ubuntu.com/ubuntu/" |
13 | "https://mirror.aarnet.edu.au/pub/ubuntu/archive/" # Australia |
14 | "https://mirror.fsmg.org.nz/ubuntu/" # New Zealand |
15 | "https://mirrors.neterra.net/ubuntu/archive/" # Bulgaria |
16 | "https://mirror.csclub.uwaterloo.ca/ubuntu/" # Canada |
17 | "https://mirrors.dotsrc.org/ubuntu/" # Denmark |
18 | "https://mirrors.nic.funet.fi/ubuntu/" # Finland |
19 | "https://mirror.ubuntu.ikoula.com/" # France |
20 | "https://mirror.xtom.com.hk/ubuntu/" # Hong Kong |
21 | "https://mirrors.piconets.webwerks.in/ubuntu-mirror/ubuntu/" # India |
22 | "https://ftp.udx.icscoe.jp/Linux/ubuntu/" # Japan |
23 | "https://ftp.kaist.ac.kr/ubuntu/" # Korea |
24 | "https://ubuntu.mirror.garr.it/ubuntu/" # Italy |
25 | "https://ftp.uni-stuttgart.de/ubuntu/" # Germany |
26 | "https://mirror.i3d.net/pub/ubuntu/" # Netherlands |
27 | "https://mirroronet.pl/pub/mirrors/ubuntu/" # Poland |
28 | "https://ubuntu.mobinhost.com/ubuntu/" # Iran |
29 | "http://sg.archive.ubuntu.com/ubuntu/" # Singapore |
30 | "http://ossmirror.mycloud.services/os/linux/ubuntu/" # Singapore |
31 | "https://mirror.enzu.com/ubuntu/" # United States |
32 | "http://jp.archive.ubuntu.com/ubuntu/" # Japan |
33 | "http://kr.archive.ubuntu.com/ubuntu/" # Korea |
34 | "http://us.archive.ubuntu.com/ubuntu/" # United States |
35 | "http://tw.archive.ubuntu.com/ubuntu/" # Taiwan |
36 | "https://mirror.twds.com.tw/ubuntu/" # Taiwan |
37 | "https://ubuntu.mirrors.uk2.net/ubuntu/" # United Kingdom |
38 | "http://mirrors.ustc.edu.cn/ubuntu/" # 中国科学技术大学 |
39 | "http://ftp.sjtu.edu.cn/ubuntu/" # 上海交通大学 |
40 | "http://mirrors.tuna.tsinghua.edu.cn/ubuntu/" # 清华大学 |
41 | "http://mirrors.aliyun.com/ubuntu/" # 阿里云 |
42 | "http://mirrors.163.com/ubuntu/" # 网易 |
43 | "http://mirrors.cloud.tencent.com/ubuntu/" # 腾讯云 |
44 | "http://mirror.aiursoft.cn/ubuntu/" # Aiursoft |
45 | "http://mirrors.huaweicloud.com/ubuntu/" # 华为云 |
46 | "http://mirrors.zju.edu.cn/ubuntu/" # 浙江大学 |
47 | "http://azure.archive.ubuntu.com/ubuntu/" # Azure |
48 | "https://mirrors.isu.net.sa/apt-mirror/" # Saudi Arabia |
49 | "https://mirror.team-host.ru/ubuntu/" # Russia |
50 | "https://labs.eif.urjc.es/mirror/ubuntu/" # Spain |
51 | "https://mirror.alastyr.com/ubuntu/ubuntu-archive/" # Turkey |
52 | "https://ftp.acc.umu.se/ubuntu/" # Sweden |
53 | "https://mirror.kku.ac.th/ubuntu/" # Thailand |
54 | "https://mirror.bizflycloud.vn/ubuntu/" # Vietnam |
55 | ) |
56 | |
57 | declare -A results |
58 | |
59 | # Function to test speed of a single mirror |
60 | test_speed() { |
61 | url="$1" |
62 | # Attempt to do a quick GET and measure total time |
63 | response="$(curl -o /dev/null -s -w "%{http_code} %{time_total}\n" \ |
64 | --connect-timeout 1 --max-time 2 "$url")" |
65 | |
66 | http_code=$(echo "$response" | awk '{print $1}') |
67 | time_total=$(echo "$response" | awk '{print $2}') |
68 | |
69 | # If HTTP code == 200, mark the measured time; otherwise use a large value |
70 | if [ "$http_code" -eq 200 ]; then |
71 | results["$url"]="$time_total" |
72 | else |
73 | echo "Failed to access $url (HTTP code: $http_code)" |
74 | results["$url"]="9999" |
75 | fi |
76 | } |
77 | |
78 | echo "Testing all mirrors for Ubuntu '$codename'..." |
79 | for mirror in "${mirrors[@]}"; do |
80 | test_speed "$mirror" |
81 | done |
82 | |
83 | # Sort mirrors by time_total |
84 | # Example of sorted_mirrors entry: "https://archive.ubuntu.com/ubuntu/ 0.034" |
85 | sorted_mirrors="$( |
86 | for url in "${!results[@]}"; do |
87 | echo "$url ${results[$url]}" |
88 | done | sort -k2 -n |
89 | )" |
90 | |
91 | echo |
92 | echo "=== Sorted mirrors by response time (ascending) ===" |
93 | echo "$sorted_mirrors" |
94 | echo |
95 | |
96 | # Pick the top (fastest) mirror from the sorted list |
97 | fastest_mirror="$(echo "$sorted_mirrors" | head -n 1 | awk '{print $1}')" |
98 | |
99 | echo "Fastest mirror found: $fastest_mirror" |
100 | echo "Updating /etc/apt/sources.list..." |
101 | |
102 | # Update /etc/apt/sources.list with the fastest mirror |
103 | sudo tee /etc/apt/sources.list >/dev/null <<EOF |
104 | deb $fastest_mirror $codename main restricted universe multiverse |
105 | deb $fastest_mirror $codename-updates main restricted universe multiverse |
106 | deb $fastest_mirror $codename-backports main restricted universe multiverse |
107 | deb $fastest_mirror $codename-security main restricted universe multiverse |
108 | EOF |
109 | |
110 | # Final check |
111 | sudo apt update |
112 | echo "All done!" |
113 | } |
114 | |
115 | # Call the main function |
116 | switchSource |