No matter which Linux distribution you use, you need to protect it with an iptables-based firewall.
Aha! You've set up your first Linux server and are ready to go! Is it? Well, wait.
By default, your Linux system is not secure enough from attackers. Sure, it's much more secure than Windows XP, but that doesn't mean much.
To make your Linux system truly stable, you need to follow Linode's Server Security Guide.
In general, first you must turn off those services that you do not need. Of course, to do this, you first need to know which network services you are using.
You can use the shell command to find out which services are:
netstat -tulpn
netstat will tell you what services are running and what ports those services are using. If you don't need a service or port, you should turn it off. For example, unless you are running a website, you do not need an Apache or Nginx server running, nor do you need to have port 80 or 8080 open.
In short, if you are not sure, just turn it off first.
On a simple Linux server without any additional changes, you will see SSH, RPC and NTPdate running on their public ports. Don't add an old and unsafe shell program like telnet, otherwise the old driver will drive away your Linux sports car without you noticing. Maybe you liked telnet as a backup login to your SunOS machine in the 1980s, but that's long gone.
For SSH, you should use RSA keys and Fail2Ban for hardening. Unless you need RPC, uninstall it - if you don't know you don't need it, you don't need it.
Enough about how to lock down; let’s talk about using iptables to lock down incoming traffic.
When you start a Linux server there are no rules. This means that all traffic is allowed. Of course this is bad. Therefore, you need to set up your firewall in time.
Iptables is a shell tool used to set network policy rules for netfilter. Netfilter is the default firewall under Linux systems. It uses a set of rules to allow or prohibit traffic. When someone tries to connect to your system - and some people try this all the time and never get discouraged - iptables checks to see if those requests match a list of rules. If no rule is matched, it takes the default action.
The default operation should be to "Drop" the connection, that is, to ban these intended intruders. And it doesn't let them know what's going on with these network probes. (You can also "Reject" the link, but that will also let them know that you have a running Linux firewall. For now, the less information that strangers can get into our systems, the better. At least, I I think so.)
Now, you can use iptables to set up your firewall. I've already done this. Like before, I rode my bike to work six miles away and it was uphill on both sides. And now, I drive there.
This is actually a metaphor for my use of FirewallD in the Fedora distribution and UFW (Uncomplicated Firewall) in the Debian distribution. These are easy-to-use shell front ends for iptables. You can find suitable usage in the following Linode guides: FirewallD and UFW.
Essentially setting these rules is to place a "no entry" sign on your server. Use it.
But don’t get too excited and close all the links. For example:
sudo ufw default deny incoming
Looks like a good idea. Don’t forget, it bans all links, including yours!
Great, that's what it does. This means it also disables SSH logins. This means that you can no longer log in to your new server. Wow!
However, if you make a mistake, more links will be banned by mistake. You see, the veteran driver is also blocked by you.
Or, to be more precise, this is not an isolated phenomenon experienced by you or your server. Of course, you're not the National Security Agency (NSA) who is subject to over 300 million attack attempts every day. But the attack script doesn't care who you are. It just continuously checks for servers with known vulnerabilities in the network. On a normal day my own little server would be hit by hundreds of attacks.
That’s it, what are you waiting for? Go ahead and harden your network services. Install FirewallD or UFW to harden your server. You will be willing to do it.
The above is the detailed content of Explore how to protect your Linux server. For more information, please follow other related articles on the PHP Chinese website!

linux设备节点是应用程序和设备驱动程序沟通的一个桥梁;设备节点被创建在“/dev”,是连接内核与用户层的枢纽,相当于硬盘的inode一样的东西,记录了硬件设备的位置和信息。设备节点使用户可以与内核进行硬件的沟通,读写设备以及其他的操作。

区别:1、open是UNIX系统调用函数,而fopen是ANSIC标准中的C语言库函数;2、open的移植性没fopen好;3、fopen只能操纵普通正规文件,而open可以操作普通文件、网络套接字等;4、open无缓冲,fopen有缓冲。

端口映射又称端口转发,是指将外部主机的IP地址的端口映射到Intranet中的一台计算机,当用户访问外网IP的这个端口时,服务器自动将请求映射到对应局域网内部的机器上;可以通过使用动态或固定的公共网络IP路由ADSL宽带路由器来实现。

在linux中,交叉编译是指在一个平台上生成另一个平台上的可执行代码,即编译源代码的平台和执行源代码编译后程序的平台是两个不同的平台。使用交叉编译的原因:1、目标系统没有能力在其上进行本地编译;2、有能力进行源代码编译的平台与目标平台不同。

在linux中,eof是自定义终止符,是“END Of File”的缩写;因为是自定义的终止符,所以eof就不是固定的,可以随意的设置别名,linux中按“ctrl+d”就代表eof,eof一般会配合cat命令用于多行文本输出,指文件末尾。

linux查询mac地址的方法:1、打开系统,在桌面中点击鼠标右键,选择“打开终端”;2、在终端中,执行“ifconfig”命令,查看输出结果,在输出信息第四行中紧跟“ether”单词后的字符串就是mac地址。

在linux中,可以利用“rpm -qa pcre”命令判断pcre是否安装;rpm命令专门用于管理各项套件,使用该命令后,若结果中出现pcre的版本信息,则表示pcre已经安装,若没有出现版本信息,则表示没有安装pcre。

在linux中,rpc是远程过程调用的意思,是Reomote Procedure Call的缩写,特指一种隐藏了过程调用时实际通信细节的IPC方法;linux中通过RPC可以充分利用非共享内存的多处理器环境,提高系统资源的利用率。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

SublimeText3 Linux new version
SublimeText3 Linux latest version

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version
Useful JavaScript development tools

SublimeText3 English version
Recommended: Win version, supports code prompts!
