mirror of
https://github.com/iiab/iiab.git
synced 2025-02-13 11:42:08 +00:00
28 lines
1.4 KiB
Bash
Executable file
28 lines
1.4 KiB
Bash
Executable file
#!/bin/bash
|
|
|
|
export TEXTDOMAIN=pprompt-iiab
|
|
|
|
. gettext.sh
|
|
|
|
# bash syntax "function check_user_pwd() {" was removed, as it prevented all
|
|
# lightdm/graphical logins (incl autologin) on Raspbian: #1252 -> PR #1253
|
|
check_user_pwd() {
|
|
# $meth (hashing method) is typically '6' which implies 5000 rounds
|
|
# of SHA-512 per /etc/login.defs -> /etc/pam.d/common-password
|
|
meth=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f2)
|
|
salt=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f3)
|
|
hash=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f4)
|
|
[ $(python3 -c "import crypt; print(crypt.crypt('$2', '\$$meth\$$salt'))") == "\$$meth\$$salt\$$hash" ]
|
|
}
|
|
|
|
# Credit to the folks at the Raspberry Pi Foundation
|
|
check_hash() {
|
|
if ! id -u iiab-admin > /dev/null 2>&1 ; then return 0 ; fi
|
|
if grep -q "^PasswordAuthentication\s*no" /etc/ssh/sshd_config ; then return 0 ; fi
|
|
if check_user_pwd "iiab-admin" "{{ iiab_admin_published_pwd }}"; then
|
|
zenity --warning --width=600 --text="SSH is enabled and the default password for user 'iiab-admin' is in use.\n\nTHIS IS A SECURITY RISK - please change its password using IIAB's Admin Console (http://box.lan/admin) -> Utilities -> Change Password.\n\nSee 'What are the default passwords?' at http://FAQ.IIAB.IO"
|
|
fi
|
|
}
|
|
|
|
systemctl is-active {{ sshd_service }} > /dev/null && check_hash
|
|
unset check_hash
|