debianinit
debianinit: Debian Server Initialization
This Ansible role configures a minimal Debian server that is ready for future use.
The role currently supports the following distributions:
- Debian Jessie (8.x)
- Debian Stretch (9.x)
- Debian Buster (10.x)
- Debian Bullseye (11.x)
Requirements
- The SSH user on remote server has root privilege.
- Python is installed on remote server
Role Variables
di_ssh_port: 22
SSH deamon listening port. Putting SSH on a non-default port and ignoring other security measures are considered security through obscurity.
SSH listen on port 22 by default. It's not advised to change this setting.
di_ssh_password_authentication: 'no'
Whether SSH password authentication is enabled.
Password authentication is disabled by default. Unless you have specific requirements, this setting should not be changed.
di_ssh_permit_root_login: 'without-password'
Whether root
user is allowed to login. If you run ansible as root
, then without-password
is a sane choice. Otherwise this can be safely set to no
.
By default this setting is without-password
.
di_ssh_allow_users: []
A list of users who are allowed to login via SSH. An empty list means this setting is not enforced.
By default this list is empty which means all users are allowed.
di_system_removed_packages:
- apache2
- bind9
- rpcbind
- samba
- sendmail
- snmp
A list of packages to be removed (purged). By default some packages are removed as in the above block.
di_system_installed_packages:
- apt-transport-https
- bzip2
- ca-certificates
- cron
- curl
- dbus
- dnsutils
- haveged
- less
- logrotate
- lsb-release
- mtr-tiny
- openssl
- rsyslog
- screen
- sudo
- time
- vim-tiny
- vnstat
- wget
- whiptail
A list of packages to be installed. By default some packages are installed as in the above block.
di_system_fail2ban_enabled: yes
Whether to install fail2ban, a service to ban bad hosts according to certain rules. After installation, brute-force SSH login attempts are automatically blocked.
By default fail2ban is installed.
di_system_timezone: 'UTC'
Server timezone. Unless you have specific requirements, UTC
is the preferred and default timezone.
di_system_timesync_enabled: yes
Whether to enable the time sync service. This service is provided by systemd and is lighter than ntp service. On Xen, KVM virtual servers and dedicated servers, this service should be enabled. On OpenVZ virtual servers, this service may not work.
By default this service is enabled.
di_system_unattended_upgrades_enabled: no
Whether to enable the unattended upgrades which will automatically upgrade the system on a daily basis. Please note that servers should still be taken care of even if this feature is enabled. For example, some new packages (esp. new Linux kernel) won't take effect unless the server is rebooted.
By default unattended upgrades is disabled. It can be safely enabled on a standard system.
di_system_unattended_upgrades_mail_to: ''
A string representing an email address. An email will be sent to this address when unattended upgrades upgrade the system or encounter problems.
By default this setting is empty which means no email will be sent.
di_add_users: []
A list of users to be created on the server. Every user must have three fields defined: name
, password
and shell
. See example section for more on how to define new users.
By default, no users are created.
di_sudoers_password: []
A list of users who can execute sudo
command after providing their passwords.
By default no users are added to this list.
di_sudoers_passwordless: []
A list of users who can execute sudo
without providing their passwords. Since sudo
runs a command as root, it's inherently insecure if password is not required before running. This setting is better left blank for important servers.
By default no users are added to this list.
di_ufw_enabled: no
Whether to install ufw, a human-friendly iptables front-end. By enabling ufw, the sane default policies (allow outgoing, deny incoming) are set and TCP on SSH port is allowed. If the server has further usage, such as http, you will need to further tweak the di_ufw_rules
variable, see below and example playbook.
By default ufw is not installed.
di_ufw_rules:
- { rule: allow, from: any, to: any, port: '{{ di_ssh_port }}', proto: tcp }
A list of user-defined ufw rules. These rules will be applied when ufw is enabled. Each rule must have five fields.
rule
defines the type of the rule. Possible values areallow
,deny
andreject
.from
defines source IP address. Setfrom
toany
if there's no source IP restriction.to
defines destination IP address. Setto
toany
if there's no destination IP restriction.port
defines destination port.proto
defines network protocol. Possible values aretcp
,udp
andany
.
Example section shows how to define ufw rules. Note that if you need to change di_ufw_rules
, the first rule which allows SSH port must be kept or you may risk locking yourself out of your server. This role is only capable of simple ufw rules. For more complex rules, you may have to define them manually.
By default TCP on SSH port is allowed. No additional ufw rules are defined.
Dependencies
This role has no dependencies.
Example Playbook
When root is running the playbook:
- hosts: testservers
vars:
di_add_users:
- name: test
password: randompassword
shell: /bin/bash
- name: git
password: anotherrandompassword
shell: /usr/bin/git-shell
di_ssh_allow_users:
- root
- test
- git
di_sudoers_password:
- test
di_system_unattended_upgrades_enabled: yes
di_system_unattended_upgrades_mail_to: [email protected]
di_ufw_enabled: yes
di_ufw_rules:
- { rule: allow, from: any, to: any, port: '{{ di_ssh_port }}', proto: tcp }
- { rule: allow, from: any, to: any, port: 80, proto: tcp }
- { rule: allow, from: any, to: any, port: 443, proto: tcp }
- { rule: deny, from: 192.168.1.0/24, to: any, port: 53, proto: any }
roles:
- { role: hanru.debianinit }
When a user with sudo privilege is running the playbook:
- hosts: testservers
vars:
...
roles:
- { role: hanru.debianinit, become: yes }
License
MIT
Reference
This role is inspired by My First 5 Minutes On A Server. When developing this role, I learned a lot from the following Ansible playbooks/roles.