1. system security record files
Recording files in the operating system are important clues for detecting network intrusion. If your system is directly connected to the Internet, you find that many people try to telnet or FTP your system, you can run "# More/var/log/secure grep refused" to check the system for attacks, so as to take corresponding countermeasures, such as replacing Telnet/rlogin with SSH.
Ii. startup and login security
1. BIOS Security ixpub
Set the BIOS password and modify the boot sequence to disable system startup from a floppy disk.
2. User Password
The user password is a basic starting point for Linux security. The user password used by many people is too simple, which opens the door to the intruders, although theoretically speaking, as long as you have enough time and resources to use, there is no user password that cannot be cracked, but it is difficult to choose a proper password. A good user password is a string of characters that can only be easily remembered and understood by him, and should never be written anywhere.
3. Default Account
All default accounts that are started by the operating system itself and are not necessary should be prohibited. This should be done when you install the system for the first time. Linux provides many default accounts, and the more accounts, the more vulnerable the system is.
You can use the following command to delete an account.
[Root @ server/] # userdel User Name
Or use the following command to delete the group user account.
[Root @ server/] # groupdel Username
4. Password File
The chattr command adds unchangeable attributes to the following files to prevent unauthorized users from obtaining permissions.
[Root @ server/] # chattr + I/etc/passwd
[Root @ server/] # chattr + I/etc/shadow
[Root @ server/] # chattr + I/etc/group
[Root @ server/] # chattr + I/etc/gshadow
5. Disable Ctrl + ALT + Delete to restart the machine command.
Modify the/etc/inittab file and comment out the line "CA: ctrlaltdel:/sbin/shutdown-T3-R now. Then reset the permission for all files in the/etc/rc. d/init. d/directory and run the following command:
[Root @ server/] # chmod-r 700/etc/rc. d/init. d /*
In this way, only the root user can read, write, or execute all the above script files.
6. Restrict su commands
If you do not want anyone to use Su as the root user, you can edit the/etc/PAM. d/su file and add the following two lines:
Auth sufficient/lib/security/pam_rootok.so debug
Auth required/lib/security/pam_wheel.so group = ISD
In this case, only users in the ISD group can use Su as the root user. After that, if you want the user admin to Su as the root user, you can run the following command:
[Root @ server/] # usermod-G10 Admin
7. Delete logon information
By default, the logon prompt includes the Linux release, kernel version, and server host name. For a machine with high security requirements, too much information is leaked. You can edit/etc/rc. d/rc. Local to comment out the following lines of output system information.
# This will overwrite/etc/issue at every boot. So, make any changes you
# Want to make to/etc/issue here or you will lose them when you reboot.
# Echo ""/etc/issue
# Echo "$ R"/etc/issue
# Echo "kernel $ (uname-R) on $ A $ (uname-m)"/etc/issue
# Cp-F/etc/issue/etc/issue.net
# Echo "/etc/issue
Then, perform the following operations:
[Root @ server/] # rm-F/etc/issue
[Root @ server/] # rm-F/etc/issue.net
[Root @ server/] # Touch/etc/issue
[Root @ server/] # Touch/etc/issue.net
8. Set the GRUB Password
[Root @ server share] # grub-md5-crypt
Password: // enter the password
Retype password: // enter the password for confirmation
$1 $ llzdj/$ vxlsjlcr9vvwci/yrhppm0
Vim/boot/GRUB/grub. conf
Add a line: Password $1 $ llzdj/$ vxlsjlcr9vvwci/yrhppm0
3. restrict network access
1. for NFS access, if you use the NFS Network File System Service, make sure that your/etc/exports has the strictest access permission settings, that is to say, do not use any wildcard characters, do not allow root write permissions, and can only be installed as a read-only file system. Edit the/etc/exports file and add the following two lines.
/DIR/to/export host1.mydomain.com (RO, root_squash)
/DIR/to/export host2.mydomain.com (RO, root_squash)
/DIR/to/export is the directory you want to output, host.mydomain.com is the name of the machine that logs on to this directory, RO means to mount it into a read-only system, and root_squash prohibits root from writing it to this directory. To make the changes take effect, run the following command.
[Root @ server/] #/usr/sbin/exportfs-
2. inetd settings
First, make sure that the owner of/etc/inetd. conf is root and the File Permission is set to 600. After the settings are complete, run the "stat" command to check.
[Root @ server/] # chmod 600/etc/inetd. conf
Edit/etc/inetd. conf to disable the following services.
FTP Telnet shell login exec talk ntalk imap pop-2 Pop-3 finger auth
If you have installed ssh/SCP, you can disable Telnet/FTP. To make the change take effect, run the following command:
[Root @ server/] # killall-hup inetd
By default, most Linux systems allow all requests, and using TCP_WRAPPERS to enhance system security is a breeze. You can modify/etc/hosts. deny and/etc/hosts. allow to add access restrictions. For example, setting/etc/hosts. Deny to "all: All" can deny all access by default. Then add the allowed access to the/etc/hosts. allow file. For example, "sshd: 192.168.1.10/255.255.255.0 gate.openarch.com" indicates that the IP address 192.168.1.10 and the host name gate.openarch.com are allowed to be connected through SSH.
After the configuration is complete, you can use tcpdchk to check:
[Root @ server/] # tcpdchk
Tcpchk is a tcp_wrapper configuration check tool that checks your TCP Wrapper configuration and reports all detected potential/existing problems.
3. logon terminal settings
The/etc/securetty file specifies the tty device that allows root login.ProgramThe format is a list of permitted names. You can edit/etc/securetty and comment out the following rows.
# Tty1
# Tty2
# Tty3
# Tty4
# Tty5
# Tty6
In this case, root can only log on to the tty1 terminal.
4. Avoid Displaying System and version information.
If you want the remote login user to see the system and version information, you can change the/etc/inetd. conf file through the following operations:
Telnet stream tcp Nowait root/usr/sbin/tcpd in. telnetd-
-H indicates that Telnet does not display system information, but only displays "login :".
5. root users are not allowed to log on to the server.
[Root @ server/] # Vim/etc/ssh/sshd_config
Modify: permitrootlogin No
4. Prevent Attacks
1. Prevent ping. If no one can ping your system, the security will naturally increase.
[Root @ server/] # Vim/etc/sysctl. conf
Add: net. ipv4.icmp _ echo_ignore_all = 1
[Root @ server/] # sysctl-P
2. prevent IP Spoofing
Edit the host. conf file and add the following lines to prevent IP spoofing attacks.
Order bind, hosts
Multi off
Nospoof on
3. Prevent DoS Attacks
Setting resource limits for all users of the system can prevent DoS attacks. Such as the maximum number of processes and memory usage. For example
[Root @ server/] # Add the following lines to VIM/etc/security/limits. conf:
* Hard core 0
* Hard RSS 5000
* Hard nproc 20
Then, you must edit the/etc/PAM. d/login file to check whether the following row exists.
Session required/lib/security/pam_limits.so
The preceding command prohibits debugging files. The maximum number of processes is 50 and the memory usage is 5 MB.