Commit Graph

58 Commits

Author SHA1 Message Date
c6e458de8b . 2025-07-14 11:03:08 -05:00
e31bab4162 . 2025-07-14 11:01:19 -05:00
86740b8c7d . 2025-07-14 10:59:32 -05:00
f585f90b7f . 2025-07-14 10:55:54 -05:00
24c10b6f35 it hallucinated print_header 2025-07-14 10:50:42 -05:00
634a998d7e testing 2025-07-14 10:48:59 -05:00
a632e7d514 Implement comprehensive two-factor authentication for SSH and web services
- Complete rewrite of secharden-2fa.sh with full 2FA implementation
- SSH 2FA using Google Authenticator with publickey + TOTP authentication
- Cockpit web interface 2FA with custom PAM configuration
- Webmin 2FA support with automatic detection and configuration
- User setup automation with QR codes and backup codes generation
- Gradual rollout support using nullok for phased deployment
- Automatic configuration backup and restore procedures
- Add 2fa-validation.sh security test for comprehensive validation
- Create TSYS-2FA-GUIDE.md with complete implementation documentation
- Add DEVELOPMENT-GUIDELINES.md with coding standards and best practices
- Optimize package installation with single apt-get commands for performance

The 2FA implementation provides enterprise-grade security while maintaining
usability and proper emergency access procedures. Includes comprehensive
testing, documentation, and follows established security best practices.

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-07-14 10:23:07 -05:00
0c736c7295 Enforce HTTPS for all downloads to eliminate security vulnerabilities
- Convert 16 HTTP URLs to HTTPS across 3 critical scripts
- Dell OMSA script: Ubuntu archive and Dell repository URLs now use HTTPS
- Proxmox legacy script: Download URLs converted to secure connections
- SSL stack script: Apache source URLs updated to official archive
- Update documentation to reflect resolved security issues
- Mark HTTPS enforcement as completed in todo lists

This addresses the second critical security concern from the security review,
eliminating man-in-the-middle attack vectors during package downloads.

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-07-14 09:22:32 -05:00
6609d7d9e3 sigh. 2025-07-11 11:52:28 -05:00
0588b2dd60 ifdev for dev boxes, they have less hardened ssh config because vscode remote etc 2025-07-11 11:48:53 -05:00
ba8efdfa0b more ntp fixes 2025-07-02 21:08:39 -05:00
f2dc2ce29e automation. no prompts! 2025-07-02 18:52:43 -05:00
d1ef7118d5 debian fails... let's see if this fixes it. 2025-07-02 18:47:21 -05:00
160d1b26cc fixed in ubuntu. will test on debian next. 2025-07-02 18:44:46 -05:00
ce5bb0be6f . 2025-07-02 18:43:18 -05:00
ce1bf7d220 i think this is right... 2025-07-02 18:41:58 -05:00
0175a00458 got to handle the other condition... 2025-07-02 18:25:31 -05:00
0f52d19229 remove debugging 2025-07-02 18:21:56 -05:00
0937036155 had inverse logic. fixed. still shouldn't have caused script to error though... hmm... 2025-07-02 18:15:03 -05:00
02a874f713 . 2025-07-02 18:10:47 -05:00
259a4f07b7 got further . hmm... 2025-07-02 18:09:06 -05:00
f06d8b1fe5 ok. i think this is the last of the regressions. 2025-07-02 18:06:26 -05:00
d76613c0dc . 2025-07-02 18:00:01 -05:00
5deaecd79f . 2025-07-02 17:57:44 -05:00
c58c3f116e . 2025-07-02 17:55:56 -05:00
e4e1c66111 . 2025-07-02 17:52:14 -05:00
d60c03b116 some more resillience 2025-07-02 17:45:56 -05:00
6cdc7bbba7 this code is going to be quite resillient when done.. 2025-07-02 17:43:17 -05:00
8669b64adc i think this should fix ntp/smtp based on my testing. now to e2e test. 2025-07-02 17:40:01 -05:00
1e3c7a97af . 2025-07-02 17:11:06 -05:00
3207f1a870 . 2025-07-02 17:03:46 -05:00
0041e95d59 . 2025-07-02 17:02:29 -05:00
c476f84943 . 2025-07-02 16:59:50 -05:00
38b779f054 OAM final push. graph all the things! 2025-07-02 16:50:45 -05:00
197d8e2d27 ubuntu bug workaround 2025-07-02 12:23:31 -05:00
7457db098f . 2025-07-02 08:15:55 -05:00
109acf07be . 2025-07-02 08:14:06 -05:00
86cded93c5 . 2025-07-02 08:11:26 -05:00
ce45ec1684 . 2025-07-02 08:08:16 -05:00
15074a99f4 . 2025-07-02 08:07:45 -05:00
982389fb63 . 2025-07-02 07:56:53 -05:00
ede6aa0562 no more curl 2025-07-02 07:54:13 -05:00
89ac84c4e1 final bits of security hardening as i pivot back to finishing monitoring/alerting OAM bits. next week will be all the security. 2025-07-02 07:46:55 -05:00
5eb2f6b3d5 path issues again. 2025-07-02 07:43:59 -05:00
a38eac2e77 more path fixes 2025-07-01 20:09:49 -05:00
80dd021217 found a bug 2025-07-01 20:00:53 -05:00
4e3368156c so close now 2025-06-30 14:45:10 -05:00
46020fecf5 weird one... 2025-06-30 14:41:58 -05:00
c77d932dd2 moving along nicely... 2025-06-30 14:37:37 -05:00
363c845ead almost... 2025-06-30 14:33:24 -05:00