Home > Operation and Maintenance > Linux Operation and Maintenance > Hardening Linux Servers: Using Command Line Tools to Improve Security

Hardening Linux Servers: Using Command Line Tools to Improve Security

PHPz
Release: 2023-09-09 09:30:11
Original
1394 people have browsed it

Hardening Linux Servers: Using Command Line Tools to Improve Security

Harden Linux servers: Use command line tools to improve security

Overview:
In today's network environment, server security is crucial. To protect your server from malicious attacks and unauthorized access, hardening your Linux server using command line tools is a necessary step. This article will introduce some commonly used command line tools, as well as their usage methods and sample codes to help you improve the security of your server.

SSH encrypted transmission:
SSH (Secure Shell) is an encrypted network protocol used for remote login and command execution. By using SSH, malicious users can be prevented from intercepting and eavesdropping on data in transit. Here is sample code to generate and use a key pair using SSH:

  1. Generate an SSH key pair:

    ssh-keygen -t rsa -b 4096
    Copy after login
  2. Copy the public key to Remote server:

    ssh-copy-id 用户名@IP地址
    Copy after login
  3. Disable password login (optional):

    sudo vi /etc/ssh/sshd_config
    Copy after login

Find the line #PasswordAuthentication yes, Change it to PasswordAuthentication no, then save and exit.

  1. Restart SSH service:

    sudo systemctl restart sshd
    Copy after login

Firewall settings:
A firewall is a network security device used to monitor and control the network data flow on. Use a firewall to limit inbound and outbound traffic on your server, providing protection against malicious attacks. The following is sample code to set firewall rules using the iptables command:

  1. Install iptables:

    sudo apt-get install iptables
    Copy after login
  2. Create a new firewall Rules file:

    sudo touch /etc/iptables.rules
    sudo vi /etc/iptables.rules
    Copy after login

Add the following rules in the file:

*filter
# 默认策略
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]

# 允许本地回环接口的访问
-A INPUT -i lo -j ACCEPT

# 允许已经建立的、相关的连接进入
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

# 允许SSH连接
-A INPUT -p tcp --dport 22 -j ACCEPT

# 允许其他必要的端口
# -A INPUT -p tcp --dport 80 -j ACCEPT
# -A INPUT -p tcp --dport 443 -j ACCEPT

# 允许ICMP (Ping)请求
-A INPUT -p icmp --icmp-type echo-request -j ACCEPT

# 允许限制的IP地址范围
-A INPUT -s 允许连接的IP地址/子网掩码 -j ACCEPT

# 允许某个IP地址范围的访问
# -A INPUT -s 允许连接的IP地址/子网掩码 -j ACCEPT

# 拒绝所有其他入站流量
-A INPUT -j DROP

COMMIT
Copy after login
  1. Load firewall rules and set startup:

    sudo iptables-restore < /etc/iptables.rules
    sudo touch /etc/network/if-pre-up.d/iptables
    sudo chmod +x /etc/network/if-pre-up.d/iptables
    sudo vi /etc/network/if-pre-up.d/iptables
    Copy after login

Add the following to the file:

#!/bin/sh
/sbin/iptables-restore < /etc/iptables.rules
Copy after login
  1. Restart the server to apply the new firewall rules:

    sudo reboot
    Copy after login

Log and Monitoring:
Logging and monitoring are important components of server security. By regularly reviewing server logs, unusual activity can be discovered and acted upon. The following is sample code using common logging and monitoring tools:

  1. View system logs:

    sudo tail -f /var/log/syslog
    Copy after login
  2. View authorized user logs:

    sudo tail -f /var/log/auth.log
    Copy after login
  3. Monitor network connections:

    sudo apt-get install nethogs
    sudo nethogs
    Copy after login
  4. Monitor system resource usage:

    sudo apt-get install htop
    sudo htop
    Copy after login

Summary:
By using the above command line tools and sample code, you can enhance the security of your Linux server. From generating SSH key pairs and disabling password logins to setting up firewall rules and monitoring server logs, these steps can help you protect your server from malicious attacks and unauthorized access. When operating and maintaining the server, be sure to regularly review server logs and monitor system resource usage to ensure the security and stability of the server.

The above is the detailed content of Hardening Linux Servers: Using Command Line Tools to Improve Security. For more information, please follow other related articles on the PHP Chinese website!

source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template