Home Operation and Maintenance Linux Operation and Maintenance Improve Linux server security using command line tools

Improve Linux server security using command line tools

Sep 08, 2023 pm 04:54 PM
linux Command Line safety

Improve Linux server security using command line tools

Use command line tools to improve the security of Linux servers

Abstract: With the development of the Internet, Linux server security issues have received more and more attention. This article will introduce some commonly used command line tools to help administrators improve the security of Linux servers. At the same time, we will also provide code examples for each tool so that readers can better understand and apply them in actual situations.

Introduction:
With the popularity of the Internet and the development of technology, Linux servers have become the system of choice for many enterprises and individuals. However, at the same time, server security issues have become increasingly prominent. Hacking attacks, vulnerability exploits, and data leaks all pose significant threats to servers. In order to protect servers and data, administrators need to take some measures to improve the security of Linux servers.

1. Properly set password policy
A secure password policy is crucial to server security. We can use command line tools to set password policies, including password length, complexity requirements, and expiration dates.

1.1 Set the password length:
Using the command line tool passwd, we can modify PASS_MIN_LEN## in the /etc/login.defs file #Field to set the minimum password length. Here is a sample script:

#!/bin/bash
sed -i 's/^PASS_MIN_LEN.*$/PASS_MIN_LEN 8/' /etc/login.defs
Copy after login

1.2 Set password complexity:

Using the command line tool
pam_pwquality, we can modify /etc/security/pwquality.confParameters in the file to set password complexity requirements. The following is a sample script:

#!/bin/bash
sed -i 's/^minlen.*$/minlen=8/' /etc/security/pwquality.conf
sed -i 's/^dcredit.*$/dcredit=-1/' /etc/security/pwquality.conf
sed -i 's/^ucredit.*$/ucredit=-1/' /etc/security/pwquality.conf
sed -i 's/^ocredit.*$/ocredit=-1/' /etc/security/pwquality.conf
sed -i 's/^lcredit.*$/lcredit=-1/' /etc/security/pwquality.conf
Copy after login

1.3 Set password validity period:

Using the command line tool
chage, we can view and modify the user's password validity period. The following is a sample script:

#!/bin/bash
# 查看用户的密码有效期
chage -l username
# 修改用户的密码有效期为30天
chage -M 30 username
Copy after login

2. Restrict users’ remote login

In order to reduce the risk of server intrusion, we can restrict users’ remote login permissions. Specifically, we can use the command line tool
sshd to configure the /etc/ssh/sshd_config file to restrict users' SSH login.

2.1 Disable root remote login:

By modifying the
/etc/ssh/sshd_config file, change the value of the PermitRootLogin field to no. The following is a sample script:

#!/bin/bash
sed -i 's/^PermitRootLogin.*$/PermitRootLogin no/' /etc/ssh/sshd_config
Copy after login

2.2 Limit the IP range for SSH login:

By modifying the
/etc/ssh/sshd_config file, use the AllowUsers field limit IP range that allows SSH login. The following is a sample script:

#!/bin/bash
echo "AllowUsers 192.168.1.0/24" >> /etc/ssh/sshd_config
Copy after login

3. Use firewall to protect the server

Firewall is an important part of protecting server security. We can use the command line tool
iptables to configure firewall rules.

3.1 Close unnecessary ports:

Use the
iptables command to close unnecessary ports on the server to provide better protection for the server. The following is a sample script:

#!/bin/bash
# 关闭80端口
iptables -A INPUT -p tcp --dport 80 -j DROP
Copy after login

3.2 Set ALLOW/DENY rules:

Use the
iptables command to set ALLOW/DENY rules to allow or deny access to specific IPs or IP ranges. The following is a sample script:

#!/bin/bash
# 允许192.168.1.100访问80端口
iptables -A INPUT -s 192.168.1.100 -p tcp --dport 80 -j ACCEPT
# 拒绝192.168.1.200访问22端口
iptables -A INPUT -s 192.168.1.200 -p tcp --dport 22 -j DROP
Copy after login

Conclusion:

This article introduces several commonly used command line tools to help administrators improve the security of Linux servers. By setting password policies, restricting users from logging in remotely, and using firewalls, we can effectively protect servers from the risk of attacks and data leaks. I hope readers can master these tools and apply them in practice to improve server security.

References:

None

The above is the detailed content of Improve Linux server security using command line tools. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to view the docker process How to view the docker process Apr 15, 2025 am 11:48 AM

Docker process viewing method: 1. Docker CLI command: docker ps; 2. Systemd CLI command: systemctl status docker; 3. Docker Compose CLI command: docker-compose ps; 4. Process Explorer (Windows); 5. /proc directory (Linux).

What computer configuration is required for vscode What computer configuration is required for vscode Apr 15, 2025 pm 09:48 PM

VS Code system requirements: Operating system: Windows 10 and above, macOS 10.12 and above, Linux distribution processor: minimum 1.6 GHz, recommended 2.0 GHz and above memory: minimum 512 MB, recommended 4 GB and above storage space: minimum 250 MB, recommended 1 GB and above other requirements: stable network connection, Xorg/Wayland (Linux)

vscode cannot install extension vscode cannot install extension Apr 15, 2025 pm 07:18 PM

The reasons for the installation of VS Code extensions may be: network instability, insufficient permissions, system compatibility issues, VS Code version is too old, antivirus software or firewall interference. By checking network connections, permissions, log files, updating VS Code, disabling security software, and restarting VS Code or computers, you can gradually troubleshoot and resolve issues.

Can vscode be used for mac Can vscode be used for mac Apr 15, 2025 pm 07:36 PM

VS Code is available on Mac. It has powerful extensions, Git integration, terminal and debugger, and also offers a wealth of setup options. However, for particularly large projects or highly professional development, VS Code may have performance or functional limitations.

What is vscode What is vscode for? What is vscode What is vscode for? Apr 15, 2025 pm 06:45 PM

VS Code is the full name Visual Studio Code, which is a free and open source cross-platform code editor and development environment developed by Microsoft. It supports a wide range of programming languages ​​and provides syntax highlighting, code automatic completion, code snippets and smart prompts to improve development efficiency. Through a rich extension ecosystem, users can add extensions to specific needs and languages, such as debuggers, code formatting tools, and Git integrations. VS Code also includes an intuitive debugger that helps quickly find and resolve bugs in your code.

How to run java code in notepad How to run java code in notepad Apr 16, 2025 pm 07:39 PM

Although Notepad cannot run Java code directly, it can be achieved by using other tools: using the command line compiler (javac) to generate a bytecode file (filename.class). Use the Java interpreter (java) to interpret bytecode, execute the code, and output the result.

What is the main purpose of Linux? What is the main purpose of Linux? Apr 16, 2025 am 12:19 AM

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

How to use VSCode How to use VSCode Apr 15, 2025 pm 11:21 PM

Visual Studio Code (VSCode) is a cross-platform, open source and free code editor developed by Microsoft. It is known for its lightweight, scalability and support for a wide range of programming languages. To install VSCode, please visit the official website to download and run the installer. When using VSCode, you can create new projects, edit code, debug code, navigate projects, expand VSCode, and manage settings. VSCode is available for Windows, macOS, and Linux, supports multiple programming languages ​​and provides various extensions through Marketplace. Its advantages include lightweight, scalability, extensive language support, rich features and version

See all articles