Home Operation and Maintenance Linux Operation and Maintenance A command-line journey to improve Linux server security

A command-line journey to improve Linux server security

Sep 08, 2023 pm 05:55 PM
security linux server command line

A command-line journey to improve Linux server security

Command line journey to improve Linux server security

In the current network environment, protecting the security of the server is crucial. The Linux operating system provides many powerful tools and commands that can help us improve server security. This article will take you on an exciting command line journey and learn how to use these commands to harden your Linux server.

  1. Update system and software

First, make sure that your Linux system and installed software are the latest versions. Updating systems and software can help fix known security vulnerabilities and provide better security. Use the following command to update the system and software:

sudo apt update
sudo apt upgrade
Copy after login
  1. Reinforce SSH access

SSH is a common tool for remote management of Linux servers, but it is also one of the main entrances for attackers. . To harden SSH access, you can take the following measures:

2.1. Disable root account login

The root account is the account with the highest privileges, and attackers usually try to guess its password to carry out attacks. Disabling root account login can reduce the attack surface. In the /etc/ssh/sshd_config file, find the PermitRootLogin parameter and set it to no:

PermitRootLogin no
Copy after login

Save and exit the file , and then restart the SSH service:

sudo service ssh restart
Copy after login

2.2. Log in using an SSH key

Using an SSH key for authentication can be more secure because it is more difficult to crack than a password. The method to generate an SSH key pair is as follows:

ssh-keygen -t rsa -b 4096
Copy after login

Follow the prompts to generate a key pair. Then add the public key to the ~/.ssh/authorized_keys file on the server. Save the private key locally and make sure permissions are set to 600 or higher.

Next, you can modify the /etc/ssh/sshd_config file to force the use of SSH keys for login:

PasswordAuthentication no
Copy after login

Save and exit the file, then restart SSH Serve.

  1. Firewall settings

The firewall is an important tool to protect the server. Firewall rules can be configured using the iptables command. The following are some commonly used command examples:

3.1. Block specified IP address

If you want to block a specific IP address, you can use the following command:

iptables -A INPUT -s 192.168.1.100 -j DROP
Copy after login

3.2. Allow Specific port access

If you only allow specific ports to access the server, you can use the following command:

iptables -A INPUT -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j ACCEPT
Copy after login

The above command will allow SSH and HTTP access. Make sure you modify the port number according to your actual needs.

3.3. Block all non-specified port access

If you only allow specific ports to access the server, you can use the following command:

iptables -A INPUT -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -j DROP
Copy after login

The above command will allow SSH access, And block access to all other ports.

  1. Regular backup

Regular backup of server data and configuration files is an important security measure. You can use the crontab command to set up scheduled backup tasks. The following is an example:

Open the terminal and enter:

crontab -e
Copy after login

Add the following line in the opened file to set up a daily scheduled backup:

0 2 * * * rsync -avz /var/www /path/to/backup
Copy after login

The above command will be executed every morning 2. Back up the /var/www directory to the specified path.

  1. Security hardening of other services

In addition to SSH, you also need to ensure the security of other services. For example, you can use the following command to harden the Apache web server:

5.1. Disable directory browsing

Find the following lines in the /etc/apache2/apache2.conf file , and make sure it is not preceded by a comment symbol (#):

Options -Indexes
Copy after login

5.2. Hide server version information

In the same file, find the following line and set it to Off:

ServerTokens Prod
Copy after login

Save and exit the file, then restart the Apache service.

This is just a small selection of ways to improve server security. By using these commands and measures, you can enhance the security of your Linux server and reduce the risk of attacks. Remember, keeping your server secure is an ongoing task that requires frequent regular reviews and updated measures.

The command line examples provided in this article are just basic knowledge. If you want to further strengthen the security of your server, it is recommended that you learn more about related technologies and more advanced security measures.

I wish your Linux server is safe and worry-free!

The above is the detailed content of A command-line journey to improve Linux server security. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Docker under Linux: How to ensure the security and isolation of containers? Docker under Linux: How to ensure the security and isolation of containers? Jul 31, 2023 pm 07:24 PM

Docker under Linux: How to ensure the security and isolation of containers? With the rapid development of cloud computing and container technology, Docker has become a very popular containerization platform. Docker not only provides a lightweight, portable and scalable container environment, but also has good security and isolation. This article will introduce how to ensure the security and isolation of Docker containers under Linux systems, and give some relevant code examples. Use the latest Docker version Docker

In-depth understanding of Cookies in Java: detailed explanation of functions, applications and security In-depth understanding of Cookies in Java: detailed explanation of functions, applications and security Jan 03, 2024 pm 02:44 PM

Understanding Cookies in Java in One Article: Analysis of Functions, Applications and Security Introduction: With the rapid development of the Internet, Web applications have become an indispensable part of people's lives. In order to realize users' personalized needs and provide a better user experience, web applications must be able to persistently store user data and status. In Java, Cookies are widely used for these needs. This article will introduce the basic concepts, functions and application of Cookie in Java, and also discuss Cookie

Security and Vulnerability Prevention -- Avoiding Web Application Security Risks Security and Vulnerability Prevention -- Avoiding Web Application Security Risks Sep 09, 2023 am 10:45 AM

Security and Vulnerability Prevention - Avoiding Security Risks of Web Applications With the booming development of the Internet, Web applications are increasingly becoming an indispensable part of people's lives and work. However, various security risks and vulnerability threats also come with it. This article will explore some common web application security risks and provide code examples to help developers avoid these risks. 1. Cross-site scripting attack (XSS) XSS attack is a common and dangerous web application security vulnerability. An attacker injects a web application with

Common security vulnerabilities on Linux servers and how to fix them Common security vulnerabilities on Linux servers and how to fix them Jul 03, 2023 pm 01:36 PM

Common security vulnerabilities on Linux servers and their repair methods With the development of the Internet, Linux servers have become the first choice for many enterprises and individuals. However, in the process of using Linux servers, we also have to face the risk of security vulnerabilities. Security vulnerabilities will bring many potential risks to the server, including data leakage, system crash, malicious code execution, etc. Therefore, it is crucial to detect and fix security vulnerabilities promptly. This article will introduce some common Linux server security vulnerabilities and provide corresponding repair methods.

Linux server settings to improve web interface security. Linux server settings to improve web interface security. Sep 10, 2023 pm 12:21 PM

Linux server settings to improve Web interface security With the development of the Internet, the security of Web interfaces has become particularly important. Setting up proper security measures on your Linux server can greatly reduce potential risks and attacks. This article will introduce some Linux server settings that improve the security of web interfaces and help you protect your website and user data. 1. Update operating systems and software It’s important to keep operating systems and software up to date as they often fix security vulnerabilities. Regular updates can prevent

Laravel Development Notes: Security Best Practices and Recommendations Laravel Development Notes: Security Best Practices and Recommendations Nov 22, 2023 am 08:41 AM

Laravel Development Notes: Security Best Practices and Recommendations As network security threats continue to increase, security has become an important consideration in the web application development process. When developing applications using the Laravel framework, developers need to pay special attention to security issues to protect user data and applications from attacks. This article will introduce some security best practices and suggestions that need to be paid attention to in Laravel development to help developers effectively protect their applications. Prevent SQL injection attacksSQL injection

PHP study notes: security and defense measures PHP study notes: security and defense measures Oct 09, 2023 pm 03:01 PM

PHP Study Notes: Security and Defense Measures Introduction: In today's Internet world, security is very important, especially for Web applications. As a commonly used server-side scripting language, PHP security has always been an aspect that developers must pay attention to. This article will introduce some common security issues in PHP and provide sample code for some defensive measures. 1. Input validation Input validation is the first line of defense in protecting web application security. In PHP, we usually use filtering and validation techniques to ensure

A command-line journey to improve Linux server security A command-line journey to improve Linux server security Sep 08, 2023 pm 05:55 PM

A Command Line Journey to Improve Linux Server Security In the current network environment, protecting server security is crucial. The Linux operating system provides many powerful tools and commands that can help us improve server security. This article will take you on an exciting command line journey and learn how to use these commands to harden your Linux server. Update your system and software First, make sure your Linux system and installed software are up to date. Updating your system and software can help fix known security issues

See all articles