EHCP-Force-Edition/ehcp/ehcpforceupdate.sh
2023-10-25 12:48:45 -06:00

3872 lines
132 KiB
Bash
Executable file

#!/bin/bash
# EHCP Non-Force Edition to EHCP Force Edition Upgrade Script
# By earnolmartin@gmail.com
# http://www.ehcpforce.tk
###########
#FUNCTIONS#
###########
function setGlobalVars(){
FIXDIR="/var/www/new/ehcp/fixes"
serviceNameTempFile="/root/ehcp_service_name_search_temp_file"
patchDir="/root/Downloads"
if [ ! -e "$patchDir" ]; then
mkdir -p "$patchDir"
fi
backupDir="/var/backup"
if [ ! -e "$backupDir" ]; then
mkdir -p "$backupDir"
fi
userScriptDir="/root/scripts"
if [ ! -e "$userScriptDir" ]; then
mkdir -p "$userScriptDir"
fi
ehcpConfigDir="/root/ehcp/config"
if [ ! -e "$ehcpConfigDir" ]; then
mkdir -p "$ehcpConfigDir"
fi
getVSFTPDUser
getPHPConfigPath
installerDir="$(pwd)"
initProcessStr=$(ps -p 1 | awk '{print $4}' | tail -n 1)
if [ "$initProcessStr" == "systemd" ]; then
systemdPresent=1
fi
EHCPMySQLPass=$(cat "/var/www/new/ehcp/config.php" | grep -o "dbpass=.*" | grep -o "=.*" | grep -o "[^='].*" | grep -o ".*[^';]")
UserDefinedPostScript="/root/scripts/ehcp_force_post_update_script.sh"
}
function detectRunningWebServer(){
# Get the web server type from the database
curDir=$(pwd)
cd "$patchDir"
cp "$FIXDIR/api/getwebservertype.tar.gz" "getwebservertype.tar.gz"
tar -zxvf "getwebservertype.tar.gz"
WebServerType=$(php -f getwebservertype.php | xargs)
if [ -z "$WebServerType" ] || [[ "$WebServerType" != "nginx" && "$WebServerType" != "apache2" ]]; then
nginxIsRunning=$(pidof nginx)
apache2IsRunning=$(pidof apache2)
if [ ! -z "$nginxIsRunning" ]; then
WebServerType="nginx"
fi
if [ ! -z "$apache2IsRunning" ]; then
WebServerType="apache2"
fi
fi
cd "$curDir"
}
function setWebServerModeToNginx(){
# Set the web server mode to nginx
curDir=$(pwd)
cd "$patchDir"
cp "$FIXDIR/api/use_nginx_server_type.tar.gz" "use_nginx_server_type.tar.gz"
tar -zxvf "use_nginx_server_type.tar.gz"
runPHPOutput=$(php -f use_nginx_server_type.php | xargs)
cd "$curDir"
}
function setWebServerModeToApache2(){
# Set the web server mode to apache2
curDir=$(pwd)
cd "$patchDir"
cp "$FIXDIR/api/use_apache2_server_type.tar.gz" "use_apache2_server_type.tar.gz"
tar -zxvf "use_apache2_server_type.tar.gz"
runPHPOutput=$(php -f use_apache2_server_type.php | xargs)
cd "$curDir"
}
function aptget_Update(){
apt-get update
}
function libldapFix(){ # by earnolmartin@gmail.com
# install libldap, for vsftpd fix, without prompts
#Remove originally installed libpam-ldap if it exists
origDir=$(pwd)
aptgetRemove libpam-ldap
DEBIAN_FRONTEND=noninteractive apt-get -y install libpam-ldap
cd "$patchDir"
mkdir lib32gccfix
cd lib32gccfix
cp "$FIXDIR/vsftpd/x64/ldap_conf_64bit_vsftpd.tar.gz" "ldap_conf.tar.gz"
tar -zxvf ldap_conf.tar.gz
cp ldap.conf /etc/
cd $origDir
}
function fixApacheEnvVars(){
# Check to make sure export APACHE_LOG_DIR=/var/log/apache2$SUFFIX exists
if [ -e "/etc/apache2/envvars" ]; then
APACHELOGCHECK=$(cat "/etc/apache2/envvars" | grep "APACHE_LOG_DIR=*")
if [ -z "$APACHELOGCHECK" ]; then
echo "export APACHE_LOG_DIR=/var/log/apache2\$SUFFIX" >> "/etc/apache2/envvars"
fi
fi
}
function slaveDNSApparmorFix(){ # by earnolmartin@gmail.com
if [ -e /etc/apparmor.d/usr.sbin.named ]; then
echo -e "\nChanging bind apparmor rule to allow master DNS synchronization for slave setups.\n"
sed -i 's#/etc/bind/\*\* r,#/etc/bind/\*\* rw,#g' /etc/apparmor.d/usr.sbin.named
manageService "apparmor" "restart"
fi
}
function changeApacheUser(){ # by earnolmartin@gmail.com
# Apache should run as the vsftpd account so that FTP connections own the file and php scripts can own the file
# Without this fix, files uploaded by ftp could not be changed by PHP scripts... AND
# Files uploaded / created by PHP scripts could not be modified (chmod) via FTP clients
if [ -e "/etc/apache2/envvars" ]; then
sed -i "s/export APACHE_RUN_USER=.*/export APACHE_RUN_USER=${VSFTPDUser}/g" "/etc/apache2/envvars"
if [ -e "/var/lock/apache2" ]; then
chown ${VSFTPDUser} "/var/lock/apache2"
fi
fi
# Also change nginx user
changeNginxUser
# Also change php-fpm user
if [ -e "$PHPCONFDir/fpm/pool.d/www.conf" ]; then
sed -i "s/user = .*/user = ${VSFTPDUser}/g" "$PHPCONFDir/fpm/pool.d/www.conf"
sed -i "s/group = .*/group = www-data/g" "$PHPCONFDir/fpm/pool.d/www.conf"
fi
# Create EHCP Pool and Secure WWW Pool
# VHOSTs can't run protected functions :)
createEHCPPool
# Secure Pools
securePHPFPMPools
}
function securePHPFPMPools(){
for i in `find ${PHPCONFDir}/fpm/pool.d -name "*.conf" -type f`; do
hasLocalAllowedClients=$(cat "${i}" | grep -o "^listen.allowed_clients")
if [ -z "$hasLocalAllowedClients" ]; then
echo "listen.allowed_clients = 127.0.0.1" >> "${i}"
fi
done
}
function createEHCPPool(){
# Create EHCP Pool
if [ ! -e "$PHPCONFDir/fpm/pool.d/ehcp.conf" ]; then
cp "$PHPCONFDir/fpm/pool.d/www.conf" "$PHPCONFDir/fpm/pool.d/ehcp.conf"
sed -i "s/^\[www\]/\[ehcp\]/g" "$PHPCONFDir/fpm/pool.d/ehcp.conf"
sed -i "s/^listen[^.].*/listen = 9001/g" "$PHPCONFDir/fpm/pool.d/ehcp.conf"
fi
hasDisableFunctions=$(cat "$PHPCONFDir/fpm/pool.d/www.conf" | grep -o "php_admin_value\[disable_functions\].*")
if [ -z "$hasDisableFunctions" ]; then
echo "php_admin_value[disable_functions] = exec,passthru,shell_exec,system,proc_open,popen" >> "$PHPCONFDir/fpm/pool.d/www.conf"
fi
# Remove it from ehcp if it's there
hasDisableFunctionsTwo=$(cat "$PHPCONFDir/fpm/pool.d/ehcp.conf" | grep -o "php_admin_value\[disable_functions\].*")
if [ ! -z "$hasDisableFunctionsTwo" ]; then
sed -i "s/^php_admin_value\[disable_functions\]/;php_admin_value\[disable_functions\]/g" "$PHPCONFDir/fpm/pool.d/ehcp.conf"
fi
}
function apacheUseFPM(){
a2enmod proxy_fcgi
a2enmod ssl
a2dismod php5
a2dismod php7.0
a2dismod php7.1
a2dismod php7.2
a2dismod php7.3
a2dismod php7.4
a2dismod php8.1
# We need a newer version of Apache for this to work properly!
if [[ "$distro" == "ubuntu" && "$yrelease" -eq "16" && "$mrelease" == "04" ]]; then
repoOndrejExists=$(ls /etc/apt/sources.list.d/ondrej-ubuntu-apache* 2>/dev/null | head -n 1)
if [ -z "$repoOndrejExists" ]; then
add-apt-repository -y ppa:ondrej/apache2
aptget_Update
apt-get install -y --allow-unauthenticated -o Dpkg::Options::="--force-confold" apache2
fi
fi
if [ "$distro" == "debian" ] && [ "$yrelease" -eq "9" ]; then
repoOndrejExists=$(cat /etc/apt/sources.list.d/apache2.list | grep -o "packages.sury.org/apache2")
if [ -z "$repoOndrejExists" ]; then
apt-get -y install apt-transport-https lsb-release ca-certificates curl
wget -O /etc/apt/trusted.gpg.d/apache2.gpg https://packages.sury.org/apache2/apt.gpg
sh -c 'echo "deb https://packages.sury.org/apache2/ $(lsb_release -sc) main" > /etc/apt/sources.list.d/apache2.list'
aptget_Update
apt-get install -y --allow-unauthenticated -o Dpkg::Options::="--force-confold" apache2
fi
fi
}
function changeNginxUser(){
# Change nginx user
if [ -e "/etc/nginx/nginx.conf" ]; then
sed -i "s/^user .*/user ${VSFTPDUser} www-data;/g" "/etc/nginx/nginx.conf"
fi
}
function nginxRateLimit(){
if [ -e "/etc/nginx/nginx.conf" ]; then
NGINXHASRATELIMIT=$(cat "/etc/nginx/nginx.conf" | grep "limit_req_zone")
if [ -z "$NGINXHASRATELIMIT" ]; then
sed -i '/http {/a limit_req_zone $binary_remote_addr zone=one:10m rate=10r/s;' "/etc/nginx/nginx.conf"
fi
fi
}
# Secures BIND and prevents UDP Recursion Attacks:
# https://www.team-cymru.org/Services/Resolvers/instructions.html
# Good explanation FROM MS Forums (LOL): http://social.technet.microsoft.com/Forums/windowsserver/en-US/24ea1094-0ae4-47b5-9b74-2f77884cce15/dns-recursion?forum=winserverNIS
function disableRecursiveBIND(){ # by earnolmartin@gmail.com
# Get Resolv.conf and do not run this code if nameserver is set to 127.0.0.1
RESOLVCOUNT=$(cat "/etc/resolv.conf" | grep -c "nameserver")
RESOLVLOCAL=$(cat "/etc/resolv.conf" | grep "nameserver 127.0.0.1")
if [ "$RESOLVCOUNT" == "1" ] && [ ! -z "$RESOLVLOCAL" ]; then
echo -e "Skipping Bind Recursion Settings Due to 127.0.0.1 Nameserver"
else
bindOptionsFile="/etc/bind/named.conf.options"
bindBckFile="/etc/bind/named.conf.options_backup"
if [ -e "$bindOptionsFile" ]; then
# Create a backup of the original
if [ ! -e "$bindBckFile" ]; then
cp "$bindOptionsFile" "$bindBckFile"
fi
# Remove all blank lines at the end of the file:
# BINDNoEmptyLines=$(sed '/^ *$/d' "$bindOptionsFile")
# Better code here to strip out ending lines of empty text: http://stackoverflow.com/questions/7359527/removing-trailing-starting-newlines-with-sed-awk-tr-and-friends
# Can also do this for leading and trailing empty lines: sed -e :a -e '/./,$!d;/^\n*$/{$d;N;};/\n$/ba' file
BINDNoEmptyLines=$(sed -e :a -e '/^\n*$/{$d;N;};/\n$/ba' "$bindOptionsFile")
BINDNoEmptyLines=$(trim "$BINDNoEmptyLines")
echo "$BINDNoEmptyLines" > "$bindOptionsFile"
# Add recursion no
RecursiveSettingCheck=$( cat "$bindOptionsFile" | grep -o "^recursion .*" | grep -o " .*$" | grep -o "[^ ].*" )
if [ -z "$RecursiveSettingCheck" ]; then
# Put it one line before close pattern
sed -i '$i \recursion no;' "$bindOptionsFile"
else
sed -i 's/^recursion .*/recursion no;/g' "$bindOptionsFile"
fi
# Add additional-from-cache no
# No longer needed for Ubuntu 22.04+
if [[ "$distro" == "ubuntu" && "$yrelease" -le "20" ]] || [[ "$distro" == "debian" && "$yrelease" -le "11" ]]; then
RecursiveCacheCheck=$( cat "$bindOptionsFile" | grep -o "^additional-from-cache .*" | grep -o " .*$" | grep -o "[^ ].*" )
if [ -z "$RecursiveCacheCheck" ]; then
sed -i '$i \additional-from-cache no;' "$bindOptionsFile"
else
sed -i 's/^additional-from-cache .*/additional-from-cache no;/g' "$bindOptionsFile"
fi
fi
fi
# Extra optional step
#if [ -e "/etc/default/bind9" ]; then
# sed -i 's/^RESOLVCONF=.*/RESOLVCONF=no/g' "/etc/default/bind9"
#fi
manageService "bind9" "restart"
fi
}
function getLatestEHCPFiles(){
cd "$patchDir"
# If ehcp folder already exists, delete it
if [ -e "ehcp" ]; then
rm -Rf "ehcp"
fi
# Get the latest snapshot files of EHCP Force
if [ "$operationMode" == "update" ] || [ "$operationMode" == "upgrade" ]; then
wget -O "ehcpforce_stable_snapshot.tar.gz" -N https://github.com/earnolmartin/EHCP-Force-Edition/releases/download/1.1.1.1/ehcpforce_stable_snapshot.tar.gz
tar -zxvf "ehcpforce_stable_snapshot.tar.gz"
cd ehcp
CUREHCPDLDIR=$(pwd)
else
svnCount=0
while [ ! -e "ehcp" ]; do
if [ "$svnCount" -gt "0" ]; then
echo -e "Unable to download the EHCP files from SVN! Please make sure you are connected to the internet. Trying again..."
fi
svn checkout https://github.com/earnolmartin/EHCP-Force-Edition/trunk/ehcp ./ehcp
svnCount=$((svnCount+1))
done
rm -Rf .svn
cd ehcp
CUREHCPDLDIR=$(pwd)
fi
# Remove stock config.php (we want to use the existing one)
rm config.php
# Remove webmail stock config.php (we want to use the existing one)
if [ -e "webmail2" ]; then
cd "webmail2"
if [ -e "config" ]; then
cd "config"
if [ -e "config.php" ]; then
rm "config.php"
fi
fi
fi
# Go back to main ehcp dir
cd "$CUREHCPDLDIR"
# Make backup of previous EHCP files
LATESTBACKUPDIR="/var/www/new/ehcp_nonforce"
CurDate=$(date +%Y_%m_%d_%s)
cd ..
if [ ! -e "/var/www/new/ehcp_nonforce" ]; then
cp -R "/var/www/new/ehcp" "/var/www/new/ehcp_nonforce"
else
cp -R "/var/www/new/ehcp" "/var/www/new/ehcp_nonforce_$CurDate"
LATESTBACKUPDIR="/var/www/new/ehcp_nonforce_$CurDate"
fi
# Copy the updated downloaded EHCP files over
cp -R "ehcp" "/var/www/new/"
# Restore the old configuraiton files for EHCP and Webmail
cp "$LATESTBACKUPDIR/config.php" "/var/www/new/ehcp"
cp "$LATESTBACKUPDIR/webmail2/config/config.php" "/var/www/new/ehcp/webmail2/config"
# Fix permissions
fixEHCPPerms
logDirFix
# Move the old EHCP files into backup directory (enhance security)
if [ "$operationMode" == "update" ] || [ "$operationMode" == "update-svn" ]; then
mv "$LATESTBACKUPDIR" "$EHCPBACKUPDIR/ehcp_force_backup_$CurDate"
elif [ "$operationMode" == "upgrade" ]; then
mv "$LATESTBACKUPDIR" "$EHCPBACKUPDIR/ehcp_backup_$CurDate"
fi
}
function updateDaemon(){
manageService "ehcp" "stop"
# Copy daemon over to init dir
cp /var/www/new/ehcp/ehcp /etc/init.d/
# Get rid of experimental python daemon
# It was never used to begin with
if [ -e "/etc/init.d/ehcp_daemon.py" ]; then
rm "/etc/init.d/ehcp_daemon.py"
fi
# Use systemd Service for newer Ubuntu versions
if ([ "$distro" == "ubuntu" ] && [ "$yrelease" -ge "16" ]) || [ ! -z "$systemdPresent" ]; then
if [ -e "/lib/systemd/system" ]; then
cp "$FIXDIR/daemon/systemd/ehcp.service" "/lib/systemd/system"
rm -rf "/etc/init.d/ehcp"
elif [ -e "/etc/systemd/system" ]; then
cp "$FIXDIR/daemon/systemd/ehcp.service" "/etc/systemd/system"
rm -rf "/etc/init.d/ehcp"
fi
fi
# Reload systemd to pick up on the new daemon if applicable
systemctl daemon-reload
systemctl enable ehcp.service
if [ -e "/etc/init.d/ehcp" ]; then
update-rc.d ehcp enable
update-rc.d ehcp defaults
fi
}
function fail2ban(){
aptgetInstall fail2ban
manageService "fail2ban" "stop"
cp "/var/www/new/ehcp/fail2ban/apache-dos.conf" "/etc/fail2ban/filter.d/apache-dos.conf"
cp "/var/www/new/ehcp/fail2ban/ehcp.conf" "/etc/fail2ban/filter.d/ehcp.conf"
cp "/var/www/new/ehcp/fail2ban/postfix-sasl.conf" "/etc/fail2ban/filter.d/postfix-sasl.conf"
if [ ! -e "/etc/fail2ban/jail.local" ]; then
cp "/var/www/new/ehcp/fail2ban/jail.local" "/etc/fail2ban/jail.local"
fi
EHCPINF2BAN=$(cat /etc/fail2ban/jail.local | grep "\[ehcp\]")
APACHEDOSINF2BAN=$(cat /etc/fail2ban/jail.local | grep "\[apache-dos\]")
POSTFIXSASLINF2BAN=$(cat /etc/fail2ban/jail.local | grep "\[sasl\]")
if [ -z "$EHCPINF2BAN" ]; then
echo "
[ehcp]
# fail2ban section for Easy Hosting Control Panel, ehcp.net
enabled = true
port = http,https
filter = ehcp
logpath = /var/www/new/ehcp/log/ehcp_failed_authentication.log
maxretry = 10" >> "/etc/fail2ban/jail.local"
fi
if [ -z "$APACHEDOSINF2BAN" ]; then
echo "
[apache-dos]
# Apache Anti-DDoS Security Based Log Entries from Mod Evasive Apache Module
enabled = true
port = http,https
filter = apache-dos
logpath = /var/log/apache*/*error.log
maxretry = 5" >> "/etc/fail2ban/jail.local"
fi
if [ -z "$POSTFIXSASLINF2BAN" ]; then
echo "
[sasl]
enabled = true
port = smtp,ssmtp,imap2,imap3,imaps,pop3,pop3s
filter = postfix-sasl
# You might consider monitoring /var/log/warn.log instead
# if you are running postfix. See http://bugs.debian.org/507990
logpath = /var/log/mail.log
maxretry = 4" >> "/etc/fail2ban/jail.local"
fi
manageService "fail2ban" "restart"
}
function mysqlUseLocalHost(){
if [ -e "/etc/mysql/my.cnf" ]; then
sed -i "s/^bind-address.*/bind-address=0.0.0.0/g" "/etc/mysql/my.cnf"
fi
if [ -e "/etc/mysql/mariadb.conf.d/50-server.cnf" ]; then
sed -i "s/^bind-address.*/bind-address=0.0.0.0/g" "/etc/mysql/mariadb.conf.d/50-server.cnf"
fi
manageService "mysql" "restart"
}
function updateMySQLModeVariableIfNeeded(){
if [ -e "/etc/mysql/mariadb.conf.d/50-server.cnf" ]; then
sqlModeExists=$(cat "/etc/mysql/mariadb.conf.d/50-server.cnf" | grep -o "^sql_mode")
if [ ! -z "$sqlModeExists" ]; then
sed -i "s/^sql_mode.*/sql_mode=/g" "/etc/mysql/mariadb.conf.d/50-server.cnf"
else
mysqldSectionExists=$(cat "/etc/mysql/mariadb.conf.d/50-server.cnf" | grep -o "^\[mysqld\]")
if [ ! -z "$mysqldSectionExists" ]; then
sed -i "s/^\[mysqld\]/\[mysqld\]\\nsql_mode=/g" "/etc/mysql/mariadb.conf.d/50-server.cnf"
fi
fi
fi
if [ -e "/etc/mysql/my.cnf" ]; then
sqlModeExists=$(cat "/etc/mysql/my.cnf" | grep -o "^sql_mode")
if [ ! -z "$sqlModeExists" ]; then
sed -i "s/^sql_mode.*/sql_mode=/g" "/etc/mysql/my.cnf"
else
mysqldSectionExists=$(cat "/etc/mysql/my.cnf" | grep -o "^\[mysqld\]")
if [ ! -z "$mysqldSectionExists" ]; then
sed -i "s/^\[mysqld\]/\[mysqld\]\\nsql_mode=/g" "/etc/mysql/my.cnf"
fi
fi
fi
}
function apacheSecurity(){
aptgetInstall libapache2-mod-evasive
aptgetInstall libapache-mod-security
aptgetInstall libapache2-modsecurity
aptgetInstall libapache2-mod-security2
# Make sure the conf.d directory exists
addConfDFolder
# Shouldn't be running, but attempt to stop it anyways just in case
manageService "apache2" "stop"
# Ensures that we always get the latest security rules and apply only the latest
if [ -e "/etc/apache2/mod_security_rules" ]; then
rm -R "/etc/apache2/mod_security_rules"
fi
mkdir /etc/apache2/mod_security_rules
cd "$patchDir"
if [ -e "mod_security_rules_latest" ]; then
rm -R "mod_security_rules_latest"
fi
mkdir "mod_security_rules_latest"
# Different rules based on different versions
if [[ "$distro" == "ubuntu" && "$yrelease" == "13" && "$mrelease" == "10" ]] || [[ "$yrelease" -ge "14" && "$distro" == "ubuntu" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]; then
cp "$FIXDIR/apache2/modsecurity/mod_security_rules_13.10.tar.gz" "mod_security_rules.tar.gz"
else
cp "$FIXDIR/apache2/modsecurity/mod_security_base_rules.tar.gz" "mod_security_rules.tar.gz"
fi
tar -zxvf "mod_security_rules.tar.gz" -C "mod_security_rules_latest"
mv mod_security_rules_latest/* /etc/apache2/mod_security_rules
chown -R root:root /etc/apache2/mod_security_rules
# Config file names
ModSecureNewConfFile="security2.conf"
ModSecureNewLoadFile="security2.load"
ModEvasiveNewConfFile="evasive.conf"
ModEvasiveNewLoadFile="evasive.load"
ModSecureOldConfFile="mod-security.conf"
ModSecureOldLoadFile="mod-security.load"
ModEvasiveOldConfFile="mod-evasive.conf"
ModEvasiveOldLoadFile="mod-evasive.load"
# Cleanup mod security
if [ -e "/etc/apache2/mods-available/${ModSecureNewConfFile}" ]; then
# Overwrite official config in use
cp "/var/www/new/ehcp/mod_secure/modsecure" "/etc/apache2/mods-available/${ModSecureNewConfFile}"
# If it's enabled file also exists, copy that too
if [ -e "/etc/apache2/mods-enabled/${ModSecureNewConfFile}" ]; then
cp "/var/www/new/ehcp/mod_secure/modsecure" "/etc/apache2/mods-enabled/${ModSecureNewConfFile}"
fi
# Cleanup old config it exists from an OS upgrade
if [ -e "/etc/apache2/mods-available/${ModSecureOldConfFile}" ]; then
rm "/etc/apache2/mods-available/${ModSecureOldConfFile}"
fi
rm "/etc/apache2/mods-enabled/${ModSecureOldConfFile}"
# Remove old load file as well
if [ -e "/etc/apache2/mods-available/${ModSecureOldLoadFile}" ]; then
rm "/etc/apache2/mods-available/${ModSecureOldLoadFile}"
fi
rm "/etc/apache2/mods-enabled/${ModSecureOldLoadFile}"
# Cleanup our old version which is no longer needed since we'll use the official configuration
if [ -e "/etc/apache2/conf.d/modsecure" ]; then
rm "/etc/apache2/conf.d/modsecure"
fi
elif [ -e "/etc/apache2/mods-available/${ModSecureOldConfFile}" ]; then
# Overwrite official config in use
cp "/var/www/new/ehcp/mod_secure/modsecure" "/etc/apache2/mods-available/${ModSecureOldConfFile}"
# If it's enabled file also exists, copy that too
if [ -e "/etc/apache2/mods-enabled/${ModSecureOldConfFile}" ]; then
cp "/var/www/new/ehcp/mod_secure/modsecure" "/etc/apache2/mods-enabled/${ModSecureOldConfFile}"
fi
# Remove incorrect config file if it exists
if [ -e "/etc/apache2/mods-available/${ModSecureNewConfFile}" ]; then
rm "/etc/apache2/mods-available/${ModSecureNewConfFile}"
fi
if [ -e "/etc/apache2/mods-available/${ModSecureNewLoadFile}" ]; then
rm "/etc/apache2/mods-available/${ModSecureNewLoadFile}"
fi
rm "/etc/apache2/mods-enabled/${ModSecureNewConfFile}"
rm "/etc/apache2/mods-enabled/${ModSecureNewLoadFile}"
# Cleanup our old version which is no longer needed since we'll use the official configuration
if [ -e "/etc/apache2/conf.d/modsecure" ]; then
rm "/etc/apache2/conf.d/modsecure"
fi
else
# None exist
if [[ "$distro" == "ubuntu" && "$yrelease" -gt "13" ]] || [[ "$distro" == "ubuntu" && "$yrelease" == "13" && "$mrelease" == "10" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]; then
cp "/var/www/new/ehcp/mod_secure/modsecure" "/etc/apache2/mods-available/${ModSecureNewConfFile}"
cp "/var/www/new/ehcp/mod_secure/modsecure" "/etc/apache2/mods-enabled/${ModSecureNewConfFile}"
rm "/etc/apache2/mods-available/${ModSecureOldConfFile}"
rm "/etc/apache2/mods-enabled/${ModSecureOldConfFile}"
rm "/etc/apache2/mods-available/${ModSecureOldLoadFile}"
rm "/etc/apache2/mods-enabled/${ModSecureOldLoadFile}"
else
cp "/var/www/new/ehcp/mod_secure/modsecure" "/etc/apache2/mods-available/${ModSecureOldConfFile}"
cp "/var/www/new/ehcp/mod_secure/modsecure" "/etc/apache2/mods-enabled/${ModSecureOldConfFile}"
rm "/etc/apache2/mods-available/${ModSecureNewConfFile}"
rm "/etc/apache2/mods-enabled/${ModSecureNewConfFile}"
rm "/etc/apache2/mods-available/${ModSecureNewLoadFile}"
rm "/etc/apache2/mods-enabled/${ModSecureNewLoadFile}"
fi
# Cleanup our old version which is no longer needed since we'll use the official configuration
if [ -e "/etc/apache2/conf.d/modsecure" ]; then
rm "/etc/apache2/conf.d/modsecure"
fi
fi
# Cleanup mod evasive
if [ -e "/etc/apache2/mods-available/${ModEvasiveNewConfFile}" ]; then
# Overwrite official config in use
cp "/var/www/new/ehcp/mod_secure/modevasive" "/etc/apache2/mods-available/${ModEvasiveNewConfFile}"
# If it's enabled file also exists, copy that too
if [ -e "/etc/apache2/mods-enabled/${ModEvasiveNewConfFile}" ]; then
cp "/var/www/new/ehcp/mod_secure/modevasive" "/etc/apache2/mods-enabled/${ModEvasiveNewConfFile}"
fi
# Cleanup old config it exists from an OS upgrade
if [ -e "/etc/apache2/mods-available/${ModEvasiveOldConfFile}" ]; then
rm "/etc/apache2/mods-available/${ModEvasiveOldConfFile}"
fi
rm "/etc/apache2/mods-enabled/${ModEvasiveOldConfFile}"
# Remove old load file as well
if [ -e "/etc/apache2/mods-available/${ModEvasiveOldLoadFile}" ]; then
rm "/etc/apache2/mods-available/${ModEvasiveOldLoadFile}"
fi
rm "/etc/apache2/mods-enabled/${ModEvasiveOldLoadFile}"
# Cleanup our old version which is no longer needed since we'll use the official configuration
if [ -e "/etc/apache2/conf.d/modevasive" ]; then
rm "/etc/apache2/conf.d/modevasive"
fi
elif [ -e "/etc/apache2/mods-available/${ModEvasiveOldConfFile}" ]; then
# Overwrite official config in use
cp "/var/www/new/ehcp/mod_secure/modevasive" "/etc/apache2/mods-available/${ModEvasiveOldConfFile}"
# If it's enabled file also exists, copy that too
if [ -e "/etc/apache2/mods-enabled/${ModEvasiveOldConfFile}" ]; then
cp "/var/www/new/ehcp/mod_secure/modevasive" "/etc/apache2/mods-enabled/${ModEvasiveOldConfFile}"
fi
# Remove incorrect config file if it exists
if [ -e "/etc/apache2/mods-available/${ModEvasiveNewConfFile}" ]; then
rm "/etc/apache2/mods-available/${ModEvasiveNewConfFile}"
fi
if [ -e "/etc/apache2/mods-available/${ModEvasiveNewLoadFile}" ]; then
rm "/etc/apache2/mods-available/${ModEvasiveNewLoadFile}"
fi
rm "/etc/apache2/mods-enabled/${ModEvasiveNewConfFile}"
rm "/etc/apache2/mods-enabled/${ModEvasiveNewLoadFile}"
# Cleanup our old version which is no longer needed since we'll use the official configuration
if [ -e "/etc/apache2/conf.d/modevasive" ]; then
rm "/etc/apache2/conf.d/modevasive"
fi
else
# None exist
if [[ "$distro" == "ubuntu" && "$yrelease" -gt "13" ]] || [[ "$distro" == "ubuntu" && "$yrelease" == "13" && "$mrelease" == "10" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]; then
cp "/var/www/new/ehcp/mod_secure/modevasive" "/etc/apache2/mods-available/${ModEvasiveNewConfFile}"
cp "/var/www/new/ehcp/mod_secure/modevasive" "/etc/apache2/mods-enabled/${ModEvasiveNewConfFile}"
rm "/etc/apache2/mods-enabled/${ModEvasiveOldConfFile}"
rm "/etc/apache2/mods-enabled/${ModEvasiveOldLoadFile}"
rm "/etc/apache2/mods-available/${ModEvasiveOldConfFile}"
rm "/etc/apache2/mods-available/${ModEvasiveOldLoadFile}"
else
cp "/var/www/new/ehcp/mod_secure/modevasive" "/etc/apache2/mods-available/${ModEvasiveOldConfFile}"
cp "/var/www/new/ehcp/mod_secure/modevasive" "/etc/apache2/mods-enabled/${ModEvasiveOldConfFile}"
rm "/etc/apache2/mods-enabled/${ModEvasiveNewConfFile}"
rm "/etc/apache2/mods-enabled/${ModEvasiveNewLoadFile}"
rm "/etc/apache2/mods-available/${ModEvasiveNewConfFile}"
rm "/etc/apache2/mods-available/${ModEvasiveNewLoadFile}"
fi
# Cleanup our old version which is no longer needed since we'll use the official configuration
if [ -e "/etc/apache2/conf.d/modevasive" ]; then
rm "/etc/apache2/conf.d/modevasive"
fi
fi
if [[ "$distro" == "ubuntu" && "$yrelease" -gt "13" ]] || [[ "$distro" == "ubuntu" && "$yrelease" == "13" && "$mrelease" == "10" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]; then
a2enmod evasive
a2enmod security2
else
a2enmod mod-evasive
a2enmod mod-security
fi
}
function finalize(){
# Get web server type
detectRunningWebServer
# Get PHP Session Time
getPHPSessionTimeout
if [ -z "$SessionTimeoutSetting" ]; then
echo -e "Adding cronjob to cleanup old php session files"
# Add cronjob to clean up old php session files
addSystemCronJob "0 2 */5 * *" "/var/www/new/ehcp/scripts/cleanup/remove_old_php_tmp_session_files.sh"
fi
# Make sure all log files have correct group
ERRORLOGAPACH="/var/log/apache2/access.log"
if [ -e "$ERRORLOGAPACH" ]; then
APACHLOGGROUPOWNER=$(ls -ali "$ERRORLOGAPACH" | awk '{print $5}')
chown root:"$APACHLOGGROUPOWNER" -R "/var/log/apache2"
fi
cd "$patchDir"
# Download Let's Encrypt Certbot:
installCertBotLetsEncrypt
# Sync domains
cp "$FIXDIR/api/syncdomains_apiscript.tar.gz" "syncdomains_apiscript.tar.gz"
tar -zxvf "syncdomains_apiscript.tar.gz"
php syncdomains.php
# Sync ez install information
cp "$FIXDIR/api/update_ez_install.tar.gz" "update_ez_install.tar.gz"
tar -zxvf "update_ez_install.tar.gz"
php update_ez_install.php
# Enable php-fpm
enablePHPFPMService
# Killall and restart mysql
killAllMySQLAndRestart
# Restart PolicyD if available
if [ ! -z "$insPolicyD" ] && [ "$insPolicyD" = true ]; then
manageService "policyd_agent" "stop"
manageService "policyd_agent" "start"
fi
# Restart ehcp
manageService "ehcp" "restart"
echo -e "\nWaiting 30 seconds before restarting $WebServerType daemon so that website configs are reconstructed.\n"
sleep 30s
# Restart php-fpm before nginx if the web server is nginx
echo -e "\nRestarting PHP FPM service.\n"
managePHPFPMService
# Restart web server
echo -e "\nRestarting the ${WebServerType} web server.\n"
manageService "$WebServerType" "restart"
# Restart php-fpm once more just in case - seen some weird issues where another restart is needed
managePHPFPMService "stop"
managePHPFPMService "start"
# Make sure courier daemon is enabled (mainly for Ubuntu 16.04 and up)
echo -e "\nAdjusing and restarting courier-authdaemon defaults.\n"
update-rc.d courier-authdaemon enable
update-rc.d courier-authdaemon defaults
manageService "courier-authdaemon" "restart"
# Restart postfix
echo -e "\nRestarting postfix.\n"
manageService "postfix" "restart"
echo -e "\nRunning final cleanup.\n"
finalCleanup
if [ -e "$UserDefinedPostScript" ]; then
echo -e "\nRunning user defined post update script.\n"
bash "$UserDefinedPostScript"
fi
}
# Get distro name , by Marcel <marcelbutucea@gmail.com>, thanks to marcel for fixing whole code syntax
# No longer works in Ubuntu 13.04
# Fixed by Eric Martin <earnolmartin@gmail.com>
function checkDistro() {
# Get distro properly
# Get distro properly
if [ -e /etc/issue ]; then
distro=$( cat /etc/issue | awk '{ print $1 }' | head -n 1 )
fi
if [ ! -z "$distro" ]; then
# Convert it to lowercase
distro=$( echo $distro | awk '{print tolower($0)}' )
fi
if [ -z "$distro" ] || [[ "$distro" != "ubuntu" && "$distro" != "debian" ]]; then
if [ -e /etc/os-release ]; then
distro=$( cat /etc/os-release | grep -o "^NAME=.*" | grep -o "[^NAME=\"].*[^\"]" | awk '{print $1}' | awk '{print tolower($0)}' )
fi
fi
# Assume Ubuntu
if [ -z "$distro" ]; then
distro="ubuntu"
else
# Convert it to lowercase
distro=$( echo $distro | awk '{print tolower($0)}' )
fi
# Get actual release version information
version=$( lsb_release -r | awk '{ print $2 }' )
if [ -z "$version" ]; then
version=$( cat /etc/issue | awk '{ print $2 }' )
fi
# Separate year and version
if [[ "$version" == *.* ]]; then
yrelease=$( echo "$version" | cut -d. -f1 )
mrelease=$( echo "$version" | cut -d. -f2 )
else
yrelease="$version"
mrelease="0"
fi
# Get 64-bit OS or 32-bit OS [used in vsftpd fix]
if [ $( uname -m ) == 'x86_64' ]; then
OSBits=64
else
OSBits=32
fi
# Another way to get the version number
# version=$(lsb_release -r | awk '{ print $2 }')
echo "Your distro is $distro runnning version $version"
if [ "$distro" != "debian" ]; then
echo "Your distros yearly release is $yrelease. Your distros monthly release is $mrelease."
fi
# Get distro and version initially installed on
if [ -e "/var/www/new/ehcp/distro_during_install.txt" ]; then
oldDistro=$(cat "/var/www/new/ehcp/distro_during_install.txt")
fi
if [ -e "/var/www/new/ehcp/version_during_install.txt" ]; then
oldYRelease=$(cat "/var/www/new/ehcp/version_during_install.txt" | awk {'print $1'})
oldMRelease=$(cat "/var/www/new/ehcp/version_during_install.txt" | awk {'print $2'})
fi
if [ ! -z "$oldYRelease" ] && [ ! -z "$oldMRelease" ] && [ ! -z "$oldDistro" ]; then
if [ "$oldYRelease" != "$yrelease" ] || [ "$oldMRelease" != "$mrelease" ] || [ "$oldDistro" != "$distro" ]; then
OSUpgradeChangeDetectedFromInstall=true
else
OSUpgradeChangeDetectedFromInstall=false
fi
else
OSUpgradeChangeDetectedFromInstall=true
fi
if [ "$distro" == "debian" ] && [ "$yrelease" -lt "8" ]; then
echo "Debian 7.x and lower are no longer supported."
exit
fi
}
function fixVSFTPConfig(){ # by earnolmartin@gmail.com
# VSFTPD config file
VSFTPDCONF="/etc/vsftpd.conf"
# Check to see if the chroot_local_user setting is present
chrootLocalCheck=$(cat "$VSFTPDCONF" | grep "chroot_local_user")
if [ -z "$chrootLocalCheck" ]; then
sh -c "echo 'chroot_local_user=YES' >> $VSFTPDCONF"
else
sed -i 's/chroot_local_user=.*/chroot_local_user=YES/g' "$VSFTPDCONF"
fi
# Check to see if allow writeable chroot is present
allowWriteValue=$(cat "$VSFTPDCONF" | grep "allow_writeable_chroot")
if [ -z "$allowWriteValue" ]; then
sh -c "echo 'allow_writeable_chroot=YES' >> $VSFTPDCONF"
else
sed -i 's/allow_writeable_chroot=.*/allow_writeable_chroot=YES/g' "$VSFTPDCONF"
fi
if [ $OSBits -eq "64" ]; then
#aptgetInstall libpam-ldap # this is required in buggy vsftpd installs.. ubuntu 12.04,12.10, 13.04, now...
libldapFix
aptgetInstall libgcc1
# 64-bit 500 OOPS: priv_sock_get_cmd Fix
# seccomp_sandbox=NO
allowSandBox=$(cat "$VSFTPDCONF" | grep "seccomp_sandbox")
if [ -z "$allowSandBox" ]; then
if [[ "$distro" == "ubuntu" && "$yrelease" -ge "13" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]; then
sh -c "echo 'seccomp_sandbox=NO' >> $VSFTPDCONF"
fi
else
sed -i 's/seccomp_sandbox=.*/seccomp_sandbox=NO/g' "$VSFTPDCONF"
fi
fi
# Restart the VSFTPD service
manageService "vsftpd" "restart"
}
function remove_vsftpd(){
# Remove the hold if any:
echo "vsftpd install" | dpkg --set-selections
# Remove originally installed vsftpd
aptgetRemove vsftpd
# Just incase it's been installed already or another version has been installed using dpgk, let's remove it
dpkg --remove vsftpd
}
function fixApacheDefault(){
ApacheFile="/etc/apache2/apache2.conf"
confStr="IncludeOptional sites-enabled/\*.conf"
correctConfStr="Include sites-enabled/"
if [ -e "$ApacheFile" ]; then
ConfCheck=$( cat "$ApacheFile" | grep -o "$confStr" )
if [ ! -z "$ConfCheck" ]; then
sed -i "s#$confStr#$correctConfStr#g" "$ApacheFile"
manageService "apache2" "restart"
fi
fi
}
function removeNameVirtualHost(){
ApacheFile="/etc/apache2/ports.conf"
confStr="NameVirtualHost.*"
if [ -e "$ApacheFile" ]; then
ConfCheck=$( cat "$ApacheFile" | grep -o "$confStr" )
if [ ! -z "$ConfCheck" ]; then
sed -i "s#$confStr##g" "$ApacheFile"
manageService "apache2" "restart"
fi
fi
}
function genUbuntuFixes(){
# Ubuntu packages keep coming with new features that mess things up
# Thanks Ubuntu for the unneccessary headaches!
# Includes debian too... jesus christ
if [ ! -z "$yrelease" ]; then
# Due to template changes, we need to set older web servers to use nginx because the ondrej version of apache2 will not work in 12.04 and earlier
if [[ "$distro" == "ubuntu" && "$yrelease" -le "12" ]] || [[ "$distro" == "debian" && "$yrelease" -le "7" ]]; then
setWebServerModeToNginx
syncDomainsPostInstall=true
fi
if [[ "$distro" == "ubuntu" && "$yrelease" -ge "13" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]; then
fixApacheDefault
removeNameVirtualHost
addConfDFolder
getRidOfExtraPHPMyAdminAlias
fixApache2ConfigInvalidLockFileLine
fixMariaDBSkippingInnoDB
fi
if [[ "$distro" == "ubuntu" && "$yrelease" -ge "16" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]; then
# Fixes libpam for virtual VSFTPD and email accoutns
installPythonPamMysql
fi
# Ubuntu 18.04 and Debian 10 Fixes
if [[ "$distro" == "ubuntu" && "$yrelease" -eq "18" && "$mrelease" == "04" ]]; then
fixQuotaForEmailsPostfix3x
fi
# Ubuntu 14.04 Fix 2022
if [[ "$distro" == "ubuntu" && "$yrelease" -eq "14" ]]; then
fixUbuntu14SSL
fi
fi
}
function finalCleanup(){
if [ -e "${serviceNameTempFile}" ]; then
rm -rf "${serviceNameTempFile}"
fi
}
function genFixes(){
# Generic fixes that should be run
if [ ! -e "/etc/apache2/httpd.conf" ]; then
sed -i 's/^Include httpd.conf/#Include httpd.conf/g' "/etc/apache2/apache2.conf"
fi
# add panel conf to apache2 or nginx
if [ -e "/etc/apache2/apache2.conf" ]; then
hasEHCPPanelConf=$(cat "/etc/apache2/apache2.conf" | grep -o "apachehcp_globalpanelurls.conf")
if [ -z "$hasEHCPPanelConf" ]; then
echo -e "Include /var/www/new/ehcp/apachehcp_globalpanelurls.conf" >> "/etc/apache2/apache2.conf"
fi
fi
# Same thing for nginx (plus bad bot and ip blocker)
if [ -e "/etc/nginx/nginx.conf" ]; then
hasEHCPPanelConf=$(cat "/etc/nginx/nginx.conf" | grep -o "apachehcp_globalpanelurls.conf")
if [ -z "$hasEHCPPanelConf" ]; then
# Put it one line before close pattern
sed -i '$i \include /var/www/new/ehcp/apachehcp_globalpanelurls.conf;' "/etc/nginx/nginx.conf"
fi
hasBlackList=$(cat "/etc/nginx/nginx.conf" | grep -o "blacklist.conf")
if [ -z "$hasBlackList" ]; then
# Put it one line before close pattern
sed -i '$i \include nginx-badbot-blocker/blacklist.conf;' "/etc/nginx/nginx.conf"
fi
hasBlockIPList=$(cat "/etc/nginx/nginx.conf" | grep -o "blockips.conf")
if [ -z "$hasBlockIPList" ]; then
# Put it one line before close pattern
sed -i '$i \include nginx-badbot-blocker/blockips.conf;' "/etc/nginx/nginx.conf"
fi
fi
# Change to .conf
if [ -e "/var/www/new/ehcp/scripts/curl_installer/curl_php_log" ]; then
mv "/var/www/new/ehcp/scripts/curl_installer/curl_php_log" "/var/www/new/ehcp/scripts/curl_installer/curl_php_log.conf"
fi
# Change to .conf
if [ -e "/var/www/new/ehcp/scripts/ehcp_backup/backup_log" ]; then
mv "/var/www/new/ehcp/scripts/ehcp_backup/backup_log" "/var/www/new/ehcp/scripts/ehcp_backup/backup_log.conf"
fi
}
function fixApache2ConfigInvalidLockFileLine(){
sed -i "s/^LockFile/#LockFile/g" "/etc/apache2/apache2.conf"
}
function ubuntuVSFTPDFix(){ # by earnolmartin@gmail.com
# Get currently working directory
origDir=$( pwd )
# Install vsftpd if for some reason it wasn't installed earlier
aptgetInstall vsftpd
# Ubuntu VSFTPD Fixes
if [ ! -z "$yrelease" ]; then
if [ "$distro" == "ubuntu" ]; then
if [ "$yrelease" == "12" ] ; then
if [ "$mrelease" == "04" ]; then
# Run 12.04 Fix
remove_vsftpd
echo -e "\nRunning VSFTPD fix for Ubuntu 12.04\n"
add-apt-repository -y ppa:thefrontiergroup/vsftpd
aptget_Update
aptgetInstall vsftpd
elif [ "$mrelease" == "10" ]; then
# Run 12.10 Fix
remove_vsftpd
echo -e "\nRunning VSFTPD fix for Ubuntu 12.10\n"
#get the code
cd "$patchDir"
if [ ! -e vsftpd_2.3.5-3ubuntu1.deb ]; then
if [ $OSBits -eq "32" ]; then
cp "$FIXDIR/vsftpd/ubuntu/12.10/vsftpd_2.3.5-3ubuntu1_i386.deb" "vsftpd_2.3.5-3ubuntu1.deb"
else
cp "$FIXDIR/vsftpd/ubuntu/12.10/vsftpd_2.3.5-3.jme_amd64.deb" "vsftpd_2.3.5-3ubuntu1.deb"
fi
fi
#install
dpkg -i vsftpd_2.3.5-3ubuntu1.deb
echo "vsftpd hold" | dpkg --set-selections # Official updates to the VSFTPD package will break functionality since the package is broken OOTB
cd $origDir
fi
elif [ "$yrelease" == "13" ]; then
# Ubuntu 13.04
if [ "$mrelease" == "04" ]; then
remove_vsftpd
echo -e "\nRunning VSFTPD fix for Ubuntu 13.04\n"
cd "$patchDir"
if [ ! -e vsftpd_3.0.2-patched_ubuntu.deb ]; then
if [ $OSBits -eq "32" ]; then
cp "$FIXDIR/vsftpd/ubuntu/13.04/vsftpd_3.0.2-patched_ubuntu_13.04_x86.deb" "vsftpd_3.0.2-patched_ubuntu.deb"
else
cp "$FIXDIR/vsftpd/ubuntu/13.04/vsftpd_3.0.2-1ubuntu1_amd64_patched.deb" "vsftpd_3.0.2-patched_ubuntu.deb"
fi
fi
dpkg -i vsftpd_3.0.2-patched_ubuntu.deb
echo "vsftpd hold" | dpkg --set-selections # Official updates to the VSFTPD package will break functionality since the package is broken OOTB
cd $origDir
fi
# Ubuntu 13.10
if [ "$mrelease" == "10" ]; then
echo -e "\nRunning VSFTPD fix for Ubuntu 13.10\n"
fi
elif [ "$yrelease" == "14" ]; then
# Ubuntu 14.04
if [ "$mrelease" == "04" ]; then
echo -e "\nRunning VSFTPD fix for Ubuntu 14.04\n"
if [ $OSBits -eq "64" ]; then
remove_vsftpd
cp "$FIXDIR/vsftpd/ubuntu/14.04/vsftpd_3.0.2-1ubuntu2_amd64.deb" "vsftpd_3.0.2-1ubuntu2.deb"
dpkg -i vsftpd_3.0.2-1ubuntu2.deb
echo "vsftpd hold" | dpkg --set-selections # Official updates to the VSFTPD package will break functionality since the package is broken OOTB
fi
fi
# Ubuntu 14.10
if [ "$mrelease" == "10" ]; then
echo -e "\nRunning VSFTPD fix for Ubuntu 14.10\n"
if [ $OSBits -eq "64" ]; then
remove_vsftpd
cp "$FIXDIR/vsftpd/ubuntu/14.10/vsftpd_3.0.2-14ubuntu1_amd64.deb" "vsftpd_3.0.2-14ubuntu1.deb"
dpkg -i vsftpd_3.0.2-14ubuntu1.deb
echo "vsftpd hold" | dpkg --set-selections # Official updates to the VSFTPD package will break functionality since the package is broken OOTB
fi
fi
fi
fi
fi
# Run our fixes to the vsftpd config file
fixVSFTPConfig
}
function aptgetInstall(){
# Parameter $1 is a list of programs to install
# Parameter $2 is used to specify runlevel 1 in front of the command to prevent daemons from automatically starting (needed for amavisd-new)
if [ -n "$noapt" ] ; then # skip install
echo "skipping apt-get install for:$1"
return
fi
# first, try to install without any prompt, then if anything goes wrong, normal install..
cmd="apt-get -y --no-remove --allow-unauthenticated install $1"
if [ ! -z "$2" ]; then
cmd="RUNLEVEL=1 $cmd"
fi
# Run the command
sh -c "$cmd"
if [ $? -ne 0 ]; then
cmd="apt-get -y --allow-unauthenticated install $1"
if [ ! -z "$2" ]; then
cmd="RUNLEVEL=1 $cmd"
fi
sh -c "$cmd"
fi
PackageFailed="$?"
}
function aptPackageInstallOrManualGet(){
cd "$patchDir"
aptgetInstall "$1"
AptExitCode="$PackageFailed"
if [ "$AptExitCode" -eq "100" ]; then
PackageExists=$(echo "$AptExitCode")
else
PackageExists=
fi
if [ ! -z "$PackageExists" ]; then
echo -e "\nPackage $1 was not found in the main Ubuntu repository. However, it is needed in EHCP. Checking EHCP fix directory for local fix.\n"
# See if the package exists locally
if [ $OSBits -eq "64" ]; then
localPackageName="$1_x64.deb"
else
localPackageName="$1.deb"
fi
localSearchResults=$(find "$FIXDIR" -name "$localPackageName")
if [ ! -z "$localSearchResults" ]; then
cp "$localSearchResults" "$1.deb"
fi
# Clear the flag as we have found it locally...
if [ -e "$1.deb" ]; then
PackageExists=
fi
fi
# If the package was not found locally, get it from the web
baseDLURL="http://www.dinofly.com/files/linux/"
if [ ! -z "$PackageExists" ]; then
echo -e "\nPackage $1 was not found in the main Ubuntu repository. However, it is needed in EHCP. Checking developer's server for appropriate package.\n"
# Get proper version of package from
if [ $OSBits -eq "64" ]; then
# Check to see if package exists
fExists=$(wget --spider -v "$baseDLURL$1_x64.deb")
fExistsCheck=$(echo "$fExists" | grep "404")
if [ -z "$fExistsCheck" ]; then
echo -e "Package $1 was found on developer server. Downloading and installing now!"
wget -N -O "$1.deb" "$baseDLURL$1_x64.deb"
fi
else
fExists=$(wget --spider -v "$baseDLURL$1.deb")
fExistsCheck=$(echo "$fExists" | grep "404")
if [ -z "$fExistsCheck" ]; then
echo -e "Package $1 was found on developer server. Downloading and installing now!"
wget -N -O "$1.deb" "$baseDLURL$1.deb"
fi
fi
fi
# Install the missing package if it exists within our repository
if [ -e "$1.deb" ]; then
gdebi --n "$1.deb"
fi
}
function aptgetRemove(){
if [ -n "$noapt" ] ; then # skip uninstall
echo "skipping apt-get remove for:$1"
return
fi
# first, try to uninstall without any prompt, then if anything goes wrong, normal uninstall..
cmd="apt-get -y remove $1"
# Run the command
sh -c "$cmd"
if [ $? -ne 0 ]; then
cmd="apt-get remove $1"
# Run the command
sh -c "$cmd"
fi
}
function isAptGetInUseBySomething(){
if [ -e "/var/lib/dpkg/lock" ]; then
APTGETRunning=$(fuser /var/lib/dpkg/lock)
if [ ! -z "$APTGETRunning" ]; then
APTGETProcInfo=$(ps -ef | grep "$APTGETRunning")
clear
echo -e "Unable to run EHCP Force $operationMode script!"
echo ""
echo -e "A system update process is currently running on your system.\n\n$APTGETProcInfo\n\nClose any update applications listed above and try running the script again. Most of these update applications finish quickly. Re-run this installer in a few minutes if you are unsure how to close any update processes."
exit
fi
fi
}
function rootCheck(){
# Check to make sure the script is running as root
if [ "$(id -u)" != "0" ]; then
echo "This script must be run as root" 1>&2
exit 1
fi
# Make EHCP Backup Directory
if [ "$operationMode" == "update" ] || [ "$operationMode" == "update-svn" ]; then
EHCPBACKUPDIR="/root/Backup/EHCP_FORCE"
elif [ "$operationMode" == "upgrade" ]; then
EHCPBACKUPDIR="/root/Backup/EHCP"
fi
if [ ! -e "$EHCPBACKUPDIR" ]; then
mkdir -p "$EHCPBACKUPDIR"
fi
# Make nginx Backup Directory
NGINXBACKUPDIR="/root/Backup/nginx"
if [ ! -e "$NGINXBACKUPDIR" ]; then
mkdir -p "$NGINXBACKUPDIR"
fi
if [ ! -e "/var/www/new/ehcp/config.php" ]; then
echo -e "EHCP is not currently installed. This script may only be used on a valid installation of EHCP Force Edition."
exit 1
fi
}
function updateBeforeInstall(){ # by earnolmartin@gmail.com
# Update packages before installing to avoid errors
checkAptget
if [ "$aptIsInstalled" -eq "1" ] ; then
echo "Updating package information and downloading package updates before installation."
# Make sure the system will update and upgrade
if [ -e "/var/lib/apt/lists/lock" ]; then
rm "/var/lib/apt/lists/lock"
fi
# Make sure the system will update and upgrade
if [ -e "/var/cache/apt/archives/lock" ]; then
rm "/var/cache/apt/archives/lock"
fi
# Run update commands
apt-key update
apt-get update -y --allow-unauthenticated
apt-get upgrade -y --allow-unauthenticated
fi
}
function checkAptget(){
sayi=`which apt-get | wc -w`
if [ $sayi -eq 0 ] ; then
ehco "apt-get is not found."
else
aptIsInstalled=1
echo -e "apt-get seems to be installed on your system.\n"
fi
}
function nginxOff(){
# Stop nginx
manageService "nginx" "stop"
# Disable nginx --- apache is the default
update-rc.d nginx disable
}
function fixEHCPPerms(){ # by earnolmartin@gmail.com
# Secure ehcp files
chown -R root:root /var/www/new/ehcp
chmod -R 755 /var/www/new/ehcp/
# Correct net2ftp permissions
chown -R ${VSFTPDUser}:www-data /var/www/new/ehcp/net2ftp
chmod -R 755 /var/www/new/ehcp/net2ftp
# Correct permissions on test folder - used for testing some things like SSL certs
# Delete old security risk files from the directory first
if [ -e "/var/www/new/ehcp/test" ]; then
rm -r "/var/www/new/ehcp/test"
fi
mkdir -p /var/www/new/ehcp/test
chown -R ${VSFTPDUser}:www-data /var/www/new/ehcp/test
chmod -R 755 /var/www/new/ehcp/test
# Correct extplorer permissions
if [ -e "/var/www/new/ehcp/extplorer" ]; then
chown -R ${VSFTPDUser}:www-data /var/www/new/ehcp/extplorer
chmod -R 755 /var/www/new/ehcp/extplorer
fi
# Make default index readable
chmod 755 /var/www/new/index.html
# Set proper permissions on vhosts
chown ${VSFTPDUser}:www-data -R /var/www/vhosts/
chmod 0755 -R /var/www/vhosts/
# Secure webmail
fixSQMailPerms
# Fix EHCP security
if [ -e "/var/www/new/ehcp/ehcpbackup.php" ]; then
rm "/var/www/new/ehcp/ehcpbackup.php"
fi
if [ -e "/var/www/new/ehcp/phpadmin.php" ]; then
rm "/var/www/new/ehcp/phpadmin.php"
fi
if [ -e "/var/www/new/ehcp/install_log.txt" ]; then
rm "/var/www/new/ehcp/install_log.txt"
fi
# Sysinfo isn't used or maintained in EHCP Force
if [ -e "/var/www/new/ehcp/sysinfo" ]; then
rm -r "/var/www/new/ehcp/sysinfo"
fi
chmod 700 "/var/www/new/ehcp/install_1.php"
chmod 700 "/var/www/new/ehcp/install_2.php"
chmod 700 "/var/www/new/ehcp/install_lib.php"
chmod 700 "/var/www/new/ehcp/install2.1.php"
chmod 700 "/var/www/new/ehcp/ehcp_fix_apache.php"
#
# Remove some old files
#
# Remove update / upgrade scripts that were removed.
if [ -e "/var/www/new/ehcp/ehcpforceupdate_svn_version_dev.sh" ]; then
rm "/var/www/new/ehcp/ehcpforceupdate_svn_version_dev.sh"
fi
if [ -e "/var/www/new/ehcp/ehcpforceupgrade.sh" ]; then
rm "/var/www/new/ehcp/ehcpforceupgrade.sh"
fi
# Create php error log file and use proper permissions
if [ ! -e "/var/log/php_errors.log" ]; then
> "/var/log/php_errors.log"
fi
chown ${VSFTPDUser}:adm "/var/log/php_errors.log"
chmod 774 "/var/log/php_errors.log"
}
function logDirFix(){ # by earnolmartin@gmail.com
chmod 755 /var/www/new/ehcp/log
chmod 744 /var/www/new/ehcp/log/ehcp_failed_authentication.log
chown ${VSFTPDUser}:www-data /var/www/new/ehcp/log/ehcp_failed_authentication.log
}
function nginxUpdateFiles(){ # by earnolmartin@gmail.com
if [ -e "/etc/nginx/sites-enabled/default" ]; then
# Make backups of originals just in case
CurDate=$(date +%Y_%m_%d_%s)
cp "/etc/nginx/sites-enabled/default" "$NGINXBACKUPDIR/default_backup_$CurDate"
# Update configuration
cp "/var/www/new/ehcp/etc/nginx/default.nginx" "/etc/nginx/sites-enabled/default"
fi
if [ -e "/etc/nginx/nginx.conf" ]; then
# Make backups of originals just in case
CurDate=$(date +%Y_%m_%d_%s)
cp "/etc/nginx/nginx.conf" "$NGINXBACKUPDIR/nginx.conf_backup_$CurDate"
# Update configuration
cp "/var/www/new/ehcp/etc/nginx/nginx.conf" "/etc/nginx/nginx.conf"
# And update user and group
changeNginxUser
fi
}
function CheckPreReqs(){
# Stop apache first...
manageService "apache2" "stop"
# Normal
aptgetInstall nginx
# Install PHP-FPM which can be tricky evidently...
installPHPFPM
}
function installPHPFPM(){
aptgetInstall php5-fpm
aptgetInstall php-fpm
countOfPHPFPM=$(apt-cache search "fpm" | grep "php" | grep "\-fpm" | awk '{print $1}' | wc -l)
if [ "$countOfPHPFPM" -le "2" ]; then
phpfpmversionsFromCache=$(apt-cache search "fpm" | grep "php" | grep "\-fpm" | head -n 2 | awk '{print $1}')
for version in "$phpfpmversionsFromCache" ; do
if [ ! -z "$version" ]; then
aptgetInstall "$version"
fi
done
fi
}
function addConfDFolder(){
# If the conf.d folder doesn't exist, we must create it!
if [ ! -e "/etc/apache2/conf.d" ]; then
mkdir -p "/etc/apache2/conf.d"
fi
# Include it in apache2 config
if [ -e "/etc/apache2/apache2.conf" ]; then
APACHECONFCONTENTS=$(cat "/etc/apache2/apache2.conf" | grep "conf.d")
if [ -z "$APACHECONFCONTENTS" ]; then
echo "Include conf.d/" >> "/etc/apache2/apache2.conf"
fi
fi
}
function ApacheLoadConfDFolder(){
if [ -e "/etc/apache2/apache2.conf" ]; then
APACHECONFCONTENTS=$(cat "/etc/apache2/apache2.conf" | grep "IncludeOptional conf.d")
if [ -z "$APACHECONFCONTENTS" ]; then
echo "IncludeOptional conf.d/*" >> "/etc/apache2/apache2.conf"
fi
fi
}
function killAllMySQLAndRestart(){
# Stop service
manageService "mysql" "stop"
# Get each PID of mysqld and kill it --- random bug occurs sometimes after install
ps -ef | grep mysqld | while read mysqlProcess ; do kill -9 $(echo $mysqlProcess | awk '{ print $2 }') ; done
# Restart the service
manageService "mysql" "start"
}
function secureApache(){
APACHE2Conf="/etc/apache2/apache2.conf"
if [ -e "$APACHE2Conf" ]; then
containsDef=$(cat "$APACHE2Conf" | grep "<Directory /var/www/>")
if [ ! -z "$containsDef" ]; then
sed -i "s/Options Indexes FollowSymLinks/Options -Indexes +FollowSymLinks/g" "$APACHE2Conf"
else
containsCorrectIndexs=$(cat "$APACHE2Conf" | grep "Options -Indexes +FollowSymLinks")
if [ -z "$containsCorrectIndexs" ]; then
echo "Options -Indexes +FollowSymLinks" >> "$APACHE2Conf"
fi
fi
fi
}
function allowHTACCESSOverrides(){
APACHE2Conf="/etc/apache2/apache2.conf"
if [ -e "$APACHE2Conf" ]; then
# This should only be done for Apache versions in latest versions of Ubuntu where they define specifically allow override perms
containsDef=$(cat "$APACHE2Conf" | grep "<Directory /var/www/>")
if [ ! -z "$containsDef" ]; then
containsDef=$(cat "$APACHE2Conf" | grep "<Directory /var/www/vhosts>")
if [ -z "$containsDef" ]; then
echo -e "<Directory /var/www/vhosts>\n\tOptions -Indexes +FollowSymLinks\n\tAllowOverride All\n\tRequire all granted\n</Directory>" >> "$APACHE2Conf"
fi
fi
fi
}
function installExtras(){
# Spam Assassin
AntiSpamInstalled=$(which "spamassassin")
if [ -z "$AntiSpamInstalled" ]; then
if [ ! -e "${ehcpConfigDir}/skip_amvis_spam_clamav" ]; then
echo ""
echo -n "Install Amavis, SpamAssassin, and ClamAV? [y/n]: "
read insMode
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" != "n" ]; then
installAntiSpam
else
echo -n "Prompt on future run to install Amavis, SpamAssassin, and ClamAV? [y/n]: "
read insMode
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" == "n" ]; then
> "${ehcpConfigDir}/skip_amvis_spam_clamav"
fi
fi
else
echo -e "Skipping anti-spam software installation prompts..."
fi
else
echo -e "Anti-Spam software has been detected and is already installed."
fi
# PolicyD
if [ ! -e "/var/www/new/ehcp/policyd" ]; then
if [ ! -e "${ehcpConfigDir}/skip_policy_d_install_prompt" ]; then
if ([[ "$distro" == "ubuntu" && "$yrelease" -ge "14" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]) && [ "$promptForPolicyD" = true ]; then
echo ""
echo -n "ADVANCED: Would you like to install PolicyD (Ubuntu 14.04, Debian 8, and Up ONLY)? [y/n]: "
read policyDI
policyDI=$(echo "$policyDI" | awk '{print tolower($0)}')
if [ "$policyDI" == "y" ] || "$policyDI" == "yes" ]; then
insPolicyD=true
echo -e "Installing PolicyD"
installPolicyD
echo -e "Installation of PolicyD complete."
else
echo -n "Prompt on future run to install PolicyD? [y/n]: "
read insMode
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" == "n" ]; then
> "${ehcpConfigDir}/skip_policy_d_install_prompt"
fi
fi
fi
else
echo -e "Skipping PolicyD software installation prompts..."
fi
else
echo -e "PolicyD software has been detected and is already installed."
echo -e ""
echo -e "Updating the PolicyD daemon if necessary."
updatePolicyDDaemon
fi
# Fail2Ban
Fail2BanInstalled=$(which "fail2ban-server")
if [ -z "$Fail2BanInstalled" ]; then
if [ ! -e "${ehcpConfigDir}/skip_fail2ban_install_prompt" ]; then
echo ""
echo -n "Install fail2ban? [y/n]: "
read insMode
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" != "n" ]; then
echo -e "Installing Fail2Ban\n"
# Install Fail2Ban
fail2ban
else
echo -n "Prompt on future run to install PolicyD? [y/n]: "
read insMode
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" == "n" ]; then
> "${ehcpConfigDir}/skip_fail2ban_install_prompt"
fi
fi
else
echo -e "Skipping Fail2Ban software installation prompts..."
fi
else
echo -e "Fail2Ban has been detected and is already installed."
fi
# Mod Security and Evasive
APACHE2CTLExists=$(which "apache2ctl")
APACHECTLExists=$(which "apachectl")
PromptForApacheSecurityAndEvasive=true
# Check that both modules are enabled
if [ ! -z "$APACHE2CTLExists" ]; then
ModEvasiveInstalled=$(apache2ctl -M | grep -o "evasive.*")
ModSecurityInstalled=$(apache2ctl -M | grep -o "security.*")
if [ ! -z "$ModEvasiveInstalled" ] && [ ! -z "$ModSecurityInstalled" ]; then
PromptForApacheSecurityAndEvasive=false
fi
fi
# Extra fallback to apachectl just in-case
if [ ! -z "$APACHECTLExists" ] && [ "$PromptForApacheSecurityAndEvasive" = true ]; then
ModEvasiveInstalled=$(apachectl -M | grep -o "evasive.*")
ModSecurityInstalled=$(apachectl -M | grep -o "security.*")
if [ ! -z "$ModEvasiveInstalled" ] && [ ! -z "$ModSecurityInstalled" ]; then
PromptForApacheSecurityAndEvasive=false
fi
fi
# Last check just in-case
if [ -e "/etc/apache2/mod_security_rules" ] && [ "$PromptForApacheSecurityAndEvasive" = true ]; then
PromptForApacheSecurityAndEvasive=false
fi
if [ "$PromptForApacheSecurityAndEvasive" = true ]; then
if [ ! -e "${ehcpConfigDir}/skip_apache2_security_modules_install_prompt" ]; then
echo ""
echo -n "Install and enable Apache2 security modules (mod-security and mod-evasive)? [y/n]: "
read insMode
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" != "n" ]; then
echo -e "Installing Apache2 Security Modules\n"
# Install Apache2 Security Modules
apacheSecurity
else
echo -n "Prompt on future run to install Apache2 security modules? [y/n]: "
read insMode
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" == "n" ]; then
> "${ehcpConfigDir}/skip_apache2_security_modules_install_prompt"
fi
fi
else
echo -e "Skipping Apache2 Security Modules software installation prompts..."
fi
else
echo -e "Apache2 security and evasive modules have been detected and are already installed."
if [ "$OSUpgradeChangeDetectedFromInstall" = true ]; then
# If we've changed distribution versions, we need to reset the rules
echo -e "A system upgrade has been detected since the original install of EHCP... updating mod security rules..."
apacheSecurity
fi
fi
# Clone nginx bat bots blocker
installBadBotsBlockerNginx
}
function installAntiSpam(){
# Postfix must be installed
CURDIR=$(pwd)
ANTISPAMINSTALLED=$(which "spamassassin")
POSTFIXInstalled=$(which "postfix")
postFixUserExists=$(grep postfix /etc/passwd)
if [ ! -z "$POSTFIXInstalled" ] && [ ! -z "$postFixUserExists" ]; then
# SpamAssassin is not installed / configured
# Lets roll
# Set variables
SPConfig="/etc/default/spamassassin"
PHeadChecks="/etc/postfix/header_checks"
PostFixConf="/etc/postfix/main.cf"
PostFixMaster="/etc/postfix/master.cf"
CONTENTFILTER="/etc/amavis/conf.d/15-content_filter_mode"
SPAMASSASSCONF="/etc/spamassassin/local.cf"
AMAVISHOST="/etc/amavis/conf.d/05-node_id"
AMAVISDEBDEFAULTSCONF="/etc/amavis/conf.d/20-debian_defaults"
AMAVISDOMAINIDCONF="/etc/amavis/conf.d/05-domain_id"
CLAMAVCONFFILE="/etc/clamav/clamd.conf"
# Install Anti-Spam Software
aptgetInstall "amavisd-new" "runlevel=1" # amavisd-new install should not start the daemon immediately after installation since we haven't configured our fully qualified domain name of the server yet
# Prompt for FQDN
echo ""
echo -n "Please enter your Fully Qualified Domain Name (FQDN) for this mail server: "
read FQDNName
FQDNName=$(echo "$FQDNName" | awk '{print tolower($0)}')
if [ -z "$FQDNName" ]; then
# Just replace it with ehcpforce.tk
sed -i "s/^#\$myhostname.*/\$myhostname = \"ehcpforce.tk\";/g" "$AMAVISHOST"
sed -i "s#^\$myhostname.*#\$myhostname = \"ehcpforce.tk\";#g" "$AMAVISHOST"
else
sed -i "s/^#\$myhostname.*/\$myhostname = \"$FQDNName\";/g" "$AMAVISHOST"
sed -i "s#^\$myhostname.*#\$myhostname = \"$FQDNName\";#g" "$AMAVISHOST"
fi
# Install SpamAssassin and Clamav-Daemon
aptgetInstall "spamassassin clamav-daemon"
# Install individually incase some packages are not found
aptgetInstall libnet-dns-perl
aptgetInstall pyzor
aptgetInstall razor
aptgetInstall arj
aptgetInstall bzip2
aptgetInstall cabextract
aptgetInstall cpio
aptgetInstall file
aptgetInstall gzip
aptgetInstall lha
aptgetInstall nomarch
aptgetInstall pax
aptgetInstall rar
aptgetInstall unrar
aptgetInstall unzip
aptgetInstall zip
aptgetInstall zoo
aptgetInstall unzoo
aptgetInstall libdbi-perl
aptgetInstall opendkim
aptgetInstall postfix-policyd-spf-python
# Only keep going if we have the basic packages installed
AMAVISINS=$(which amavisd-new)
AMAVISINSNEW=$(which amavisd)
SPAMASSASSINS=$(which spamassassin)
if [[ ! -z "$AMAVISINS" || ! -z "$AMAVISINSNEW" ]] && [ ! -z "$SPAMASSASSINS" ]; then
# Add Users
adduser clamav amavis
adduser amavis clamav
# Enable SpamAssassin
if [ -e "$SPConfig" ]; then
sed -i "s#ENABLED=.*#ENABLED=1#g" "$SPConfig"
sed -i "s#CRON=.*#CRON=1#g" "$SPConfig"
# More settings
if [ -e "$SPAMASSASSCONF" ]; then
# Rewrite the header
sed -i "s/#rewrite_header.*/rewrite_header Subject \*\*\*\*\*SPAM\*\*\*\*\*/g" "$SPAMASSASSCONF"
sed -i "s/# rewrite_header.*/rewrite_header Subject \*\*\*\*\*SPAM\*\*\*\*\*/g" "$SPAMASSASSCONF"
sed -i "s#rewrite_header.*#rewrite_header Subject \*\*\*\*\*SPAM\*\*\*\*\*#g" "$SPAMASSASSCONF"
# Set the spam score
sed -i "s/#required_score.*/required_score 12.0/g" "$SPAMASSASSCONF"
sed -i "s/# required_score.*/required_score 12.0/g" "$SPAMASSASSCONF"
sed -i "s#required_score.*#required_score 12.0#g" "$SPAMASSASSCONF"
# use bayes 1
sed -i "s/#use_bayes.*/use_bayes 1/g" "$SPAMASSASSCONF"
sed -i "s/# use_bayes.*/use_bayes 1/g" "$SPAMASSASSCONF"
sed -i "s#use_bayes.*#use_bayes 1#g" "$SPAMASSASSCONF"
# use bayes auto learn
sed -i "s/#bayes_auto_learn.*/bayes_auto_learn 1/g" "$SPAMASSASSCONF"
sed -i "s/# bayes_auto_learn.*/bayes_auto_learn 1/g" "$SPAMASSASSCONF"
sed -i "s#bayes_auto_learn.*#bayes_auto_learn 1#g" "$SPAMASSASSCONF"
fi
manageService "spamassassin" "restart"
fi
# Integrate into postfix
postconf -e "content_filter = smtp-amavis:[127.0.0.1]:10024"
echo "use strict;
# You can modify this file to re-enable SPAM checking through spamassassin
# and to re-enable antivirus checking.
#
# Default antivirus checking mode
# Uncomment the two lines below to enable it
#
@bypass_virus_checks_maps = (
\%bypass_virus_checks, \@bypass_virus_checks_acl, \$bypass_virus_checks_re);
#
# Default SPAM checking mode
# Uncomment the two lines below to enable it
#
@bypass_spam_checks_maps = (
\%bypass_spam_checks, \@bypass_spam_checks_acl, \$bypass_spam_checks_re);
1; # insure a defined return" > "$CONTENTFILTER"
if [ -e "$PostFixMaster" ]; then
POSTFIXMASCHECK1=$(cat "$PostFixMaster" | grep "smtp-amavis")
if [ -z "$POSTFIXMASCHECK1" ]; then
echo "
smtp-amavis unix - - - - 2 smtp
-o smtp_data_done_timeout=1200
-o smtp_send_xforward_command=yes
-o disable_dns_lookups=yes
-o max_use=20" >> "$PostFixMaster"
fi
POSTFIXMASCHECK2=$(cat "$PostFixMaster" | grep "127.0.0.1:10025")
if [ -z "$POSTFIXMASCHECK2" ]; then
echo "
127.0.0.1:10025 inet n - - - - smtpd
-o content_filter=
-o local_recipient_maps=
-o relay_recipient_maps=
-o smtpd_restriction_classes=
-o smtpd_delay_reject=no
-o smtpd_client_restrictions=permit_mynetworks,reject
-o smtpd_helo_restrictions=
-o smtpd_sender_restrictions=
-o smtpd_recipient_restrictions=permit_mynetworks,reject
-o smtpd_data_restrictions=reject_unauth_pipelining
-o smtpd_end_of_data_restrictions=
-o mynetworks=127.0.0.0/8
-o smtpd_error_sleep_time=0
-o smtpd_soft_error_limit=1001
-o smtpd_hard_error_limit=1000
-o smtpd_client_connection_count_limit=0
-o smtpd_client_connection_rate_limit=0
-o receive_override_options=no_header_body_checks,no_unknown_recipient_checks" >> "$PostFixMaster"
fi
fi
#http://stackoverflow.com/questions/11694980/using-sed-insert-a-line-below-or-above-the-pattern
POSTFIXMASCHECK3=$(cat "$PostFixMaster" | grep -A2 "pickup" | grep -v "pickup" | grep -o "\-o receive_override_options=no_header_body_checks$")
if [ -z "$POSTFIXMASCHECK3" ]; then
sed -i "/pickup.*/a\\\t-o receive_override_options=no_header_body_checks" "$PostFixMaster"
fi
POSTFIXMASCHECK4=$(cat "$PostFixMaster" | grep -A2 'pickup' | grep -v "pickup" | grep -o "\-o content_filter=$")
if [ -z "$POSTFIXMASCHECK4" ]; then
sed -i "/pickup.*/a\\\t-o content_filter=" "$PostFixMaster"
fi
# Change settings for amavis deb defaults
if [ -e "$AMAVISDEBDEFAULTSCONF" ]; then
# Set spam scores higher for a few levels
# Change $sa_kill_level_deflt to 8.01
sed -i "s/^#\$sa_kill_level_deflt.*/\$sa_kill_level_deflt = 8.01; # triggers spam evasive actions/g" "$AMAVISDEBDEFAULTSCONF"
sed -i "s/^# \$sa_kill_level_deflt.*/\$sa_kill_level_deflt = 8.01; # triggers spam evasive actions/g" "$AMAVISDEBDEFAULTSCONF"
sed -i "s/^\$sa_kill_level_deflt.*/\$sa_kill_level_deflt = 8.01; # triggers spam evasive actions/g" "$AMAVISDEBDEFAULTSCONF"
# Change $sa_dsn_cutoff_level to 11
sed -i "s/^#\$sa_dsn_cutoff_level.*/\$sa_dsn_cutoff_level = 11; # spam level beyond which a DSN is not sent/g" "$AMAVISDEBDEFAULTSCONF"
sed -i "s/^# \$sa_dsn_cutoff_level.*/\$sa_dsn_cutoff_level = 11; # spam level beyond which a DSN is not sent/g" "$AMAVISDEBDEFAULTSCONF"
sed -i "s/^\$sa_dsn_cutoff_level.*/\$sa_dsn_cutoff_level = 11; # spam level beyond which a DSN is not sent/g" "$AMAVISDEBDEFAULTSCONF"
# Check to see if we have the rewrite subject line in the configuration file
amavisHasSubjRewrite=$(cat "$AMAVISDEBDEFAULTSCONF" | grep '$sa_spam_modifies_subj')
if [ -z "$amavisHasSubjRewrite" ]; then
sed -i "/^\$sa_spam_subject_tag.*/a\$sa_spam_modifies_subj = 1;" "$AMAVISDEBDEFAULTSCONF"
else
sed -i "s/^\$sa_spam_modifies_subj.*/\$sa_spam_modifies_subj = 1;/g" "$AMAVISDEBDEFAULTSCONF"
fi
fi
# Allow for any domain configuration
if [ -e "$AMAVISDOMAINIDCONF" ]; then
# Check to see if we have the rewrite subject line in the configuration file
amavisHasLocalDomainMaps=$(cat "$AMAVISDOMAINIDCONF" | grep '@local_domains_maps')
if [ -z "$amavisHasLocalDomainMaps" ]; then
sed -i "/^@local_domains_acl.*/a@local_domains_maps = \( \[\"\.\"\] \);" "$AMAVISDOMAINIDCONF"
else
sed -i "s/^@local_domains_maps.*/@local_domains_maps = \( \[\"\.\"\] \);/g" "$AMAVISDOMAINIDCONF"
fi
fi
# Needed in Ubuntu 16.04
# Allow supplementary groups to fix permissions
if [ -e "$CLAMAVCONFFILE" ]; then
sed -i "s/^AllowSupplementaryGroups.*/AllowSupplementaryGroups true/g" "$CLAMAVCONFFILE"
fi
# Should be good to go?
# Restart Amavis
manageService "amavis" "restart"
# Restart services
manageService "postfix" "restart"
# Get lastest clamav definitions
freshclam
# Restart clamav-daemon
manageService "clamav-daemon" "restart"
fi
fi
}
function fixSASLAUTH(){
update-rc.d saslauthd defaults
systemctl enable saslauthd
# Fix SASLAUTH CACHE and limit to no threads for better performance
if [ -e "/etc/default/saslauthd" ]; then
backupFile "/etc/default/saslauthd"
echo "NAME=\"saslauthd\"
START=yes
MECHANISMS=\"pam\"
PARAMS=\"-n 0 -m /var/spool/postfix/var/run/saslauthd -r\"
OPTIONS=\"-n 0 -m /var/spool/postfix/var/run/saslauthd -r\"
" > "/etc/default/saslauthd"
# restart the service
manageService "saslauthd" "restart"
fi
}
function backupFile(){
# Backups up a file in the general backup directory.
# Params:
# $1 = filepath to backup
genBackupDIR="/root/Backup/general"
if [ ! -e "$genBackupDIR" ]; then
mkdir -p "$genBackupDIR"
fi
if [ ! -z "$1" ]; then
FileToBackup="$1"
if [ -e "$FileToBackup" ]; then
nameOfFileToBeBackedUp=$(basename "$FileToBackup")
dirOfFileToBeBackedUp=$(dirname "$FileToBackup")
# Replace "/" with underscores so that the directory where the file should
# be if the user wishes to restore the file is in the file name of the backup
fileStructure=$(echo "$dirOfFileToBeBackedUp" | tr "/" "_")
# Get first character that isn't underscore
fileStructure=$(echo "$fileStructure" | cut -c 2-)
nowDate=$(date +"%m_%d_%Y_%H%M%S")
backupFullPath="${genBackupDIR}/${fileStructure}_${nameOfFileToBeBackedUp}_${nowDate}"
cp "$FileToBackup" "$backupFullPath"
fi
fi
}
function fixPHPFPMListen(){
FPMConfFile="$PHPCONFDir/fpm/pool.d/www.conf"
if [ -e "$FPMConfFile" ]; then
sed -i "s#^listen =.*#listen = 9000#g" "$FPMConfFile"
fi
}
function fixNginxSessions(){
nginxFPMPHPConfig="$PHPCONFDir/fpm/php.ini"
if [ -e "$nginxFPMPHPConfig" ]; then
SESSIONPathConfigured=$(cat "$nginxFPMPHPConfig" | grep -o "^session.save_path.*")
if [ -z "$SESSIONPathConfigured" ]; then
echo -e "session.save_path = \"/tmp\"" >> "$nginxFPMPHPConfig"
fi
managePHPFPMService
fi
}
function fixPHPmcrypt(){
aptgetInstall php5-mcrypt
aptgetInstall php-mcrypt
php5enmod mcrypt
phpenmod mcrypt
}
function fixPopBeforeSMTP(){
aptPackageInstallOrManualGet "pop-before-smtp"
}
function fixPostfixMainConfIPv6(){
PostfixMainConf="/etc/postfix/main.cf"
if [ -e "$PostfixMainConf" ]; then
CurrentPostfixMyNetworks=$(cat /etc/postfix/main.cf | grep -o "^mynetworks.*" | grep -o "=.*" | grep -o "[^=]*" | sed -e 's/^ *//' -e 's/ *$//')
getLastChar="${CurrentPostfixMyNetworks: -1}"
HasIPV6InIt=$(cat /etc/postfix/main.cf | grep -o "^mynetworks.*" | grep -o "=.*" | grep -o "[^=]*" | sed -e 's/^ *//' -e 's/ *$//' | grep -F "[::1]/128")
if [ -z "$HasIPV6InIt" ]; then
if [ "$getLastChar" == "," ]; then
sed -i "s#^mynetworks.*#mynetworks = $CurrentPostfixMyNetworks [::1]/128#g" "$PostfixMainConf"
else
sed -i "s#^mynetworks.*#mynetworks = $CurrentPostfixMyNetworks, [::1]/128#g" "$PostfixMainConf"
fi
fi
fi
}
function removeApacheUmask(){
APACHE2ENVVARS="/etc/apache2/envvars"
if [ -e "$APACHE2ENVVARS" ]; then
sed -i "s/^umask/#umask/g" "$APACHE2ENVVARS"
fi
}
function securePHPMyAdminConfiguration(){
# Variables
PHPMYADMINMAINCONFFILE="/etc/phpmyadmin/config.inc.php"
PHPMYADMINTMPDIR="/var/lib/phpmyadmin/tmp"
PHPMYADMINCONFFILE="/usr/share/phpmyadmin/config.inc.php"
PHPMYADMINROOTWL="/usr/share/phpmyadmin/rootip_whitelist.php"
PHPMYADMINROOTWLFunctions="/usr/share/phpmyadmin/rootip_whitelist_functions.php"
PHPMYADMINTEMPUPDIR="/usr/share/phpmyadmin/upload"
WHITELISTEMPLATEFILE="/var/www/new/ehcp/etc/phpmyadmin/rootip_whitelist.php"
WHITELISTEMPLATEFILEFunctions="/var/www/new/ehcp/etc/phpmyadmin/rootip_whitelist_functions.php"
DEFAULTPHPMYADMINCONFTEMPLATE="/var/www/new/ehcp/etc/phpmyadmin/phpmyadmin_default_conf"
DEFAULTPHPMYADMINMAINCONFTEMPLATE="/var/www/new/ehcp/etc/phpmyadmin/phpmyadmin_default_main_conf"
# Fix perms on temporary directory that may be used for file uploads (importing exported sql files for example):
if [ -e "$PHPMYADMINTMPDIR" ]; then
chown -R ${VSFTPDUser}:www-data "$PHPMYADMINTMPDIR"
fi
# See if PHPMyAdmin config.inc.php exists and secure its configuration if it does
if [ -e "$PHPMYADMINMAINCONFFILE" ]; then
phpMyAdminConfigurationTweaks "$PHPMYADMINMAINCONFFILE"
else
# Copy template over to have a valid phpmyadmin config
cp "$DEFAULTPHPMYADMINMAINCONFTEMPLATE" "$PHPMYADMINMAINCONFFILE"
fi
if [ -e "$PHPMYADMINCONFFILE" ]; then
phpMyAdminConfigurationTweaks "$PHPMYADMINCONFFILE"
else
# Copy template over to have a valid phpmyadmin config
cp "$DEFAULTPHPMYADMINCONFTEMPLATE" "$PHPMYADMINCONFFILE"
fi
# Copy root ip address whitelist over to phpmyadmin directory if it doesn't exist
if [ ! -e "$PHPMYADMINROOTWL" ]; then
cp "$WHITELISTEMPLATEFILE" "$PHPMYADMINROOTWL"
fi
# Copy root ip address whitelist functions over to phpmyadmin directory if it doesn't exist
if [ ! -e "$PHPMYADMINROOTWLFunctions" ]; then
cp "$WHITELISTEMPLATEFILEFunctions" "$PHPMYADMINROOTWLFunctions"
fi
# Create temporary upload directory for large SQL database imports
if [ ! -e "$PHPMYADMINTEMPUPDIR" ]; then
mkdir -p "$PHPMYADMINTEMPUPDIR"
fi
# Replace rootip if the function is in it because this had to be separated to avoid errors in some configurations...
if [ -e "$PHPMYADMINROOTWL" ]; then
hasFunctionPrivateIP=$(cat "$PHPMYADMINROOTWL" | grep -o "function isPrivateIP")
if [ ! -z "$hasFunctionPrivateIP" ]; then
cp "$WHITELISTEMPLATEFILE" "$PHPMYADMINROOTWL"
fi
fi
fixPHPMyAdminIssuesSpecificOSVer
chown ${VSFTPDUser}:www-data -R $PHPMYADMINTEMPUPDIR
chmod 775 -R $PHPMYADMINTEMPUPDIR
# Required in Ubuntu 16.04 and up
aptgetInstall "php-gettext"
}
function fixPHPMyAdminIssuesSpecificOSVer(){
# Code fixes in Ubuntu 18.04 and Debian 10
if [[ "$distro" == "ubuntu" && "$yrelease" -eq "18" ]] || [[ "$distro" == "debian" && "$yrelease" -eq "10" ]]; then
sed -i "s/|\s*\((count(\$analyzed_sql_results\['select_expr'\]\)/| (\1)/g" "/usr/share/phpmyadmin/libraries/sql.lib.php" # https://stackoverflow.com/questions/48001569/phpmyadmin-count-parameter-must-be-an-array-or-an-object-that-implements-co
sed -i 's/if (\$options != null \&\& count(\$options) > 0) {/if (\$options != null \&\& count((array)\$options) > 0) {/g;' "/usr/share/phpmyadmin/libraries/plugin_interface.lib.php" # https://stackoverflow.com/questions/55066509/error-in-phpmyadmin-warning-in-libraries-plugin-interface-lib-php551
fi
}
function phpMyAdminConfigurationTweaks(){
if [ ! -z "$1" ]; then
# Config file to modify = $1
phpmyadminCONFToModify="$1"
# Run checks for various extra config settings
hasNoRootCheck=$(cat "$phpmyadminCONFToModify" | grep -o "$cfg\['Servers'\]\[1\]\['AllowRoot'\]")
hasTmpUploadDir=$(cat "$phpmyadminCONFToModify" | grep -o "$cfg\['UploadDir'\]")
hasIncludeApprovedIPAddressesFunction=$(cat "$phpmyadminCONFToModify" | grep -o "include_once 'rootip_whitelist_functions.php'")
hasIncludeApprovedIPAddressesFunctionTwo=$(cat "$phpmyadminCONFToModify" | grep -o "include_once '/usr/share/phpmyadmin/rootip_whitelist_functions.php'")
hasIncludeApprovedIPAddresses=$(cat "$phpmyadminCONFToModify" | grep -o "include 'rootip_whitelist.php'")
hasIncludeApprovedIPAddressesTwo=$(cat "$phpmyadminCONFToModify" | grep -o "include '/usr/share/phpmyadmin/rootip_whitelist.php'")
hasPHPCloseTag=$(cat "$phpmyadminCONFToModify" | grep -o "^?>")
# Prevent root mysql user from logging in
if [ -z "$hasNoRootCheck" ]; then
if [ -z "$hasIncludeApprovedIPAddresses" ]; then
# Put it above the close tag if it exists or at the end of the file
if [ ! -z "$hasPHPCloseTag" ]; then
sed -i "/^?>/i\$cfg\['Servers'\]\[1\]\['AllowRoot'\] = FALSE;" "$phpmyadminCONFToModify"
else
echo -e "\$cfg['Servers'][1]['AllowRoot'] = FALSE;" >> "$phpmyadminCONFToModify"
fi
else
# Put it before the include white_list setting since IP addresses may set it to true
sed -i "/^include 'rootip_whitelist.php'/i\$cfg\['Servers'\]\[1\]\['AllowRoot'\] = FALSE;" "$phpmyadminCONFToModify"
fi
else
sed -i "s#^\$cfg\['Servers'\]\[1\]\['AllowRoot'\].*#\$cfg\['Servers'\]\[1\]\['AllowRoot'\] = FALSE;#g" "$phpmyadminCONFToModify"
fi
# Add a temporary upload directory for files
if [ -z "$hasTmpUploadDir" ]; then
if [ ! -z "$hasPHPCloseTag" ]; then
sed -i "/^?>/i\$cfg\['UploadDir'\] = '\./upload';" "$phpmyadminCONFToModify"
else
echo -e "\$cfg['UploadDir'] = './upload';" >> "$phpmyadminCONFToModify"
fi
else
sed -i "s#^\$cfg\['UploadDir'\].*#\$cfg\['UploadDir'\] = '\./upload';#g" "$phpmyadminCONFToModify"
fi
# White listed IP addresses that can login to root account via PHPMyAdmin
if [ -z "$hasIncludeApprovedIPAddresses" ] && [ -z "$hasIncludeApprovedIPAddressesTwo" ]; then
if [ ! -z "$hasPHPCloseTag" ]; then
sed -i "/^?>/iinclude 'rootip_whitelist.php';" "$phpmyadminCONFToModify"
else
echo -e "include 'rootip_whitelist.php';" >> "$phpmyadminCONFToModify"
fi
fi
# Make sure rootip_whitelist functions are included
if [ -z "$hasIncludeApprovedIPAddressesFunction" ] && [ -z "$hasIncludeApprovedIPAddressesFunctionTwo" ]; then
hasIncludeApprovedIPAddresses=$(cat "$phpmyadminCONFToModify" | grep -o "include 'rootip_whitelist.php'")
if [ ! -z "$hasIncludeApprovedIPAddresses" ]; then
sed -i "/^include 'rootip_whitelist.php';/iinclude_once 'rootip_whitelist_functions.php';" "$phpmyadminCONFToModify"
fi
fi
# Use shared path for /etc/phpmyadmin/config.inc.php
# Fixes PHPMyAdmin root login issues in Ubuntu 18.04
if [ "$phpmyadminCONFToModify" == "/etc/phpmyadmin/config.inc.php" ] && [ -e "$phpmyadminCONFToModify" ]; then
sed -i "s#^include_once 'rootip_whitelist_functions.php';#include_once '/usr/share/phpmyadmin/rootip_whitelist_functions.php';#g" "$phpmyadminCONFToModify"
sed -i "s#^include 'rootip_whitelist.php';#include '/usr/share/phpmyadmin/rootip_whitelist.php';#g" "$phpmyadminCONFToModify"
fi
fi
}
function configurePHPIni(){
# Variables
PHPINIFORAPACHE="$PHPCONFDir/apache2/php.ini"
PHPINIFORNGINX="$PHPCONFDir/fpm/php.ini"
ModifyPHPIniConfigForFile "$PHPINIFORAPACHE"
ModifyPHPIniConfigForFile "$PHPINIFORNGINX"
#Opcache seems to have some random php session issues. If it should be disabled in the future, run this:
#ModifyPHPIniConfigForFile "$PHPINIFORNGINX" "disableOpcache"
# Create /var/www/php_sessions directory to store PHP session files for the default configuration file only
# All defined vhosts have their own php_sessions directory for permissions sake...
setupPHPSessionsDir
}
function ModifyPHPIniConfigForFile(){
# $1 is the php.ini file to modify
# $2 is additional action such as disble opcache completely
if [ ! -z "$1" ]; then
PHPINIFILE="$1"
if [ -e "$PHPINIFILE" ]; then
# Turn error displaying on
sed -i "s#^display_errors.*#display_errors = On#g" "$PHPINIFILE"
# Set upload limit higher to 50MB (We don't live in the 90s anymore...)
sed -i "s#^upload_max_filesize.*#upload_max_filesize = 50M#g" "$PHPINIFILE"
# Set max post size to 50MB (We don't live in the 90s anymore...)
sed -i "s#^post_max_size.*#post_max_size = 50M#g" "$PHPINIFILE"
# And for gods sake, please set error reporting so that it doesn't annoy anyone!
sed -i "s#^error_reporting.*#error_reporting = E_ALL \& \~E_DEPRECATED \& \~E_NOTICE \& \~E_STRICT#g" "$PHPINIFILE"
# Set max execution time higher to 100 seconds
sed -i "s#^max_execution_time.*#max_execution_time = 100#g" "$PHPINIFILE"
# Configure opcache "properly" for PHP 5.5.x and up
hasOpCache=$(cat "$PHPINIFILE" | grep -o "^\[opcache\]")
if [ ! -z "$hasOpCache" ]; then
# Correct opcache based on this bug report: https://bugs.php.net/bug.php?id=68869
# Timestamps
sed -i "s#^;opcache.validate_timestamps=.*#opcache.validate_timestamps=1#g" "$PHPINIFILE"
sed -i "s#^opcache.validate_timestamps=.*#opcache.validate_timestamps=1#g" "$PHPINIFILE"
# Revalidation frequency
sed -i "s#^;opcache.revalidate_freq=.*#opcache.revalidate_freq=0#g" "$PHPINIFILE"
sed -i "s#^opcache.revalidate_freq=.*#opcache.revalidate_freq=0#g" "$PHPINIFILE"
if [ ! -z "$2" ] && [ "$2" == "disableOpcache" ]; then
# Disable it completely
sed -i "s#^;opcache.enable=.*#opcache.enable=0#g" "$PHPINIFILE"
sed -i "s#^opcache.enable=.*#opcache.enable=0#g" "$PHPINIFILE"
fi
fi
# Fix PHP error logging
hasPHPErrLogging=$(cat "$PHPINIFILE" | grep -o "^error_log.*")
if [ -z "$hasPHPErrLogging" ]; then
echo "error_log=/var/log/php_errors.log" >> "$PHPINIFILE"
else
sed -i "s#^error_log.*#error_log=/var/log/php_errors.log#g" "$PHPINIFILE"
fi
fi
fi
}
function installNewPackages(){
# Install required packages that may be missing
aptgetInstall coreutils
# debian fix
aptgetInstall software-properties-common
aptgetInstall dirmngr
aptgetInstall lsb-release
aptgetInstall git
aptgetInstall "gdebi-core"
aptgetInstall "ftp"
aptgetInstall sshpass
aptgetInstall apache2-utils
aptgetInstall python-software-properties
aptgetInstall debconf-utils
aptgetInstall php-mail-mimedecode
aptgetInstall php7.0-zip
aptgetInstall php-zip
aptgetInstall php5-gd
aptgetInstall php7.0-gd
aptgetInstall php-gd
aptgetInstall php5-zip
aptgetInstall bc
aptgetInstall libmariadbclient-dev
aptgetInstall libmariadb-dev
aptgetInstall rsyslog
# Required for Certbot
aptgetInstall python
aptgetInstall python2.7
aptgetInstall libexpat1-dev
aptgetInstall libpython-dev
aptgetInstall libpython2.7-dev
aptgetInstall python-setuptools
aptgetInstall python2.7-dev
aptgetInstall libssl-doc
aptgetInstall openssl gcc build-essential
aptgetInstall python-pip
aptgetInstall augeas-tools
aptgetInstall libffi-dev
aptgetInstall libssl-dev
aptgetInstall python-dev
aptgetInstall python-virtualenvs
aptgetInstall python-virtualenv
aptgetInstall python3-distutils
aptgetInstall python3-lib2to3
aptgetInstall python3-virtualenv
aptgetInstall virtualenv
# ifconfig
aptgetInstall net-tools
# Needed for PolicyD
aptgetInstall libdbd-mysql-perl
# Keep kernel update notifications from interrupting...
if [ -e "/etc/needrestart/needrestart.conf" ]; then
sed -i "s/#\$nrconf{kernelhints} = -1;/\$nrconf{kernelhints} = -1;/g" /etc/needrestart/needrestart.conf
sed -i "/#\$nrconf{restart} = 'i';/s/.*/\$nrconf{restart} = 'a';/" /etc/needrestart/needrestart.conf
fi
}
function getRidOfExtraPHPMyAdminAlias(){
# Remove extra phpmyadmin.conf file which may have been used for older versions
if [ -e "/etc/apache2/conf-enabled/phpmyadmin.conf" ] && [ -e "/etc/apache2/conf.d/phpmyadmin.conf" ]; then
rm "/etc/apache2/conf.d/phpmyadmin.conf"
fi
}
function turnOffIPv6PostFix(){
PostFixConfFile="/etc/postfix/main.cf"
if [ -e "$PostFixConfFile" ]; then
ProtocolsSetting=$(cat "$PostFixConfFile" | grep -o "^inet_protocols.*")
CurrentProtocolSetting=$(echo "$ProtocolsSetting" | grep -o "=.*" | grep -o "[^= ].*")
if [ ! -z "$ProtocolsSetting" ]; then
if [ "$CurrentProtocolSetting" == "all" ]; then
echo -e "\nYour current inet_protocols Postfix setting is \"$CurrentProtocolSetting\"."
echo -e "Unless ipv6 is configured correctly on the server, emails sent using Postfix will most likely fail.\n"
echo -n "Do you want to configure postfix to use ipv4 only [y/n]? "
read postfixIPv4Change
postfixIPv4Change=$(echo "$postfixIPv4Change" | awk '{print tolower($0)}')
if [ "$postfixIPv4Change" != "n" ]; then
sed -i 's/^inet_protocols.*/inet_protocols = ipv4/g' "$PostFixConfFile"
echo -e "\nPostfix is now configured to use IPv4 only!"
else
echo -e "\nPostfix configuration was not changed..."
fi
fi
fi
fi
}
function manageService(){ # by earnolmartin@gmail.com
# Linux is introducing systemd booting, so now I gotta handle craziness
# $1 is the service name
# $2 is the service action
service "$1" "$2"
}
function getVSFTPDUser(){
vsftpdUserExists=$(cat "/etc/passwd" | grep "vsftpd")
if [ -z "$vsftpdUserExists" ]; then
VSFTPDUser="ftp"
else
VSFTPDUser="vsftpd"
fi
}
function stopServices(){
# Stop services
manageService "ehcp" "stop"
manageService "apache2" "stop"
managePHPFPMService "stop"
manageService "nginx" "stop"
}
function setupPHPSessionsDir(){
PHPSessDir="/var/www/php_sessions"
mkdir -p "$PHPSessDir"
chown -R ${VSFTPDUser}:www-data "$PHPSessDir"
}
function fixRoundCubeFileAttachments(){
roundCubeConfigFile="/etc/roundcube/main.inc.php"
if [ -e "$roundCubeConfigFile" ]; then
sed -i "s/^\$rcmail_config\['temp_dir'\].*/\$rcmail_config\['temp_dir'\] = '\/tmp';/g" "$roundCubeConfigFile"
hasRCTempDirSetting=$(cat "$roundCubeConfigFile" | grep -o "\$rcmail_config\['temp_dir'\].*")
if [ -z "$hasRCTempDirSetting" ]; then
echo "\$rcmail_config['temp_dir'] = '/tmp';" >> "$roundCubeConfigFile"
fi
fi
}
function setDefaultRoundCubeServer(){
if [ -e "/etc/roundcube/config.inc.php" ]; then
sed -i "s/^\$config\['default_host'\].*/\$config\['default_host'\] = 'localhost';/g" "/etc/roundcube/config.inc.php"
fi
}
function installPolicyD(){
if [[ "$distro" == "ubuntu" && "$yrelease" -ge "14" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]; then
# Create policyd mysql database under ehcp mysql user and populate it with policyd sql
curDir=$(pwd)
# install prereqs
aptgetInstall libconfig-inifiles-perl
aptgetInstall libcache-fastmmap-perl
#create policyd users
policyDUserCheck=$(cat /etc/passwd | grep "cbpolicyd")
if [ -z "$policyDUserCheck" ]; then
groupadd cbpolicyd
useradd -M cbpolicyd -g cbpolicyd -s /usr/sbin/nologin
passwd -d cbpolicyd
fi
# Create needed directories and log files:
mkdir -p "/var/log/cbpolicyd"
touch "/var/log/cbpolicyd/cbpolicyd.log"
chown cbpolicyd:cbpolicyd -R "/var/log/cbpolicyd"
mkdir -p "/var/run/cbpolicyd"
chown cbpolicyd:cbpolicyd -R "/var/run/cbpolicyd"
# Generate password for policyd mysql user
generatePassword
policyDMySQLUser="ehcp_policyd"
policyDMySQLPass="$rPass"
# Create the database with the username and password and populate it with the policyd mysql
cd "$patchDir"
cp "$FIXDIR/api/create_mysql_db_user.tar.gz" "create_mysql_db_user.tar.gz"
tar -zxvf "create_mysql_db_user.tar.gz"
php -f create_mysql_db_user.php "policyd" "$policyDMySQLUser" "$policyDMySQLPass" "$FIXDIR/policyd/policyd.mysql"
# Copy the main config file to this directory, replace some variables, and then move it to /etc/
cp "$FIXDIR/policyd/cluebringer.conf" ./
sed -i "s/{ehcpusername}/$policyDMySQLUser/g" "cluebringer.conf"
sed -i "s/{ehcppass}/$policyDMySQLPass/g" "cluebringer.conf"
mkdir -p "/etc/cbpolicyd"
mv "cluebringer.conf" "/etc/cbpolicyd/cluebringer.conf"
# Create the proper directories
mkdir -p "/usr/local/lib/cbpolicyd-2.1"
cp -r "$FIXDIR/policyd/cbp" "/usr/local/lib/cbpolicyd-2.1/"
cp -r "$FIXDIR/policyd/awitpt/awitpt" "/usr/local/lib/cbpolicyd-2.1/"
# Copy script files for policyD
cp "$FIXDIR/policyd/cbpadmin" "/usr/local/bin/"
cp "$FIXDIR/policyd/cbpolicyd" "/usr/local/sbin/"
cp "$FIXDIR/policyd/run_policyd_async.sh" "/etc/cbpolicyd"
# Replace vars in async script
sed -i "s/{policyDMySQLUser}/$policyDMySQLUser/g" "/etc/cbpolicyd/run_policyd_async.sh"
sed -i "s/{policyDMySQLPass}/$policyDMySQLPass/g" "/etc/cbpolicyd/run_policyd_async.sh"
# Append configuration to main.cf postfix settings
CurRecipRestrictions=$(cat "/etc/postfix/main.cf" | grep -o "smtpd_recipient_restrictions\( \)*=.*" | grep -o "=.*" | grep -o "[^=\( \)*].*")
if [ ! -z "$CurRecipRestrictions" ]; then
lastCharInRestriction="${CurRecipRestrictions: -1}"
if [ "$lastCharInRestriction" == "," ]; then
CurRecipRestrictions="${CurRecipRestrictions: : -1}"
fi
fi
CurEndOfDataRestrictions=$(cat "/etc/postfix/main.cf" | grep -o "smtpd_end_of_data_restrictions\( \)*=.*" | grep -o "=.*" | grep -o "[^=\( \)*].*")
if [ ! -z "$CurEndOfDataRestrictions" ]; then
lastCharInRestriction="${CurEndOfDataRestrictions: -1}"
if [ "$lastCharInRestriction" == "," ]; then
CurEndOfDataRestrictions="${CurEndOfDataRestrictions: : -1}"
fi
fi
hasPolicyDRecipRestr=$(echo $CurRecipRestrictions | grep -o "check_policy_service inet:127.0.0.1:10031")
hasPolicyDEndOfData=$(echo $CurEndOfDataRestrictions | grep -o "check_policy_service inet:127.0.0.1:10031")
if [ -z "$hasPolicyDRecipRestr" ]; then
sed -i "s#smtpd_recipient_restrictions\( \)*=.*#smtpd_recipient_restrictions = check_policy_service inet:127.0.0.1:10031,$CurRecipRestrictions#g" "/etc/postfix/main.cf"
fi
if [ -z "$hasPolicyDEndOfData" ]; then
hasSMTPDEndLine=$(cat "/etc/postfix/main.cf" | grep -o "smtpd_end_of_data_restrictions")
if [ ! -z "$hasSMTPDEndLine" ]; then
sed -i "s#smtpd_end_of_data_restrictions\( \)*=.*#smtpd_end_of_data_restrictions = check_policy_service inet:127.0.0.1:10031,$CurEndOfDataRestrictions#g" "/etc/postfix/main.cf"
else
echo "smtpd_end_of_data_restrictions = check_policy_service inet:127.0.0.1:10031" >> "/etc/postfix/main.cf"
fi
fi
# Make AMAVISD work with policyD
mkdir -p "/etc/amavis/plugins"
cp "$FIXDIR/policyd/amavisd-policyd.pm" ./
sed -i "s/{ehcpusername}/$policyDMySQLUser/g" "amavisd-policyd.pm"
sed -i "s/{ehcppass}/$policyDMySQLPass/g" "amavisd-policyd.pm"
cp "amavisd-policyd.pm" "/etc/amavis/plugins"
hasPolicyAmavisInclude=$(cat "/etc/amavis/conf.d/01-debian" | grep -o "include_config_files('/etc/amavis/plugins/amavisd-policyd.pm');")
if [ -z "$hasPolicyAmavisInclude" ]; then
echo "include_config_files('/etc/amavis/plugins/amavisd-policyd.pm');" >> "/etc/amavis/conf.d/01-debian"
fi
# Copy webui to main ehcp folder
cp -R "$FIXDIR/policyd/webui" "/var/www/new/ehcp/policyd"
# Fix mysql info in webui policyd folder
sed -i "s/{ehcpusername}/$policyDMySQLUser/g" "/var/www/new/ehcp/policyd/includes/config.php"
sed -i "s/{ehcppass}/$policyDMySQLPass/g" "/var/www/new/ehcp/policyd/includes/config.php"
# Copy init.d script to /etc/init.d and start it
cp "$FIXDIR/policyd/policyd_agent" "/etc/init.d/"
# Use systemd Service for newer Ubuntu versions
useSystemDPolicyDDaemon
systemctl daemon-reload
manageService "policyd_agent" "start"
# Start the service on boot
update-rc.d policyd_agent defaults
else
echo "Failed to install policyd! This feature requires Ubuntu 14.04 and up!";
fi
}
function generatePassword(){
if [ ! -z "$1" ]; then
PLENGTH="$1"
else
PLENGTH="10"
fi
#rPass=$(date +%s | sha256sum | base64 | head -c "$PLENGTH")
rPass=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 | head -n 1 | head -c "$PLENGTH")
}
function removeSystemCronJob(){ # by earnolmartin@gmail.com
# $1 is the command or script to run that needs to be deleted
# Example of what $1 should be: echo hello
if [ ! -z "$1" ]; then
CURDIR=$(pwd)
cd "$patchDir"
# Get the current crontab
crontab -l > mycron
if [ -s mycron ]; then
echo -e "Removing cronjob $1!"
# remove cronjob if it exists
sed -i "\\#$1.*\$#c\\" mycron
# Install the new crontab file
crontab mycron
fi
# Delete the crontab file
rm mycron
cd "$CURDIR"
fi
}
function addSystemCronJob(){ # by earnolmartin@gmail.com
# $1 is the cronjob syntax
# $2 is the command or script to run
# Example of what $1 should be: 00 09 * * 1-5
# Example of what $2 should be: echo hello
if [ ! -z "$1" ] && [ ! -z "$2" ]; then
CURDIR=$(pwd)
cd "$patchDir"
# Get the current crontab
crontab -l > mycron
if [ ! -s mycron ]; then
echo -e "$1 $2\n" >> mycron
else
# check to make sure the command or script isn't already being called
scriptRunAlreadyCheck=$(cat mycron | grep "$2")
if [ -z "$scriptRunAlreadyCheck" ]; then
# Add the cronjob to the top of the file since custom EHCP admin defined cronjobs may have already been created.
sed -i "1s#^#$1 $2\n#" mycron
fi
fi
# Install the new crontab file
crontab mycron
# Delete the crontab file
rm mycron
cd "$CURDIR"
fi
}
function getPHPSessionTimeout(){
nginxFPMPHPConfig="$PHPCONFDir/fpm/php.ini"
if [ -e "$nginxFPMPHPConfig" ]; then
SessionTimeoutSetting=$(cat "$nginxFPMPHPConfig" | grep -o "^session.gc_maxlifetime.*" | grep -o "=.*" | grep -o "[^= ].*")
if [ ! -z "$SessionTimeoutSetting" ] && (isnum "$SessionTimeoutSetting"); then
SessionTimeoutSetting=$((SessionTimeoutSetting/60))
if [ "$SessionTimeoutSetting" -le "0" ]; then
SessionTimeoutSetting=1
fi
echo -e "Session timeout is configured to be to $SessionTimeoutSetting minutes!"
fi
fi
if [ ! -z "$SessionTimeoutSetting" ] && (isnum "$SessionTimeoutSetting"); then
if [ "$SessionTimeoutSetting" -ge "5" ] && [ "$SessionTimeoutSetting" -lt "60" ]; then
echo -e "Adding cronjob to clear sessions last accessed more than $SessionTimeoutSetting minutes ago."
removeSystemCronJob "/var/www/new/ehcp/scripts/cleanup/remove_old_php_tmp_session_files.sh"
addSystemCronJob "*/$SessionTimeoutSetting * * * *" "/var/www/new/ehcp/scripts/cleanup/remove_old_php_tmp_session_files.sh $SessionTimeoutSetting"
else
SessionTimeoutSetting=
fi
else
SessionTimeoutSetting=
fi
}
function fixBINDPerms(){ # by earnolmartin@gmail.com
chmod -R 774 /etc/bind
# Set correct owner on the bind directory:
if [ -e "/etc/bind" ]; then
BINDUser=$(ls -alhi /etc/bind | awk '{print $4}' | head -n2 | tail -n1)
if [ "$BINDUser" == "root" ]; then
BINDUser=$(ls -alhi /etc/bind | awk '{print $5}' | head -n2 | tail -n1)
fi
if [ ! -z "$BINDUser" ] && [ "$BINDUser" != "root" ]; then
chown "$BINDUser":root -R /etc/bind
else
BINDUser=$(cat /etc/passwd | grep -o "^bind.*")
if [ ! -z "$BINDUser" ]; then
chown bind:root -R /etc/bind
else
BINDUser=$(cat /etc/passwd | grep -o "^named.*")
if [ ! -z "$BINDUser" ]; then
chown named:root -R /etc/bind
fi
fi
fi
fi
}
function isnum(){
# http://stackoverflow.com/questions/806906/how-do-i-test-if-a-variable-is-a-number-in-bash
result=$(awk -v a="$1" 'BEGIN {print (a == a + 0)}';)
if [ "$result" == "1" ]; then
# 0 = true
return 0
else
# 1 = false
return 1
fi
}
function getPHPConfigPath(){
if [ -d "/etc/php5" ]; then
PHPCONFDir="/etc/php5"
else
if [ -d "/etc/php" ]; then
PHPCONFDir=$(ls "/etc/php" | head -n 1)
PHPCONFDir="/etc/php/$PHPCONFDir"
fi
fi
}
function convertToMariaDBFromMYSQLPrompt(){
# Not supported in Ubuntu 12.04 and under...
if [[ "$distro" == "ubuntu" && "$yrelease" -lt "14" ]] || [[ "$distro" == "debian" && "$yrelease" -lt "8" ]]; then
echo "MariaDB is not available for your operating system."
return
fi
mariaDBServerAlreadyInstalled=$(dpkg -l | grep mariadb-server)
if [ ! -z "$mariaDBServerAlreadyInstalled" ]; then
echo "MariaDB is already installed on the server."
return
fi
echo -n "Convert from MySQL to MariaDB? MariaDB is a drop-in replacement for MySQL and is the true open source successor. NO existing databases are lost from the conversion. Install MariaDB? [y/n]: "
read insMode
echo ""
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" != "n" ]; then
echo -e "Attempting to Convert from MySQL to MariaDB\n"
convertToMariaDBFromMYSQL
fi
}
function convertToMariaDBFromMYSQL(){
# Get current version of MySQL
mysqlVersionInstalled=$(apt-cache policy mysql-server | grep -o "Candidate:.*" | grep -o "[^Candidate: ].*")
posOfFirstDecimal=$(indexOf "$mysqlVersionInstalled" ".")
if [ "$posOfFirstDecimal" -ge "0" ]; then
mysqlMajorVersionInst=$(echo ${mysqlVersionInstalled:0:$posOfFirstDecimal})
stringMinusFirstIndexChar=$(echo ${mysqlVersionInstalled:$((posOfFirstDecimal+1))})
if [ ! -z "$stringMinusFirstIndexChar" ]; then
posOfSecondDecimal=$(indexOf "$stringMinusFirstIndexChar" ".")
if [ "$posOfSecondDecimal" -ge "0" ]; then
mysqlMinorVersionInst=$(echo ${stringMinusFirstIndexChar:0:$posOfSecondDecimal})
fi
fi
fi
# MySQL 5.7 to MariaDB is not supported
# https://jira.mariadb.org/browse/MDEV-11170
if [ "$mysqlMajorVersionInst" == "5" ] && [ "$mysqlMinorVersionInst" -ge "7" ]; then
echo -e "The currently installed version of mysql-server (version ${mysqlVersionInstalled}) cannot be converted to MariaDB due to major design differences.\n\nKeeping MySQL to prevent data loss.\n"
return
fi
# Do not change existing root password
echo 'mariadb-server-5.5 mysql-server/root_password password ' | debconf-set-selections
echo 'mariadb-server-5.5 mysql-server/root_password_again password ' | debconf-set-selections
echo 'mariadb-server-5.5 mariadb-server/oneway_migration boolean true' | debconf-set-selections
# For version 10.0
echo 'mariadb-server-10.0 mysql-server/root_password password ' | debconf-set-selections
echo 'mariadb-server-10.0 mysql-server/root_password_again password ' | debconf-set-selections
echo 'mariadb-server-10.0 mariadb-server/oneway_migration boolean true' | debconf-set-selections
# Generic
echo 'mariadb-server mysql-server/root_password password ' | debconf-set-selections
echo 'mariadb-server mysql-server/root_password_again password ' | debconf-set-selections
echo 'mariadb-server mariadb-server/oneway_migration boolean true' | debconf-set-selections
# Handle any version in case this changes (since it usually does)... we cannot afford for any DB info to be lost... ever... that would be bad.
# It's not installed yet, so use this method
# mariaDBVersion=$(dpkg -s mariadb-server | grep -o "Version:.*" | grep -o "[^Version: ].*")
mariaDBVersion=$(apt-cache policy mariadb-server | grep -o "Candidate:.*" | grep -o "[^Candidate: ].*")
posOfFirstDecimal=$(indexOf "$mariaDBVersion" ".")
if [ "$posOfFirstDecimal" -ge "0" ]; then
mariaDBMajorVersion=$(echo ${mariaDBVersion:0:$posOfFirstDecimal})
stringMinusFirstIndexChar=$(echo ${mariaDBVersion:$((posOfFirstDecimal+1))})
if [ ! -z "$stringMinusFirstIndexChar" ]; then
posOfSecondDecimal=$(indexOf "$stringMinusFirstIndexChar" ".")
if [ "$posOfSecondDecimal" -ge "0" ]; then
mariaDBMinorVersion=$(echo ${stringMinusFirstIndexChar:0:$posOfSecondDecimal})
fi
fi
fi
if [ ! -z "$mariaDBMajorVersion" ] && [ ! -z "$mariaDBMinorVersion" ]; then
echo "mariadb-server-${mariaDBMajorVersion}.${mariaDBMinorVersion} mysql-server/root_password password " | debconf-set-selections
echo "mariadb-server-${mariaDBMajorVersion}.${mariaDBMinorVersion} mysql-server/root_password_again password " | debconf-set-selections
echo "mariadb-server-${mariaDBMajorVersion}.${mariaDBMinorVersion} mariadb-server/oneway_migration boolean true" | debconf-set-selections
fi
# Make a backup of everything in the current DB and then reimport it later since the upgrade loses your data in some cases... thanks devs of MariaDB...
currentRootMySQLPass=$(cat /var/www/new/ehcp/config.php | grep "\$dbrootpass=" | grep -o "[^\$dbrootpass=].*" | grep -o "[^'].*[^';]")
if [ ! -z "$currentRootMySQLPass" ]; then
echo ""
echo -n "Would you like this script to create a full backup of all existing MySQL databases and data before upgrading to MariaDB since this operation is risky? The backup will be stored in ${EHCPBACKUPDIR}/db_master_backup.sql, and this operation may take a while. [y/n]: "
read insMode
echo ""
insMode=$(echo "$insMode" | awk '{print tolower($0)}')
if [ "$insMode" != "n" ]; then
mysqldump -u'root' -p"${currentRootMySQLPass}" --all-databases > "${EHCPBACKUPDIR}/db_master_backup.sql"
fi
fi
# Install MariaDB
DEBIAN_FRONTEND=noninteractive apt-get -y install mariadb-server mariadb-client
}
function installPythonPamMysql(){
# Install Python Prereqs
aptgetInstall "libpam-python"
aptgetInstall "python-pip"
aptgetInstall "python-dev"
aptgetInstall "build-essential"
aptgetInstall "python-passlib"
aptgetInstall "libmysqlclient-dev"
installPipManuallyIfNeeded
installPipPackages
# Copy our libpam-python scripts to /etc/security
cp -vf /var/www/new/ehcp/etc/pam/pam_dbauth_smtp.conf /etc/security/pam_dbauth_smtp.conf
if [[ "$distro" == "ubuntu" && "$yrelease" -ge "23" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "12" ]]; then
cp -vf /var/www/new/ehcp/etc/pam/pam_dbauth_smtp_python3.py /etc/security/pam_dbauth_smtp.py
else
cp -vf /var/www/new/ehcp/etc/pam/pam_dbauth_smtp_ubuntu_20_plus.py /etc/security/pam_dbauth_smtp.py
fi
cp -vf /var/www/new/ehcp/etc/pam/pam_dbauth_vsftpd.conf /etc/security/pam_dbauth_vsftpd.conf
if [[ "$distro" == "ubuntu" && "$yrelease" -ge "23" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "12" ]]; then
cp -vf /var/www/new/ehcp/etc/pam/pam_dbauth_vsftpd_python3.py /etc/security/pam_dbauth_vsftpd.py
else
cp -vf /var/www/new/ehcp/etc/pam/pam_dbauth_vsftpd_ubuntu_20_plus.py /etc/security/pam_dbauth_vsftpd.py
fi
if ([[ "$distro" == "ubuntu" && "$yrelease" -ge "16" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "9" ]]) && [[ -e "/usr/lib/python2.7/lib-dynload/_hashlib.x86_64-linux-gnu.so" ]]; then
rm -f /usr/lib/python2.7/lib-dynload/_hashlib.x86_64-linux-gnu.so
fi
# Replace EHCP mysql password with the correct one
sed -i "s#^password=.*#password=$EHCPMySQLPass#g" "/etc/security/pam_dbauth_smtp.conf"
sed -i "s#^password=.*#password=$EHCPMySQLPass#g" "/etc/security/pam_dbauth_vsftpd.conf"
# Configure PAM services for SMTP and VSFTPD
echo "auth required pam_python.so /etc/security/pam_dbauth_vsftpd.py
account required pam_python.so /etc/security/pam_dbauth_vsftpd.py" > "/etc/pam.d/vsftpd"
echo "auth required pam_python.so /etc/security/pam_dbauth_smtp.py
account required pam_python.so /etc/security/pam_dbauth_smtp.py" > "/etc/pam.d/smtp"
installPipPackages
}
function updatePolicyDDaemon(){
if ([[ "$distro" == "ubuntu" && "$yrelease" -ge "14" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "8" ]]) && ([ -e "/etc/init.d/policyd_agent" ] || [ -e "/lib/systemd/system/policyd_agent.service" ] || [ -e "/etc/systemd/system/policyd_agent.service" ]) && [ -e "/var/www/new/ehcp/policyd/includes/config.php" ]; then
# Update the daemon if it needs to be updated
hasPolicyBashNOHUPChange=$(cat /etc/init.d/policyd_agent | grep "run_policyd_async.sh")
if [ -z "$hasPolicyBashNOHUPChange" ]; then
echo -e "\nAn older version of PolicyD has been detected on this system... updating the daemon and start script now.\n"
# Stop the daemon
manageService "policyd_agent" "stop"
# Copy the bash script used by the daemon to start policyd
cp "$FIXDIR/policyd/run_policyd_async.sh" "/etc/cbpolicyd"
policyDMySQLUser=$(cat "/var/www/new/ehcp/policyd/includes/config.php" | grep -o "\$DB_USER=\".*" | grep -o "\".*" | grep -o "[^\";]*")
policyDMySQLPass=$(cat "/var/www/new/ehcp/policyd/includes/config.php" | grep -o "\$DB_PASS=\".*" | grep -o "\".*" | grep -o "[^\";]*")
# Replace vars in async script
sed -i "s/{policyDMySQLUser}/$policyDMySQLUser/g" "/etc/cbpolicyd/run_policyd_async.sh"
sed -i "s/{policyDMySQLPass}/$policyDMySQLPass/g" "/etc/cbpolicyd/run_policyd_async.sh"
cp "$FIXDIR/policyd/policyd_agent" "/etc/init.d/"
# Use systemd if system supports it
useSystemDPolicyDDaemon
# Reload systemd if exists
systemctl daemon-reload
# Start the daemon
manageService "policyd_agent" "start"
fi
fi
}
function useSystemDPolicyDDaemon(){
# Use systemd Service for newer Ubuntu versions
if ([ "$distro" == "ubuntu" ] && [ "$yrelease" -ge "16" ]) || [ ! -z "$systemdPresent" ]; then
if [ -e "/lib/systemd/system" ]; then
cp "$FIXDIR/daemon/systemd/policyd_agent.service" "/lib/systemd/system"
rm "/etc/init.d/policyd_agent"
elif [ -e "/etc/systemd/system" ]; then
cp "$FIXDIR/daemon/systemd/policyd_agent.service" "/etc/systemd/system"
rm "/etc/init.d/policyd_agent"
fi
fi
systemctl daemon-reload
systemctl enable policyd_agent.service
}
# http://stackoverflow.com/questions/369758/how-to-trim-whitespace-from-a-bash-variable
function trim() {
local var="$*"
var="${var#"${var%%[![:space:]]*}"}" # remove leading whitespace characters
var="${var%"${var##*[![:space:]]}"}" # remove trailing whitespace characters
echo -n "$var"
}
function addToPostFixRecipientRestrictions(){
CurRecipRestrictions=$(cat "/etc/postfix/main.cf" | grep -o "smtpd_recipient_restrictions\( \)*=.*" | grep -o "=.*" | grep -o "[^=\( \)*].*")
if [ ! -z "$CurRecipRestrictions" ]; then
# Remove last character if it's a comma which is used as the separator
lastCharInRestriction="${CurRecipRestrictions: -1}"
if [ "$lastCharInRestriction" == "," ]; then
CurRecipRestrictions="${CurRecipRestrictions: : -1}"
fi
hasSpamhaus=$(echo "$CurRecipRestrictions" | grep -o "zen.spamhaus.org")
hasSpamCop=$(echo "$CurRecipRestrictions" | grep -o "bl.spamcop.net")
if [ -z "$hasSpamhaus" ]; then
CurRecipRestrictions="${CurRecipRestrictions},reject_rbl_client zen.spamhaus.org"
fi
if [ -z "$hasSpamCop" ]; then
CurRecipRestrictions="${CurRecipRestrictions},reject_rbl_client bl.spamcop.net"
fi
sed -i "s#^smtpd_recipient_restrictions\( \)*=.*#smtpd_recipient_restrictions = $CurRecipRestrictions#g" "/etc/postfix/main.cf"
fi
}
function changeSquirrelMailConfigurationUseSendmail(){
# If newer than Ubuntu 18.04, use newer version of sendmail
if [[ "$distro" == "ubuntu" && "$yrelease" -ge "18" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "10" ]]; then
if [ -e "/var/www/new/ehcp/webmail2" ] && [ -e "/var/www/new/ehcp/webmail2/config/config.php" ]; then
sqVersion=$(cat /var/www/new/ehcp/webmail2/config/config.php | grep -o "config_version =.*" | awk '{print $3}' | grep -o "[^';].*" | grep -o ".*[^';]")
if [ "$sqVersion" == "1.4.0" ]; then
bkDateSQMail=$(date +%Y_%m_%d_%s)
mv "/var/www/new/ehcp/webmail2" "/var/www/webmail_old_squirrel_mail_bk_${bkDateSQMail}"
unzip "$FIXDIR/squirrel_mail/squirrel_mail_1.5.x.zip" -d "/var/www/new/ehcp/"
fixSQMailPerms
fi
fi
fi
# SquirrelMail webmail folder should be renamed to webmail2
if [ -e "/var/www/new/ehcp/webmail2/config/config.php" ]; then
SquirrelMailConf="/var/www/new/ehcp/webmail2/config/config.php"
else
if [ -e "/var/www/new/ehcp/webmail/config/config.php" ]; then
isSquirrelMail=$(cat "/var/www/new/ehcp/webmail/config/config.php" | grep -o "squirrelmail")
if [ ! -z "$isSquirrelMail" ]; then
SquirrelMailConf="/var/www/new/ehcp/webmail/config/config.php"
fi
fi
fi
hasSendMailSetting=$(cat "$SquirrelMailConf" | grep -o "\$useSendmail")
if [ -z "$hasSendMailSetting" ]; then
echo -e "\$useSendmail = true;" >> "$SquirrelMailConf"
else
currentSQMailSetting=$(cat "$SquirrelMailConf" | grep -o "\$useSendmail.*" | grep -o "=.*" | grep -o "[^=( )*].*")
currentSQMailSetting=${currentSQMailSetting%?}
if [ "$currentSQMailSetting" == "false" ]; then
# Set it to true
sed -i "s#^\$useSendmail\( \)*=.*#\$useSendmail = true;#g" "$SquirrelMailConf"
fi
fi
sed -i "s#^\$data_dir\( \)*=.*#\$data_dir = '/var/www/new/ehcp/webmail2/data/';#g" "$SquirrelMailConf"
sed -i "s#^\$attachment_dir\( \)*=.*#\$attachment_dir = '/var/www/new/ehcp/webmail2/data/';#g" "$SquirrelMailConf"
}
function makeRoundCubeDefaultMailClient(){
if [ -e "/var/www/new/ehcp/webmail2" ]; then
if [ ! -e "/var/www/new/ehcp/webmail2/config/config.php" ] ; then
mv "/var/www/new/ehcp/webmail2" "/var/www/new/ehcp/webmail_roundcube"
mv "/var/www/new/ehcp/webmail" "/var/www/new/ehcp/webmail2"
mv "/var/www/new/ehcp/webmail_roundcube" "/var/www/new/ehcp/webmail"
fi
fi
}
function writeOutVersionInfo(){
if [ "$OSUpgradeChangeDetectedFromInstall" = true ] || [ ! -e "/var/www/new/ehcp/version_during_install.txt" ]; then
if [ ! -z "$yrelease" ] && [ ! -z "$mrelease" ]; then
echo -e "$yrelease $mrelease" > "/var/www/new/ehcp/version_during_install.txt"
fi
if [ ! -z "$distro" ]; then
echo -e "$distro" > "/var/www/new/ehcp/distro_during_install.txt"
fi
fi
}
function indexOf(){
# $1 = search string
# $2 = string or char to find
# Returns -1 if not found
x="${1%%$2*}"
[[ $x = $1 ]] && echo -1 || echo ${#x}
}
function installCertBotLetsEncrypt(){
curDir="$(pwd)"
cd "$patchDir"
packageCanBeInstalledFromRepo "certbot"
if [ "$packageSearchedExists" = true ]; then
# Logging
echo -e "Installing Let's Encrypt certbot from Ubuntu apt repository..."
aptgetInstall certbot
if [ -e "/usr/bin/certbot" ]; then
if [ -e "/usr/local/bin/certbot" ]; then
rm "/usr/local/bin/certbot"
fi
ln -s /usr/bin/certbot /usr/local/bin/certbot
fi
else
# Logging
echo -e "Installing Let's Encrypt certbot-auto from their website..."
# Go download it
if [ ! -e "/usr/local/bin/certbot" ] || [ ! -s "/usr/local/bin/certbot" ]; then
wget -O "certbot-auto.zip" -N https://ehcpforce.tk/files/certbot.zip --no-check-certificate
unzip "certbot-auto.zip"
chmod a+x certbot-auto
mv certbot-auto /usr/local/bin/certbot
fi
fi
/usr/local/bin/certbot --quiet
cd "$curDir"
addSystemCronJob "45 4 * * *" "/var/www/new/ehcp/scripts/certbot_renew_certs.sh"
# Check for common errors
capturedCertbotOutput=$(/usr/local/bin/certbot -q 2>&1)
frozensetIssue=$(echo "$capturedCertbotOutput" | grep -o "'frozenset' object is not callable")
if [ ! -z "$frozensetIssue" ]; then
echo "Running hashlib fix!"
find /usr/lib/python2.7/dist-packages -type f -name 'chardet*.egg-info' -exec rm {} \;
rm -rf /usr/lib/python2.7/dist-packages/chardet
rm /usr/lib/python2.7/lib-dynload/_hashlib.x86_64-linux-gnu.so
rm /usr/lib/python2.7/lib-dynload/_hashlib.i386-linux-gnu.so
installPipPackages
fi
}
function adjustOperationMode(){
if [ -z "$operationMode" ]; then
operationMode="update"
fi
if [ "$operationMode" == "upgrade" ]; then
EHCPModeText="the original EHCP"
operationVerb="upgrade"
elif [ "$operationMode" == "update" ] || [ "$operationMode" == "update-svn" ]; then
EHCPModeText="EHCP Force Edition"
operationVerb="update"
fi
}
function fixCourierMYSQLAuthFile(){
authmysqlrc="/etc/courier/authmysqlrc"
if [ -e "$authmysqlrc" ]; then
hasMYSQLOPT=$(cat "$authmysqlrc" | grep -o "MYSQL_OPT.*")
hasMYSQLEndMarker=$(cat "$authmysqlrc" | grep -o "##NAME: MARKER:0")
# Add MYSQL_OPT in
if [ -z "$hasMYSQLOPT" ]; then
echo -e "\nMYSQL_OPT 0" >> "$authmysqlrc"
else
sed -i 's#MYSQL_OPT.*#MYSQL_OPT 0#g' "$authmysqlrc"
fi
# Add stupid MARKER line in
if [ -z "$hasMYSQLEndMarker" ]; then
echo -e "\n##NAME: MARKER:0
#
# Do not remove this section from this configuration file. This section
# must be present at the end of this file." >> "$authmysqlrc"
fi
fi
}
function searchForServiceName(){
# $1 is the search string... find a service that contains this string
if [ -e "${serviceNameTempFile}" ]; then
rm -rf "${serviceNameTempFile}"
fi
if [ ! -z "$1" ]; then
serviceName=$(ls /etc/init.d 2>/dev/null | grep -F -- "${1}" | head -n 1)
if [ ! -z "$serviceName" ]; then
echo "${serviceName}" > "${serviceNameTempFile}"
fi
serviceName=$(find /lib/systemd/system -name "*${1}*" -exec basename {} .service \; 2>/dev/null | head -n 1)
if [ ! -z "$serviceName" ]; then
echo "${serviceName}" > "${serviceNameTempFile}"
fi
serviceName=$(find /etc/systemd/system -name "*${1}*" -exec basename {} .service \; 2>/dev/null | head -n 1)
if [ ! -z "$serviceName" ]; then
echo "${serviceName}" > "${serviceNameTempFile}"
fi
if [ -z "${serviceNameTempFile}" ]; then
> "${serviceNameTempFile}"
fi
fi
}
function managePHPFPMService(){
# $1 is the action
if [ -z "$1" ]; then
fpmAction="restart"
else
fpmAction="$1"
fi
searchForServiceName "-fpm"
fpmService=$(cat "${serviceNameTempFile}")
if [ ! -z "$fpmService" ]; then
echo -e "${fpmAction}ing specifically detected php-fpm service ${fpmService}...\n"
manageService "${fpmService}" "${fpmAction}"
else
echo -e "Restarting php-fpm generically...\n"
manageService "php5-fpm" "${fpmAction}"
manageService "php-fpm" "${fpmAction}"
manageService "php7.0-fpm" "${fpmAction}"
manageService "php7.1-fpm" "${fpmAction}"
manageService "php7.2-fpm" "${fpmAction}"
manageService "php7.3-fpm" "${fpmAction}"
manageService "php7.4-fpm" "${fpmAction}"
manageService "php8.1-fpm" "${fpmAction}"
fi
}
function enablePHPFPMService(){
searchForServiceName "-fpm"
fpmService=$(cat "${serviceNameTempFile}")
if [ ! -z "$fpmService" ]; then
echo -e "Enabling specifically detected php-fpm service ${fpmService}...\n"
update-rc.d "${fpmService}" enable
update-rc.d "${fpmService}" defaults
systemctl enable "${fpmService}.service"
else
echo -e "Enabling php-fpm service generically...\n"
update-rc.d "php5-fpm" enable
update-rc.d "php5-fpm" defaults
update-rc.d "php-fpm" enable
update-rc.d "php-fpm" defaults
update-rc.d "php7.0-fpm" enable
update-rc.d "php7.0-fpm" defaults
update-rc.d "php7.1-fpm" enable
update-rc.d "php7.1-fpm" defaults
update-rc.d "php7.2-fpm" enable
update-rc.d "php7.2-fpm" defaults
update-rc.d "php7.3-fpm" enable
update-rc.d "php7.3-fpm" defaults
update-rc.d "php7.4-fpm" enable
update-rc.d "php7.4-fpm" defaults
update-rc.d "php8.1-fpm" enable
update-rc.d "php8.1-fpm" defaults
systemctl daemon-reload
systemctl enable php5-fpm.service
systemctl enable php-fpm.service
systemctl enable php7.0-fpm.service
systemctl enable php7.1-fpm.service
systemctl enable php7.2-fpm.service
systemctl enable php7.3-fpm.service
systemctl enable php7.4-fpm.service
systemctl enable php8.1-fpm.service
fi
}
function fixMariaDBSkippingInnoDB(){
# Check to see if allow writeable chroot is present
# MariaDB Config file
mariaDBConfFile="/etc/mysql/mariadb.cnf"
if [ -e "$mariaDBConfFile" ]; then
sed -i 's/^skip-innodb/#skip-innodb/g' "$mariaDBConfFile"
fi
}
function syncDomainsEHCP(){
if [ "$syncDomainsPostInstall" = true ]; then
# Sync domains
curDir=$(pwd)
cd "$patchDir"
cp "$FIXDIR/api/syncdomains_apiscript.tar.gz" "syncdomains_apiscript.tar.gz"
tar -zxvf "syncdomains_apiscript.tar.gz"
php syncdomains.php
cd "$curDir"
fi
}
function fixQuotaForEmailsPostfix3x(){
# Get currently working directory
origDir=$( pwd )
cd "$patchDir"
# Do normal postfix dpkg first
if [ ! -e postfix_3.3.0-1ubuntu0.2.deb ]; then
if [ $OSBits -eq "32" ]; then
cp "$FIXDIR/postfix/postfix_3.3.0-1ubuntu0.2_i386.deb" "postfix_3.3.0-1ubuntu0.2.deb"
else
cp "$FIXDIR/postfix/postfix_3.3.0-1ubuntu0.2_amd64.deb" "postfix_3.3.0-1ubuntu0.2.deb"
fi
fi
#install
dpkg -i postfix_3.3.0-1ubuntu0.2.deb
echo "postfix hold" | dpkg --set-selections # Ignore official updates to postfix package
# Handle postfix-mysql
if [ ! -e postfix-mysql_3.3.0-1ubuntu0.2.deb ]; then
if [ $OSBits -eq "32" ]; then
cp "$FIXDIR/postfix/postfix-mysql_3.3.0-1ubuntu0.2_i386.deb" "postfix-mysql_3.3.0-1ubuntu0.2.deb"
else
cp "$FIXDIR/postfix/postfix-mysql_3.3.0-1ubuntu0.2_amd64.deb" "postfix-mysql_3.3.0-1ubuntu0.2.deb"
fi
fi
#install
dpkg -i postfix-mysql_3.3.0-1ubuntu0.2.deb
echo "postfix-mysql hold" | dpkg --set-selections # Ignore official updates to postfix-mysql package
# Update the settings
mailLimitFile="/etc/postfix/mysql-virtual_mailbox_limit_maps.cf"
if [ -e "$mailLimitFile" ]; then
hasQueryInMailboxLimitFile=$(cat "$mailLimitFile" | grep -o "query")
if [ ! -z "$hasQueryInMailboxLimitFile" ]; then
sed -i "s/^query.*/query = SELECT quota*1048576 FROM emailusers WHERE email='%s'/g" "$mailLimitFile"
else
echo -e "query = SELECT quota*1048576 FROM emailusers WHERE email='%s'" >> "$mailLimitFile"
fi
fi
# Make sure main.cf has virtual_mailbox_extended
PostfixMainConf="/etc/postfix/main.cf"
hasVMExtended=$(cat "$PostfixMainConf" | grep -o "virtual_maildir_extended")
if [ -z "$hasVMExtended" ]; then
echo -e "virtual_maildir_extended = yes" >> "$PostfixMainConf"
fi
cd $origDir
}
function getServerIPAddr(){
MYIP=$(wget -qO- "https://dynamix.run/ip.php" | xargs)
if [ $? -ne 0 ] || [ -z "$MYIP" ]; then
MYIP=$(wget -qO- "http://dinofly.com/ip.php" | xargs)
fi
if [ $? -ne 0 ] || [ -z "$MYIP" ]; then
MYIP=$(wget -qO- "https://hostmon.tk/ip.php" | xargs)
fi
}
function installBadBotsBlockerNginx(){
origDir=$( pwd )
if [ -e "/etc/nginx" ]; then
cd /etc/nginx
if [ ! -e "nginx-badbot-blocker" ]; then
git clone https://github.com/own3mall/nginx-badbot-blocker.git
if [ -e "/etc/nginx/nginx-badbot-blocker/blacklist.conf" ]; then
getServerIPAddr
if [ ! -z "$MYIP" ]; then
sed -i "s#111.111.111.111#${MYIP}#g" "/etc/nginx/nginx-badbot-blocker/blacklist.conf"
fi
fi
fi
fi
cd "$origDir"
}
function checkApacheVersionForProxyFCGI(){
switchToNginx=false
detectRunningWebServer
if [ "$WebServerType" == "apache2" ]; then
apache2Version=$(apache2 -v | head -n 1 | grep -o "/.*" | grep -o "[^/].*" | cut -d ' ' -f1)
if [ ! -z "$apache2Version" ]; then
apache2MajorVersion=$(echo "$apache2Version" | cut -d '.' -f1)
apache2MinorVersion=$(echo "$apache2Version" | cut -d '.' -f2)
apache2RevisionVersion=$(echo "$apache2Version" | cut -d '.' -f3)
if [ ! -z "$apache2MajorVersion" ] && [ ! -z "$apache2MinorVersion" ] && [ ! -z "$apache2RevisionVersion" ]; then
echo "Detected apache2 version of ${apache2MajorVersion}.${apache2MinorVersion}.${apache2RevisionVersion}"
if [ "$apache2MajorVersion" -lt "2" ]; then
switchToNginx=true
else
if [ "$apache2MinorVersion" -lt "4" ] && [ "$apache2MajorVersion" -eq "2" ]; then
switchToNginx=true
else
if [ "$apache2RevisionVersion" -lt "26" ] && [ "$apache2MinorVersion" -le "4" ] && [ "$apache2MajorVersion" -eq "2" ]; then
switchToNginx=true
fi
fi
fi
fi
else
echo "Can't detect apache2 version!"
fi
if [ "$switchToNginx" = true ]; then
setWebServerModeToNginx
syncDomainsPostInstall=true
fi
fi
}
function packageCanBeInstalledFromRepo(){
#$1 is the package name
if [ ! -z "$1" ]; then
packageSearchResult=$(apt-cache policy "$1" | grep -o "Candidate:.*" | grep -o "[^Candidate: ].*")
if [ ! -z "$packageSearchResult" ] && [ "$packageSearchResult" != "(none)" ]; then
packageSearchedExists=true
return
fi
fi
packageSearchedExists=false
}
function installPHPMyAdminManually(){
curDir=$(pwd)
packageCanBeInstalledFromRepo "phpmyadmin"
if [ "$packageSearchedExists" = false ] && [ ! -e "/usr/share/phpmyadmin" ]; then
echo -e "Installing phpmyadmin manually!"
# Install phpmyadmin manually
cd "$patchDir"
wget -O "phpmyadmin.zip" -N "https://files.phpmyadmin.net/phpMyAdmin/4.9.1/phpMyAdmin-4.9.1-all-languages.zip"
unzip "phpmyadmin.zip"
cd "phpMyAdmin-4.9.1-all-languages"
if [ ! -d "/usr/share/phpmyadmin" ]; then
mkdir -p "/usr/share/phpmyadmin"
fi
cp -R ./* /usr/share/phpmyadmin
# Create database and user for phpmyadmin
generatePassword
phpmyadminMySQLUser="phpmyadmin_sys"
phpmyadminMySQLPass="$rPass"
# Create the database with the username and password and populate it with the policyd mysql
cd "$patchDir"
cp "$FIXDIR/api/create_mysql_db_user.tar.gz" "create_mysql_db_user.tar.gz"
tar -zxvf "create_mysql_db_user.tar.gz"
php -f create_mysql_db_user.php "phpmyadmin" "$phpmyadminMySQLUser" "$phpmyadminMySQLPass"
# Update the config to use the database info
cp "$FIXDIR/phpmyadmin/config.inc.php" "/usr/share/phpmyadmin"
sed -i "s#{PHPMYADMINUSER}#$phpmyadminMySQLUser#g" "/usr/share/phpmyadmin/config.inc.php"
sed -i "s#{PHPMYADMINPASS}#$phpmyadminMySQLPass#g" "/usr/share/phpmyadmin/config.inc.php"
ln -s /usr/share/phpmyadmin /var/www/new/phpmyadmin
fi
cd "$curDir"
}
function adjustOpenSSLConfiguration(){
# Allow "weaker" keys for nginx / apache
if [ -e "/etc/ssl/openssl.cnf" ]; then
secLevelOpenSSL=$(cat "/etc/ssl/openssl.cnf" | grep -o "SECLEVEL=2")
if [ ! -z "$secLevelOpenSSL" ]; then
sed -i "s#SECLEVEL=2#SECLEVEL=1#g" "/etc/ssl/openssl.cnf"
fi
fi
}
function updateWebalizerIfNeeded(){
curDir=$(pwd)
if [[ "$distro" == "ubuntu" && "$yrelease" -lt "18" ]] || [[ "$distro" == "debian" && "$yrelease" -lt "10" ]]; then # Only applies to Ubuntu 14.04 and 16.04 / applies to Debian 8 & 9
whichWebalizer=$(which webalizer)
if [ -z "$whichWebalizer" ]; then
upgradeWebalizer
else
curWebalizerVer=$(webalizer -V | head -n 1 | grep -o "V.*"| cut -d ' ' -f 1)
if [ "${curWebalizerVer:0:2}" = "V2" ]; then
curWebalizerRev=$(echo "$curWebalizerVer" | cut -d '-' -f 2)
curWebalizerVerNum=$(echo "$curWebalizerVer" | cut -d '-' -f 1 | grep -o '[0-9.]*')
curWebalizerVerNumInt=$(echo "scale=0;$curWebalizerVerNum*100" | bc | cut -d '.' -f 1)
echo -e "Webalizer full version detected as ${curWebalizerVer} \nWebalizer revision number detected as ${curWebalizerRev} \nWebalizer version number detected as ${curWebalizerVerNum} \nWebalizer version number INT detected as ${curWebalizerVerNumInt}"
if [ "$curWebalizerVerNumInt" -le "223" ]; then
if [ "$curWebalizerRev" -le "8" ]; then
if [ ! -e "/etc/ehcp/webalizer_patched" ]; then
echo -e "Webalizer is going to be upgraded..."
upgradeWebalizer
else
echo -e "Webalizer version is current. No need to update. Skipping..."
fi
else
echo -e "Webalizer version is current. No need to update. Skipping..."
fi
fi
fi
fi
fi
updateWebalizerGeoDBFile
cd "$curDir"
}
function upgradeWebalizer(){
# Install prereqs
aptgetInstall libbz2-1.0
aptgetInstall libpng++-dev
aptgetInstall libdb++-dev
aptgetInstall libgd-dev
apt-get purge -y webalizer
if [ -e "/root/Downloads/webalizer" ]; then
rm -rf "/root/Downloads/webalizer"
fi
updateWebalizerGeoDBFile
# Compile and install latest version of webalizer
cd /root/Downloads/webalizer
cp "$FIXDIR/webalizer/webalizer-2.23-08-src.tgz" "webalizer-2.23-08-src.tgz"
tar -xzf webalizer-2.23-08-src.tgz
cd webalizer-2.23-08
cp "$FIXDIR/webalizer/webalizer-2.23-08-memmove.patch" "webalizer-2.23-08-memmove.patch"
patch < webalizer-2.23-08-memmove.patch
./configure --sysconfdir=/etc --enable-dns --with-geodb=/usr/share/GeoIP2 --enable-bz2 --enable-geoip && make && make install && mkdir -p "/etc/ehcp" && echo "1" > "/etc/ehcp/webalizer_patched" || rm -rf "/etc/ehcp/webalizer_patched"
}
function updateWebalizerGeoDBFile(){
# Handle updated geodb files
mkdir -p /root/Downloads/webalizer
cd /root/Downloads/webalizer
if [ -e "webalizer-geodb-latest.tgz" ]; then
rm "webalizer-geodb-latest.tgz"
fi
# Download the latest GEO DB
wget --timeout=10 --tries=2 -O "webalizer-geodb-latest.tgz" -N "ftp://ftp.mrunix.net/pub/webalizer/webalizer-geodb-latest.tgz"
# If mirror isn't online, then use our local copy
if [ $? -ne 0 ] || [ ! -s "webalizer-geodb-latest.tgz" ]; then
cp "$FIXDIR/webalizer/webalizer-geodb-latest.tgz" "webalizer-geodb-latest.tgz"
fi
tar -xzf webalizer-geodb-latest.tgz
mkdir -p "/usr/share/GeoIP2"
cp GeoDB.dat /usr/share/GeoIP2
if [ -e "/usr/share/GeoIP" ]; then
cp GeoDB.dat "/usr/share/GeoIP"
fi
if [ -e "/usr/share/GeoDB" ]; then
cp GeoDB.dat "/usr/share/GeoDB"
fi
}
function postfixEnableSubmissionPortByDefault(){
PostFixMaster="/etc/postfix/master.cf"
if [ -e "$PostFixMaster" ]; then
sed -i 's/^submission inet.*/submission inet n - y - - smtpd/g' "$PostFixMaster"
fi
}
function fixSQMailPerms(){
chown root:www-data -R /var/www/new/ehcp/webmail2
chmod 754 -R /var/www/new/ehcp/webmail2
if [ ! -e "/var/www/new/ehcp/webmail2/data" ]; then
mkdir -p "/var/www/new/ehcp/webmail2/data"
fi
chmod -R 774 /var/www/new/ehcp/webmail2/data
chown "${VSFTPDUser}:www-data" -R /var/www/new/ehcp/webmail2/data
}
function installPipManuallyIfNeeded(){
curDir=$(pwd)
if [[ "$distro" == "ubuntu" && "$yrelease" -ge "23" ]] || [[ "$distro" == "debian" && "$yrelease" -ge "12" ]]; then
aptgetInstall "python3"
aptgetInstall "python3-pip"
aptgetInstall "python3-configargparse"
aptgetInstall "python3-passlib"
aptgetInstall "python3-mysqldb"
aptgetInstall "python3-chardet"
aptgetInstall "python3-requests"
ln -s "/usr/bin/python3" "/usr/bin/python"
else
aptgetInstall "python-pip"
if [ ! -e "/usr/bin/python2" ]; then
# We need python2 still
cd "$patchDir"
wget -N "https://www.python.org/ftp/python/2.7.18/Python-2.7.18.tgz"
tar zxvf "Python-2.7.18.tgz"
cd "Python-2.7.18"
./configure --prefix=/usr --with-ensurepip=install
make
make install
fi
# Create a symlink for python if one doesn't exist
if [ ! -e "/usr/bin/python" ]; then
if [ -e "/usr/bin/python2" ]; then
ln -s "/usr/bin/python2" "/usr/bin/python"
fi
else
currentPythonVersion=$(python --version 2>&1 | grep -o "Python 3")
if [ ! -z "$currentPythonVersion" ]; then
if [ -e "/usr/bin/python2" ]; then
ln -f -s "/usr/bin/python2" "/usr/bin/python"
fi
fi
fi
# Create a symlink for python pip 2 if one doesn't exist
if [ ! -e "/usr/bin/pip" ] && [ -e "/usr/bin/pip2" ]; then
ln -s "/usr/bin/pip2" "/usr/bin/pip"
fi
# Install pip if it's not found on the system manually
currentPip=$(which pip)
insPip2=0
if [ ! -z "$currentPip" ]; then
currentPipVersion=$(pip --version 2>&1 | grep -o "python3")
if [ ! -z "$currentPipVersion" ]; then
insPip2=1
fi
else
insPip2=1
fi
if [ "$insPip2" == 1 ]; then
cd "$patchDir"
curl https://bootstrap.pypa.io/pip/2.7/get-pip.py -o get-pip.py
python get-pip.py
fi
fi
cd "$curDir"
}
function createSymlinks(){
if [ ! -e "/var/www/new/ehcp/webmail" ] && [ -e "/usr/share/roundcube" ]; then
ln -s /usr/share/roundcube /var/www/new/ehcp/webmail
fi
if [ ! -e "/var/www/new/ehcp/phpmyadmin" ] && [ -e "/usr/share/phpmyadmin" ]; then
ln -s /usr/share/phpmyadmin /var/www/new/ehcp/phpmyadmin
fi
if [ ! -e "/var/www/new/phpmyadmin" ] && [ -e "/usr/share/phpmyadmin" ]; then
ln -s /usr/share/phpmyadmin "/var/www/new/phpmyadmin"
fi
# Remove some symlinks that can break things depending on certain situations
# Nginx
# Remove /etc/nginx/sites-enabled/default symlink if exists
if [ -L "/etc/nginx/sites-enabled/default" ]; then
rm -f "/etc/nginx/sites-enabled/default"
if [ -e "/etc/nginx/sites-available/default" ]; then
cp "/etc/nginx/sites-available/default" "/etc/nginx/sites-enabled/default"
fi
fi
#Apache2
# Remove /etc/apache2/sites-enabled/default symlink if exists
if [ -L "/etc/apache2/sites-enabled/000-default.conf" ]; then
rm -f "/etc/apache2/sites-enabled/000-default.conf"
if [ -e "/etc/apache2/sites-available/000-default.conf" ]; then
cp "/etc/apache2/sites-available/000-default.conf" "/etc/apache2/sites-enabled/default"
fi
fi
}
function preventUserCronFromWebUser(){
if [ ! -e "/etc/cron.deny" ]; then
echo "${VSFTPDUser}" >> /etc/cron.deny
echo -e "Blocking FTP from running cronjob"
else
hasFTPDenied=$(cat /etc/cron.deny | grep -o "^${VSFTPDUser}\$")
if [ -z "$hasFTPDenied" ]; then
echo "${VSFTPDUser}" >> /etc/cron.deny
echo -e "Blocking FTP from running cronjob"
fi
fi
}
function removeMinerExploit(){
killall -9 kdevtmpfsi
killall -9 kinsing
rm -rf /var/tmp/kinsing
rm -rf /var/tmp/.ICEd-unix
rm -rf /var/tmp/.ICE-unix
rm -rf /tmp/kdevtmpfsi
rm -rf /tmp/.ICEd-unix
rm -rf /tmp/.ICE-unix
rm -rf /tmp/kinsing
rm -rf /tmp/libsystem.so
rm -rf /var/spool/cron/crontabs/ftp
rm -rf /var/spool/cron/crontabs/vsftpd
}
function fixEHCPAutoReplyPostfixMasterCF(){
# Respace auto response code
PostFixMaster="/etc/postfix/master.cf"
sed -i 's/.*# ehcp: autoresponder code:.*/# ehcp: autoresponder code:/g' "$PostFixMaster"
sed -i 's/.*ehcp_autoreply unix - n n - - pipe.*/ehcp_autoreply unix - n n - - pipe/g' "$PostFixMaster"
sed -i 's/.*user=vmail.*/ user=vmail/g' "$PostFixMaster"
sed -i 's#.*argv=/var/www/new/ehcp/misc/autoreply.php \$sender \$recipient.*# argv=/var/www/new/ehcp/misc/autoreply.php \$sender \$recipient#g' "$PostFixMaster"
sed -i 's/.*submission inet n - - - - smtpd.*//g' "$PostFixMaster"
}
function fixUbuntu14SSL(){
openSSLVersion=$(openssl version | grep -o "OpenSSL 1.1.1b")
if [ -z "$openSSLVersion" ] || [ ! -e "${patchDir}/openssl-1.1.1b" ]; then
# Compile openssl 1.1.1b
origDir=$(pwd)
cd "$patchDir"
wget https://www.openssl.org/source/old/1.1.1/openssl-1.1.1b.tar.gz
tar -xf openssl-1.1.1b.tar.gz
cd openssl-1.1.1b
./config --prefix=/usr/local/ssl --openssldir=/usr/local/ssl shared
make
make install
echo "/usr/local/ssl/lib" > /etc/ld.so.conf.d/openssl-1.1.1b.conf
ldconfig -v
mv /usr/bin/c_rehash /usr/bin/c_rehash.BEKUP
mv /usr/bin/openssl /usr/bin/openssl.BEKUP
ln -s /usr/local/ssl/bin/c_rehash /usr/bin/c_rehash
ln -s /usr/local/ssl/bin/openssl /usr/bin/openssl
# Update CA Certificates
cd "$patchDir"
wget https://launchpad.net/ubuntu/+archive/primary/+sourcefiles/ca-certificates/20210119~20.04.2/ca-certificates_20210119~20.04.2.tar.xz
tar -xJf ca-certificates_20210119~20.04.2.tar.xz
cd ca-certificates-20210119~20.04.1
make
sudo make install
sudo dpkg-reconfigure -fnoninteractive ca-certificates
sudo update-ca-certificates
/usr/bin/c_rehash /etc/ssl/certs
rm -rf /usr/local/ssl/certs
ln -s /etc/ssl/certs /usr/local/ssl/certs
rm -rf /usr/local/ssl/private
ln -s /etc/ssl/private /usr/local/ssl/private
cd $origDir
fi
# Update python and pip
python2MajorVersion=$(python2 -V 2>&1 | awk '{print $2}' | cut -d. -f1)
python2MinorVersion=$(python2 -V 2>&1 | awk '{print $2}' | cut -d. -f2)
python2ReleaseVersion=$(python2 -V 2>&1 | awk '{print $2}' | cut -d. -f3)
if [ "$python2ReleaseVersion" -lt "15" ] && [ "$python2MajorVersion" == "2" ] && [ "$python2MinorVersion" == "7" ] && [ -e "${patchDir}/openssl-1.1.1b" ] && [ -e "/etc/ld.so.conf.d/openssl-1.1.1b.conf" ]; then
origDir=$(pwd)
cd "$patchDir"
wget -N "https://www.python.org/ftp/python/2.7.18/Python-2.7.18.tgz"
tar -xf "Python-2.7.18.tgz"
cd "Python-2.7.18"
./configure --with-ensurepip=install --with-openssl="${patchDir}/openssl-1.1.1b/" --enable-optimizations --with-ssl-default-suites=openssl CFLAGS="-I${patchDir}/openssl-1.1.1b/include" LDFLAGS="-L${patchDir}/openssl-1.1.1b/"
make
make install
/usr/local/bin/certbot --quiet
cd $origDir
fi
}
function installPipPackages(){
pip install requests
pip install chardet
pip install mysqlclient
pip install passlib
pip install mysqlclient
pip2Instance=$(which "pip2")
if [ ! -z "$pip2Instance" ]; then
pip2 install requests
pip2 install chardet
pip2 install mysqlclient
pip2 install passlib
pip2 install mysqlclient
fi
}
###############################
###START OF SCRIPT MAIN CODE###
###############################
clear
# Get parameters
for varCheck in "$@"
do
if [ "$varCheck" == "policyd" ]; then
# Because PolicyD is experimental, I don't want to prompt users to install it each time the update script is run
# Because they most likely answered no during the initial install
promptForPolicyD=true
fi
if [ "$varCheck" == "debug" ]; then
# Debug mode
debugMode=true
fi
if [ "$varCheck" == "upgrade" ]; then
# Debug mode
operationMode="upgrade"
fi
if [ "$varCheck" == "update" ]; then
# Debug mode
operationMode="update"
fi
if [ "$varCheck" == "update-svn" ]; then
# Debug mode
operationMode="update-svn"
fi
done
# Set more variables
adjustOperationMode
# Check and see if this script is being executed by root
rootCheck
# Check for Apt-get availability
isAptGetInUseBySomething
# Tell the user the script is running
echo -e "Running EHCP Force Edition ${operationMode} script...\n"
# Get distro info
echo -e "Retrieving Distribution Information\n"
checkDistro
# Set our global variables
setGlobalVars
# Stop services
echo -e "Stopping services\n"
stopServices
# Install new packages that are needed
echo -e "Installing any missing software packages that are needed by the latest version of EHCP Force!\n"
installNewPackages
# Update packages
echo -e "Downloading and installing package updates!\n"
updateBeforeInstall
echo -e "Making Sure nginx and php-fpm Are Installed\n"
# Checking PreReqs
CheckPreReqs
# Make sure nginx is stopped
echo -e "Checking to make sure nginx is disabled!\n"
nginxOff
# Fix envvar config
echo -e "Checking Apache2 EnvVars for Errors\n"
fixApacheEnvVars
echo -e "Fixing php-fpm Listen Settings\n"
# Fix php-fpm to listen to port 9000
fixPHPFPMListen
# Fix session saving for nginx
fixNginxSessions
# Fix openssl configuration
adjustOpenSSLConfiguration
echo -e "Changing Apache User\n"
# Change Apache User
changeApacheUser
echo -e "Configuring apache2 to use FPM for PHP\n"
# Use FPM for apache
apacheUseFPM
# Add Nginx Limiting
echo -e "Adding rate limiting for nginx\n"
nginxRateLimit
echo -e "Enabling Slave DNS\n"
# Allow slave DNS:
slaveDNSApparmorFix
echo -e "Setting roundcube as default email client for websites.\n"
# Fix SquirrelMail config to use Sendmail
makeRoundCubeDefaultMailClient
echo -e "Retrieving Latest EHCP Force Files and Making a Backup of Original Files\n"
# Get EHCP Files
getLatestEHCPFiles
echo -e "Updating the EHCP Daemon\n"
# Update EHCP Daemon
updateDaemon
echo -e "Running MySQL Mode Fix\n"
# Fix MySQL Mode
updateMySQLModeVariableIfNeeded
echo -e "Running MySQL Bind Address Fix\n"
# Fix MySQL Bind Address
mysqlUseLocalHost
echo -e "Updating Base nginx Configuration Files\n"
# Update nginx configuration files
nginxUpdateFiles
echo -e "Checking for VSFTPD Updates\n"
# Check for VSFTPD Updates
ubuntuVSFTPDFix
echo -e "Checking for Generic Fixes Depending on Ubuntu Version\n"
# Check for VSFTPD Updates
genUbuntuFixes
echo -e "Upgrading courier authmysqlrc format if needed...\n"
# Fix courier configuration in newer versions
fixCourierMYSQLAuthFile
echo -e "Running generic fixes...\n"
# Run generic fixes
genFixes
echo -e "Making Apache more secure by not listing files within a folder without an index page.\n"
# Make it so that strangers can't just browse folders without an index file
secureApache
# Allow .htaccess file overrides for Ubuntu 14.04 and up (hopefully versions above)
allowHTACCESSOverrides
# Install and enable php mcrypt module --- if not enabled already
fixPHPmcrypt
echo -e "Fixing apache2 umask issue if applicable!\n"
# Get rid of umask envvars entry
removeApacheUmask
# Install PHPMyAdmin manually if needed
installPHPMyAdminManually
echo -e "Securing PHPMyAdmin Configuration!\n"
# Secure PHPMyAdmin Configuration to Prevent Root Logins Except for Local Connections
securePHPMyAdminConfiguration
if [ ! -e "/etc/bind/ehcp-skip-recursion" ]; then
echo -e "Disabling BIND Recursion\n"
# Disable Bind Recursion:
disableRecursiveBIND
fi
echo -e "Securing web user against running cron jobs"
# Disable web user from using cronjobs
preventUserCronFromWebUser
echo -e "Fixing SASLAuth caching and setting maximum number of threads to 2.\n"
# Prevent SASLAuth memory leaks:
fixSASLAUTH
echo -e "Setting Postfix Configuration to Allow IPv6 Local IP Relay\n"
# Add [::1]/128 to end of mynetworks setting in main.cf
fixPostfixMainConfIPv6
echo -e "Making sure pop-before-smtp has been installed and installing it if missing.\n"
#Fix pop-before-smtp
fixPopBeforeSMTP
echo -e "Configuring php.ini settings for optimal usage.\n"
#Change settings in php.ini to allow 50MB upload files, turn on displaying errors, and setting the error_reporting to something practical
configurePHPIni
echo -e "Fixing roundcube configuration so that email file attachments will work.\n"
# Fix roundcube config for file attachments
fixRoundCubeFileAttachments
echo -e "Setting default roundcube mail server to localhost.\n"
# Set localhost as server to use for roundcube
setDefaultRoundCubeServer
echo -e "Checking Postfix configuration for problems...\n"
#IPv6 should not be used in Postfix in most cases... prompt the user if all is detected instead of ipv4 for inet_protocols
turnOffIPv6PostFix
echo -e "Fixing /etc/bind directory permissions required for slave DNS."
# Fix /etc/bind directory permissions required for slave dns
fixBINDPerms
echo -e "Fixing SquirrelMail configuration to use Sendmail by default.\n"
# Fix SquirrelMail config to use Sendmail
changeSquirrelMailConfigurationUseSendmail
# Upgrade webalizer if needed
updateWebalizerIfNeeded
echo -e "Presenting Additional User Options\n"
# Install extra software if users want it:
installExtras
echo -e "Prompting for MySQL to MariaDB Conversion\n"
# Ask if we should convert from MySQL to MariaDB?
convertToMariaDBFromMYSQLPrompt
echo -e "Adding email blacklist lookup for incoming emails.\n"
addToPostFixRecipientRestrictions
echo -e "Checking apache2 version for ProxyFCGISetEnvIf support with mod_proxy_fcgi!\n"
# Get web server type
checkApacheVersionForProxyFCGI
echo -e "Syncing domains in case the web server mode changed!\n"
# Start the services and sync domains
syncDomainsEHCP
# Enable postfix submission port by default
echo -e "Enabling postfix submission port (587)...\n"
postfixEnableSubmissionPortByDefault
# Fix auto response spacing
fixEHCPAutoReplyPostfixMasterCF
# Create symlinks
createSymlinks
# Remove possible miner exploit that affected EHCP Fore
removeMinerExploit
echo -e "Restarting web services, synchronizing domains, and finalizing installation!\n"
# Start the services and sync domains
finalize
# Make sure python2 pip is installed
installPipManuallyIfNeeded
# Install pip packages
installPipPackages
# Write out version info with current info in case anything has changed
echo -e "Writing out versioning information!\n"
writeOutVersionInfo
echo -e "\nSuccessfully ${operationVerb}d ${EHCPModeText} to the latest version of EHCP Force Edition!"