Skip to content

xploz1on/astro-server

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

8 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸš€ Astro Server Security Toolkit

License: Apache 2.0 Shell Ansible Security

Enterprise-grade server security hardening and monitoring toolkit

Transform your Linux servers into impenetrable fortresses with automated security hardening, real-time monitoring, and multi-server deployment capabilities.

πŸš€ Quick Start

πŸ“¦ Install & Run (30 seconds)

# 1. Download and setup
git clone https://github.com/xploz1on/astro-server.git
cd astro-tech
chmod +x astro

# 2. Run it! πŸŽ‰
./astro

That's it! Astro Server will show you a beautiful interactive menu. No need to remember commands or profiles!

🎨 Interactive Menu Preview

    ╔═══════════════════════════════════════════════════════════════╗
    β•‘                    πŸ›‘οΈ  ASTRO SERVER MENU                    β•‘
    β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

Available Operations:
  1) πŸ›‘οΈ  Harden Server          - Interactive security hardening
  2) πŸ“Š Generate Report         - Security status report
  3) πŸš€ Deploy to Multiple      - Deploy via Ansible
  4) πŸ” System Check            - Compatibility verification
  5) πŸ”„ Update Toolkit          - Update Astro Server
  6) ℹ️  Version Info            - Show version details
  7) ❓ Help                     - Show detailed help
  0) πŸšͺ Exit                     - Exit Astro Server

Quick Profiles:
  dev) πŸ’» Development           - VS Code compatible
  prod) πŸ”΄ Production          - Maximum security
  bal) 🟑 Balanced             - Asks about VS Code
  web) 🌐 Web Server           - Web applications
  db) πŸ—„οΈ  Database             - Database servers
  a) ⚑ Aggressive              - High security (legacy)
  p) πŸ”’ Paranoid                - Maximum security (legacy)

Enter your choice:

Just type a number or letter and press Enter! πŸŽ‰

πŸš€ Advanced Usage (Command Line)

# Quick hardening with specific profiles
./astro harden --profile development # VS Code compatible development
./astro harden --profile production  # Maximum security for production
./astro harden --profile balanced    # Asks about VS Code support
./astro harden --profile webserver   # Optimized for web applications
./astro harden --profile database    # Maximum security for databases

# Generate security report
./astro report

# System compatibility check
./astro check

# Multi-server deployment
./astro deploy --inventory hosts

πŸ’» VS Code Remote Development Support

Astro Server includes intelligent VS Code compatibility:

# πŸš€ RECOMMENDED: Interactive approach (safest)
./astro
# Choose "1" then select "bal" for balanced profile
# You'll be asked about VS Code support during deployment

# Quick shortcuts for VS Code users
./astro dev     # Development profile (always VS Code compatible)
./astro bal     # Balanced profile (asks about VS Code)

# For production servers (VS Code disabled by design)
./astro prod    # Production profile (maximum security)

πŸ›‘οΈ Safety First: Astro Server will never break your SSH connection. All changes are applied safely with:

  • Automatic SSH connection verification
  • Backup creation before modifications
  • Interactive confirmation for risky changes
  • Easy rollback capabilities

πŸ“‹ Table of Contents

✨ Why Astro Server?

  • 🎯 One Command Launch - Just run ./astro and you're ready to go!
  • πŸ›‘οΈ Enterprise-Grade Protection - Multi-layer security used by Fortune 500 companies
  • πŸ“Š Beautiful Reporting - Professional security reports that executives love
  • πŸ€– Automation Ready - Scale from 1 to 1000+ servers with Ansible
  • 🐧 Universal Compatibility - Works across all major Linux distributions
  • πŸ”’ Zero Trust Approach - Assume breach, verify everything
  • πŸ“ˆ Continuous Monitoring - Real-time threat detection and response
  • 🎨 Beautiful Interface - No more remembering complex commands or profiles

🌟 Features

  • 🎯 One-Command Launch - Just run ./astro for beautiful interactive menu
  • 🎨 Interactive Security Hardening - Beautiful, colorful CLI interface with guided setup
  • πŸ›‘οΈ Multi-Layer Protection - SSH, Fail2Ban, Firewall, Kernel hardening in one tool
  • πŸ“Š Professional Security Reports - Markdown reports with executive summaries and metrics
  • πŸ”„ Ansible Automation - Deploy across multiple servers with infrastructure as code
  • 🐧 Multi-Distro Support - Ubuntu, Debian, Fedora, RHEL, Arch Linux support
  • πŸ“± Real-time Monitoring - Continuous security status tracking and alerting
  • 🎯 Zero-Config Setup - Smart defaults with expert recommendations
  • πŸ”§ 5 Security Profiles - Development, Production, Balanced, Web Server, Database
  • πŸš€ VS Code Integration - Intelligent remote development support
  • πŸ›‘οΈ Never Breaks SSH - Safe deployment with automatic verification
  • πŸ“Š VS Code Compatibility Reports - Know your remote development status

πŸ›‘οΈ Security Features

πŸ” SSH Hardening

  • ❌ Disable root login
  • πŸ”‘ Key-based authentication enforcement
  • 🚫 Connection attempt limits
  • ⏱️ Session timeouts
  • πŸ”’ Protocol restrictions

πŸ›‘οΈ Intrusion Prevention

  • 🚨 Fail2Ban with aggressive mode
  • πŸ• Configurable ban durations (1h - 1 week)
  • 🌐 Real-time IP blocking
  • πŸ“Š Attack pattern analysis

πŸ”₯ Network Security

  • πŸ›‘οΈ UFW firewall configuration
  • πŸšͺ Smart port management
  • πŸ”’ Default deny policies
  • 🌐 Custom service rules

πŸ”§ Kernel Hardening

  • 🚫 IP forwarding disabled
  • πŸ”’ ICMP protections
  • πŸ›‘οΈ Source routing disabled
  • 🎯 Enhanced ASLR

πŸ“Š Monitoring & Reporting

  • πŸ“ˆ Real-time security dashboards
  • πŸ“‹ Markdown status reports
  • 🚨 Attack trend analysis
  • πŸ“Š Resource monitoring

🐧 Supported Distributions

βœ… Fully Supported

  • Ubuntu 18.04+ (LTS recommended)
  • Debian 10+ (Buster, Bullseye, Bookworm)
  • Linux Mint (All versions)
  • Pop!_OS (All versions)
  • Elementary OS (All versions)

βœ… Fedora/RHEL Family

  • Fedora 35+
  • RHEL/CentOS 8+
  • Rocky Linux (All versions)
  • AlmaLinux (All versions)
  • Oracle Linux (All versions)

πŸ”„ Experimental Support

  • Arch Linux & derivatives (Manjaro, EndeavourOS)
  • Alpine Linux
  • openSUSE

❌ Not Supported

  • macOS - Linux systems only
  • Windows - Use WSL for Windows support

πŸ“š Documentation & Advanced Usage

πŸ“– Installation Methods

# Method 1: Clone from GitHub (Recommended)
git clone https://github.com/xploz1on/astro-server.git
cd astro-tech
chmod +x astro

# Method 2: Download and extract
wget https://github.com/xploz1on/astro-tech/archive/main.zip
unzip main.zip && cd astro-tech-main
chmod +x astro

# Method 3: One-line installer (Coming Soon)
curl -sSL https://get.astro-tech.cloud | bash

πŸ€– Multi-Server Deployment with Ansible

# 🎯 EASIEST WAY: Use the interactive menu!
./astro
# Then select "Deploy to Multiple" from the menu

# πŸš€ COMMAND LINE OPTIONS (for advanced users):
# 1. Install Ansible
sudo apt install ansible  # Ubuntu/Debian
sudo dnf install ansible  # Fedora/RHEL

# 2. Configure your server inventory
cp ansible/inventory/hosts.example ansible/inventory/hosts
vim ansible/inventory/hosts

# 3. Deploy to all servers
./astro deploy --inventory ansible/inventory/hosts

# 4. Deploy to specific server groups
./astro deploy --limit web-servers

# 5. Generate reports for all servers
./astro deploy --playbook security-reports.yml

πŸ“Š Example Security Report Output

# πŸ›‘οΈ Server Security Status Report

## πŸ“Š Executive Summary
| Metric | Status | Value |
|--------|--------|-------|
| **Security Level** | 🟒 **SECURE** | Active monitoring |
| **Failed Login Attempts (24h)** | βœ… | 0 attempts |
| **Currently Banned IPs** | βœ… | 0 IPs blocked |

## πŸ”’ Security Services Status
βœ… SSH hardened with key-only authentication
βœ… Fail2Ban active with aggressive monitoring  
βœ… Firewall configured with minimal attack surface
βœ… Kernel hardened against network attacks

πŸ”§ Configuration

SSH Security Templates

astro-server/configs/ssh/
β”œβ”€β”€ hardened-sshd.conf      # Production SSH config
β”œβ”€β”€ paranoid-sshd.conf      # Maximum security
└── development-sshd.conf   # Dev-friendly config

Fail2Ban Profiles

astro-server/configs/fail2ban/
β”œβ”€β”€ aggressive.conf         # High security
β”œβ”€β”€ balanced.conf          # Recommended
└── permissive.conf        # Light protection

Firewall Rules

astro-server/configs/firewall/
β”œβ”€β”€ web-server.rules       # HTTP/HTTPS services
β”œβ”€β”€ database.rules         # Database servers
└── minimal.rules          # SSH-only access

πŸ“ Project Structure

astro-server/
β”œβ”€β”€ astro                     # 🎯 Main launcher script (improved with new profiles)
β”œβ”€β”€ scripts/                  # πŸ”§ Core security scripts
β”‚   β”œβ”€β”€ Astro-server.sh          # Interactive hardening wizard
β”‚   └── security-report.sh       # Markdown report generator (VS Code checks)
β”œβ”€β”€ ansible/                  # πŸ€– Multi-server automation
β”‚   β”œβ”€β”€ playbooks/               # Deployment playbooks
β”‚   β”‚   └── harden-servers.yml    # Main hardening playbook (profile-aware)
β”‚   β”œβ”€β”€ inventory/               # Server inventories
β”‚   β”œβ”€β”€ group_vars/              # Profile-based configuration variables
β”‚   β”‚   β”œβ”€β”€ development.yml       # Development profile (VS Code enabled)
β”‚   β”‚   β”œβ”€β”€ production.yml        # Production profile (maximum security)
β”‚   β”‚   β”œβ”€β”€ balanced.yml          # Balanced profile (asks about VS Code)
β”‚   β”‚   β”œβ”€β”€ database.yml          # Database profile (secure DB server)
β”‚   β”‚   β”œβ”€β”€ webserver.yml         # Web server profile (web optimized)
β”‚   β”‚   └── all.yml               # Global variables
β”‚   β”œβ”€β”€ tasks/                   # Reusable task files
β”‚   └── templates/               # Jinja2 configuration templates
β”‚       β”œβ”€β”€ sshd_config.j2       # SSH hardening template (profile-aware)
β”‚       └── jail.local.j2        # Fail2Ban configuration template
β”œβ”€β”€ configs/                  # βš™οΈ Security templates (legacy)
β”œβ”€β”€ docs/                     # πŸ“š Comprehensive documentation
β”‚   β”œβ”€β”€ PROFILES.md              # Detailed profile documentation
β”‚   β”œβ”€β”€ INSTALL.md               # Installation guide
β”‚   β”œβ”€β”€ STANDALONE-USAGE.md      # Single server usage
β”‚   └── ANSIBLE-USAGE.md         # Multi-server deployment
β”œβ”€β”€ LICENSE                   # πŸ“„ Apache 2.0 License
β”œβ”€β”€ CONTRIBUTING.md           # 🀝 Contribution guidelines
└── README.md                 # πŸ“– This file (updated with new features)
Guide Description Audience
πŸš€ Quick Start Get started in 5 minutes Everyone
πŸ“– Installation Guide Detailed setup instructions Administrators
πŸ–₯️ Standalone Usage Single server hardening System Administrators
πŸ€– Ansible Usage Multi-server deployment DevOps Engineers
🀝 Contributing How to contribute Developers
πŸ—ΊοΈ Roadmap Development roadmap Everyone

🎯 Roadmap

βœ… Phase 1: Core Features (v1.0.0)

  • Interactive security hardening with beautiful CLI
  • Professional markdown security reports
  • Multi-layer protection (SSH, Fail2Ban, Firewall, Kernel)
  • Configuration templates and profiles
  • Comprehensive documentation

βœ… Phase 2: Ansible Automation (v1.1.0) - COMPLETE

  • Complete Ansible playbook framework
  • Multi-server deployment with templates and tasks
  • Multi-OS support (Debian/Ubuntu, RedHat/Fedora)
  • Environment management (dev/staging/prod)
  • Firewall automation (UFW/firewalld)
  • Advanced role-based architecture
  • Automated report collection

🐧 Phase 3: Multi-Distribution Support (v1.2.0)

  • Fedora/RHEL/CentOS support
  • Arch Linux support
  • Package manager abstraction
  • Distribution-specific optimizations
  • Automated compatibility testing

πŸ”’ Phase 4: Advanced Security (v1.3.0)

  • Container security (Docker/Kubernetes)
  • Compliance frameworks (CIS, NIST, PCI DSS)
  • SIEM integration (ELK, Splunk)
  • Threat intelligence feeds
  • Zero Trust architecture

☁️ Phase 5: Cloud & Enterprise (v2.0.0)

  • AWS/Azure/GCP integration
  • Web management dashboard
  • RESTful API
  • Mobile app support
  • Commercial licensing

🀝 Contributing

We welcome contributions from security professionals, system administrators, and developers!

🎯 Ways to Contribute

Area Skills Needed Impact
🐧 Multi-distro support Linux administration, package management High
πŸ€– Ansible development Ansible, YAML, infrastructure as code High
πŸ”’ Security research Security hardening, compliance frameworks Critical
πŸ“Š Monitoring integration Prometheus, Grafana, ELK Stack Medium
πŸ“ Documentation Technical writing, tutorials High
πŸ§ͺ Testing QA, automated testing, CI/CD Medium

πŸš€ Quick Contribution Guide

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Test your changes thoroughly
  4. Commit with clear messages (git commit -m 'Add amazing feature')
  5. Push to your branch (git push origin feature/amazing-feature)
  6. Open a Pull Request

See CONTRIBUTING.md for detailed guidelines.

πŸ“„ License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

πŸ†˜ Support & Community

πŸ“ž Getting Help

πŸ”’ Security

🌟 Community

πŸ† Security Achievements

After running Astro Server, your infrastructure will achieve:

  • πŸ›‘οΈ Enterprise-grade security posture
  • πŸ“Š Continuous threat monitoring
  • 🚨 Automated attack prevention
  • πŸ“‹ Compliance-ready reporting
  • πŸ”„ Scalable security management

Transform your servers into ASTRO-level secure fortresses! πŸš€πŸ›‘οΈ

Built with ❀️ for the security community

About

Astro Server

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published