Home Operation and Maintenance Linux Operation and Maintenance Improve Linux server security using command line tools

Improve Linux server security using command line tools

Sep 08, 2023 pm 04:54 PM
linux Command Line safety

Improve Linux server security using command line tools

Use command line tools to improve the security of Linux servers

Abstract: With the development of the Internet, Linux server security issues have received more and more attention. This article will introduce some commonly used command line tools to help administrators improve the security of Linux servers. At the same time, we will also provide code examples for each tool so that readers can better understand and apply them in actual situations.

Introduction:
With the popularity of the Internet and the development of technology, Linux servers have become the system of choice for many enterprises and individuals. However, at the same time, server security issues have become increasingly prominent. Hacking attacks, vulnerability exploits, and data leaks all pose significant threats to servers. In order to protect servers and data, administrators need to take some measures to improve the security of Linux servers.

1. Properly set password policy
A secure password policy is crucial to server security. We can use command line tools to set password policies, including password length, complexity requirements, and expiration dates.

1.1 Set the password length:
Using the command line tool passwd, we can modify PASS_MIN_LEN## in the /etc/login.defs file #Field to set the minimum password length. Here is a sample script:

#!/bin/bash
sed -i 's/^PASS_MIN_LEN.*$/PASS_MIN_LEN 8/' /etc/login.defs
Copy after login

1.2 Set password complexity:

Using the command line tool
pam_pwquality, we can modify /etc/security/pwquality.confParameters in the file to set password complexity requirements. The following is a sample script:

#!/bin/bash
sed -i 's/^minlen.*$/minlen=8/' /etc/security/pwquality.conf
sed -i 's/^dcredit.*$/dcredit=-1/' /etc/security/pwquality.conf
sed -i 's/^ucredit.*$/ucredit=-1/' /etc/security/pwquality.conf
sed -i 's/^ocredit.*$/ocredit=-1/' /etc/security/pwquality.conf
sed -i 's/^lcredit.*$/lcredit=-1/' /etc/security/pwquality.conf
Copy after login

1.3 Set password validity period:

Using the command line tool
chage, we can view and modify the user's password validity period. The following is a sample script:

#!/bin/bash
# 查看用户的密码有效期
chage -l username
# 修改用户的密码有效期为30天
chage -M 30 username
Copy after login

2. Restrict users’ remote login

In order to reduce the risk of server intrusion, we can restrict users’ remote login permissions. Specifically, we can use the command line tool
sshd to configure the /etc/ssh/sshd_config file to restrict users' SSH login.

2.1 Disable root remote login:

By modifying the
/etc/ssh/sshd_config file, change the value of the PermitRootLogin field to no. The following is a sample script:

#!/bin/bash
sed -i 's/^PermitRootLogin.*$/PermitRootLogin no/' /etc/ssh/sshd_config
Copy after login

2.2 Limit the IP range for SSH login:

By modifying the
/etc/ssh/sshd_config file, use the AllowUsers field limit IP range that allows SSH login. The following is a sample script:

#!/bin/bash
echo "AllowUsers 192.168.1.0/24" >> /etc/ssh/sshd_config
Copy after login

3. Use firewall to protect the server

Firewall is an important part of protecting server security. We can use the command line tool
iptables to configure firewall rules.

3.1 Close unnecessary ports:

Use the
iptables command to close unnecessary ports on the server to provide better protection for the server. The following is a sample script:

#!/bin/bash
# 关闭80端口
iptables -A INPUT -p tcp --dport 80 -j DROP
Copy after login

3.2 Set ALLOW/DENY rules:

Use the
iptables command to set ALLOW/DENY rules to allow or deny access to specific IPs or IP ranges. The following is a sample script:

#!/bin/bash
# 允许192.168.1.100访问80端口
iptables -A INPUT -s 192.168.1.100 -p tcp --dport 80 -j ACCEPT
# 拒绝192.168.1.200访问22端口
iptables -A INPUT -s 192.168.1.200 -p tcp --dport 22 -j DROP
Copy after login

Conclusion:

This article introduces several commonly used command line tools to help administrators improve the security of Linux servers. By setting password policies, restricting users from logging in remotely, and using firewalls, we can effectively protect servers from the risk of attacks and data leaks. I hope readers can master these tools and apply them in practice to improve server security.

References:

None

The above is the detailed content of Improve Linux server security using command line tools. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

What computer configuration is required for vscode What computer configuration is required for vscode Apr 15, 2025 pm 09:48 PM

VS Code system requirements: Operating system: Windows 10 and above, macOS 10.12 and above, Linux distribution processor: minimum 1.6 GHz, recommended 2.0 GHz and above memory: minimum 512 MB, recommended 4 GB and above storage space: minimum 250 MB, recommended 1 GB and above other requirements: stable network connection, Xorg/Wayland (Linux)

Linux Architecture: Unveiling the 5 Basic Components Linux Architecture: Unveiling the 5 Basic Components Apr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

vscode terminal usage tutorial vscode terminal usage tutorial Apr 15, 2025 pm 10:09 PM

vscode built-in terminal is a development tool that allows running commands and scripts within the editor to simplify the development process. How to use vscode terminal: Open the terminal with the shortcut key (Ctrl/Cmd). Enter a command or run the script. Use hotkeys (such as Ctrl L to clear the terminal). Change the working directory (such as the cd command). Advanced features include debug mode, automatic code snippet completion, and interactive command history.

How to check the warehouse address of git How to check the warehouse address of git Apr 17, 2025 pm 01:54 PM

To view the Git repository address, perform the following steps: 1. Open the command line and navigate to the repository directory; 2. Run the "git remote -v" command; 3. View the repository name in the output and its corresponding address.

Where to write code in vscode Where to write code in vscode Apr 15, 2025 pm 09:54 PM

Writing code in Visual Studio Code (VSCode) is simple and easy to use. Just install VSCode, create a project, select a language, create a file, write code, save and run it. The advantages of VSCode include cross-platform, free and open source, powerful features, rich extensions, and lightweight and fast.

How to run java code in notepad How to run java code in notepad Apr 16, 2025 pm 07:39 PM

Although Notepad cannot run Java code directly, it can be achieved by using other tools: using the command line compiler (javac) to generate a bytecode file (filename.class). Use the Java interpreter (java) to interpret bytecode, execute the code, and output the result.

What is the main purpose of Linux? What is the main purpose of Linux? Apr 16, 2025 am 12:19 AM

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

vscode terminal command cannot be used vscode terminal command cannot be used Apr 15, 2025 pm 10:03 PM

Causes and solutions for the VS Code terminal commands not available: The necessary tools are not installed (Windows: WSL; macOS: Xcode command line tools) Path configuration is wrong (add executable files to PATH environment variables) Permission issues (run VS Code as administrator) Firewall or proxy restrictions (check settings, unrestrictions) Terminal settings are incorrect (enable use of external terminals) VS Code installation is corrupt (reinstall or update) Terminal configuration is incompatible (try different terminal types or commands) Specific environment variables are missing (set necessary environment variables)

See all articles