Use pam chroot to restrict logon to users through SSH
Many netizens have written a lot of articles about how to use pam chroot to restrict remote login user access. However, there are still some problems, resulting in unavailability, it helps you learn how to use the pam_chroot module in ssh.The PAM mechanism in Linux is not described here. Only the implementatio
. analyze how people try to detect any port on your computer.
6. Restrict the CPU and memory of each service.
7. Activate account allocation.
The reason why I think chroot (in the non-Root Service) can play a protective role in the program is that if some people intrude into your computer, in the case of a non-root account, there is no file for them to use to enter the root, so the damage they cause to the broken area will be limited. Similarly, if mo
as a security defense line is,If the intruders get a non-root account but do not get the root permission for the files, they can only cause damage to the intruded areas.Moreover, if the root account is the owner of most files in the intrusion region, there are not many attacks for intruders. Apparently, if your account is compromised,There must be something wrong, but it is best to reduce the damage that intruders can cause.
Remember that what I did is not 100% correct. This is my first attempt
as a security defense line is,If the intruders get a non-root account but do not get the root permission for the files, they can only cause damage to the intruded areas.Moreover, if the root account is the owner of most files in the intrusion region, there are not many attacks for intruders. Apparently, if your account is compromised,There must be something wrong, but it is best to reduce the damage that intruders can cause.
Remember that what I did is not 100% correct. This is my first attempt
/nssdatabases20Passwd21Shadow22Group23Gshadow24Services25Protocols26Networks27Modify the ssh configuration of hosts3 so that common users can directly log on to the ssh environment through ssh. This function is supported after openssh 4.9. Add the following at the end of the configuration file: 1#/Etc/ssh/sshd_config2M
", so you can not run mkjailenv/var/chroot, run addjailsw/var/chroot-P httpd only, delete unnecessary files after chroot "prison" debugging, and modify unnecessary user information in/etc/passwd. As a result, most popular Web sites now use Apache + PHP + MySQL + SSL (FTP, mail, Perl, and other components may also exist ), therefore, a comprehensive Web "prison" c
mkjailenv can not be run./Var/chroot command, and only run addjailsw/var/chroot-PHttpd or delete unnecessary files after debugging chroot "prison" and modify unnecessary user information in/etc/passwd. As a result, most popular Web sites now use Apache + PHP + MySQL + SSL (FTP, mail, Perl, and other components may also exist ), therefore, a comprehensive Web "pr
/chroot-P Vi "-C q"
AddjailuserUsage: addjailuser chrootdir userdir usershell UsernamePurpose: Create a New chroot "prison" user.Number of shards:Chrootdir specifies the chroot "prison" path.Userdir? The user's main folder (relative to the chroot "prison" folder ).Usershell specifies the complete path of the shell used
, run addjailsw as follows:# Addjailsw/var/chroot-P Vi "-C q"
AddjailuserUsage: addjailuser chrootdir userdir usershell UsernamePurpose: Create a New chroot "prison" user.Number of shards:Chrootdir specifies the chroot "prison" path.Userdir? The user's main folder (relative to the chroot "prison" folder ).Usershell spe
Enabling SSH's powerful chroot capabilities
In previous versions of OpenSSH 4.8P1, to support Chroot, third-party modifications must be used. But since OpenSSH 4.8P1, the chroot functionality has been built-in, and can be set up directly on the server system (CentOS 5.5).
1, in order to ensure that the remote upgrade failed to connect to the server, t
We don't want the SSH Login User to browse the files in my system at will, just to fix the activity in the specified place for him. Environment: RedHatEnterpriseLinuxServerrelease6.2openssh requires 4.7p or later to create a login user that allows ssh [root @ localhost ~] # Useraddgao change the user's password [root @ localhost ~] # Passwd
We don't want the SSH
Http://www.cnblogs.com/yxwkf/p/3902433.html
The so-called "prison" means to change the root folder that a process can see through the chroot mechanism, to restrict a process to a specified folder, to ensure that the process can only act on the files of that folder and its subfolders, thus ensuring the security of the entire server.
Create Chroot "prison"
Once, the daemon on the unix/linux was started with
Using chroot to build a linux sandbox because an external website is mounted on the idc, idc permissions are generally not put out. Previously, we wanted to build an ftp for a user who logged on to the shell as binnologin, you can ssh to this directory to use git commands for code management, but you cannot use chroot to build linux sandbox for other directories
Using openssh to implement chroot to secure users who do not want to log on via SSH to browse the files in our system at will and only fix the activities in specified places. Environment: RedHatEnterpriseLinuxServerrelease6.2openssh requires a version 4.7p or later to create a version that allows ssh...
Using openssh to implement
PHP-FPM Chroot execution environment details, php-fpmchroot details. PHP-FPM Chroot execution environment detailed explanation, php-fpmchroot detailed explanation in the PHP-FPM set up chroot, has a good isolation effect, improve the system security, but to establish a reasonable PHP-FPMChr PHP-FPM Chroot execution env
In the PHP-FPM to set up chroot, has a good isolation function, improve the system security, but to establish a reasonable PHP-FPMChroot environment is a little difficult, than the use of debootstrap and other tools to build more trouble, this article introduces the Chroot execution environment of PHP-FPM in detail, the need of friends can refer to the next. In the PHP-FPM to set up
In the PHP-FPM to set up chroot, has a good isolation function, improve the system security, but to establish a reasonable PHP-FPMChroot environment is a little difficult, than the use of debootstrap and other tools to build more trouble, this article introduces the Chroot execution environment of PHP-FPM in detail, set up chroot in PHP-FPM, has a good isolation
PHP-FPM in the establishment of chroot, has a very good isolation, improve the security of the system, but to establish a reasonable PHP-FPM chroot environment is a bit more difficult, than the use of debootstrap and other tools to build more trouble, the following by reference to the relevant information, The php-fpm of the chroot implementation of the environme
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.