Linux network security skills (2)

Source: Internet
Author: User

Linux network security tips-alias file aliases

Edit the alias file/etc/aliases or/etc/mail/aliases) and remove/comment the following line.

 
 
  1. # Basic system aliases -- these MUST be present.  
  2.  
  3. MAILER-DAEMON: postmaster  
  4.  
  5. postmaster: root  
  6.  
  7. # General redirections for pseudo accounts.  
  8.  
  9. bin: root  
  10.  
  11. daemon: root  
  12.  
  13. #games: root ?remove or comment out.  
  14.  
  15. #ingres: root ?remove or comment out.  
  16.  
  17. nobody: root  
  18.  
  19. #system: root ?remove or comment out.  
  20.  
  21. #toor: root ?remove or comment out.  
  22.  
  23. #uucp: root ?remove or comment out.  
  24.  
  25. # Well-known aliases.  
  26.  
  27. #manager: root ?remove or comment out.  
  28.  
  29. #dumper: root ?remove or comment out.  
  30.  
  31. #operator: root ?remove or comment out.  
  32.  
  33. # trap decode to catch security attacks  
  34.  
  35. #decode: root  
  36.  
  37. # Person who should get roots mail  
  38.  
  39. #root: marc 

After the last update, do not forget to run/usr/bin/newaliases to make the change take effect.

Linux network security tips prevent your system from responding to any external/internal ping requests.

Since no one can ping your machine and receive a response, you can greatly enhance the security of your site. You can add the following command to/etc/rc. d/rc. local to run automatically after each startup.

Echo 1>/proc/sys/net/ipv4/icmp_echo_ignore_all

Linux network security tips do not show the operating system and version information.

If you want someone to remotely log on to your server without displaying the operating system and version information, you can change

The line in/etc/inetd. conf is as follows:

Telnet stream tcp nowait root/usr/sbin/tcpd in. telnetd-h

Add the-h sign to the end so that the telnet background does not display system information, but only login:

Linux network security tips: The/etc/host. conf file

Edit the host. conf file (vi/etc/host. conf) and add the following line:

 
 
  1. # Lookup names via DNS first then fall back to /etc/hosts.  
  2.  
  3. order bind,hosts  
  4.  
  5. # We don have machines with multiple IP addresses on the same card  
  6.  
  7. (like virtual server,IP Aliasing).  
  8.  
  9. multi off  
  10.  
  11. # Check for IP address spoofing.  
  12.  
  13. nospoof on  
  14.  
  15. IP Spoofing: IP-Spoofing is a security exploit that works by tricking  
  16.  
  17. computers in a trust relationship that you are someone that you really aren . 

Linux network security tips: The/etc/securetty file

This file specifies the tty device that allows root login./etc/securetty is read by the/bin/login program. Its format is a list of allowed names in a row, for example, you can edit/etc/securetty and comment out the following rows.

 
 
  1. tty1  
  2.  
  3. #tty2  
  4.  
  5. #tty3  
  6.  
  7. #tty4  
  8.  
  9. #tty5  
  10.  
  11. #tty6  
  12.  
  13. #tty7  
  14.  
  15. #tty8 

-This means that the root user is only allowed to log on to the tty1 terminal.

There are many other Linux network security skills that can effectively protect the security of Linux networks. We will introduce them in future articles. You can also learn more in the past articles.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.