2007年3月8日星期四

Linux安全--不允许ROOT远程访问Server

Modify the configure file for forbidding the root user SSH the server
[root@sample ~]# vi /etc/ssh/sshd_config  ← 用vi打开SSH的配置文件
#Protocol 2,1 ← 找到此行将行头"#"删除,再将行末的",1"删除,只允许SSH2方式的连接
 Protocol 2 ← 修改后变为此状态,仅使用SSH2
#ServerKeyBits 768 ← 找到这一行,将行首的"#"去掉,并将768改为1024
 ServerKeyBits 1024 ← 修改后变为此状态,将ServerKey强度改为1024比特
#PermitRootLogin yes  ← 找到这一行,将行首的"#"去掉,并将yes改为no
 PermitRootLogin no  ← 修改后变为此状态,不允许用root进行登录
#PasswordAuthentication yes ← 找到这一行,将yes改为no
 PasswordAuthentication no ← 修改后变为此状态,不允许密码方式的登录
#PermitEmptyPasswords no  ← 找到此行将行头的"#"删除,不允许空密码登录
 PermitEmptyPasswords no  ← 修改后变为此状态,禁止空密码进行登录
[root@sample ~]# vi /etc/hosts.deny  ← 修改屏蔽规则,在文尾添加相应行
修改配置只允许从内网SSH访问Server
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
# you should know that NFS uses portmap!
sshd: ALL  ← 添加这一行,屏蔽来自所有的SSH连接请求
[root@sample ~]# vi /etc/hosts.allow  ← 修改允许规则,在文尾添加相应行
#
# hosts.allow This file describes the names of the hosts which are
# allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
sshd: 192.168.0.  ← 添加这一行,只允许来自内网的SSH连接请求
在修改完SSH的配置文件后,需要重新启动SSH服务才能使新的设置生效。
[root@sample ~]# /etc/rc.d/init.d/sshd restart  ← 重新启动SSH服务器
 Your sincere,

朱恒
2007-03-09

没有评论: