差别

这里会显示出您选择的修订版和当前版本之间的差别。

到此差别页面的链接

两侧同时换到之前的修订记录前一修订版
后一修订版
前一修订版
it:server:保护 [2022-08-27 20:37] goldentianyait:server:保护 [2022-08-29 19:03] (当前版本) – [保护VPS] goldentianya
行 13: 行 13:
 <code> <code>
 sudo grep "Failed password for invalid user" /var/log/auth.log | awk '{print $13}' | sort | uniq -c | sort -nr | more sudo grep "Failed password for invalid user" /var/log/auth.log | awk '{print $13}' | sort | uniq -c | sort -nr | more
 +</code>
 +
 +3. 统计以root或者其它用户登录的次数
 +<code>
 +sudo grep "Failed password for root" /var/log/auth.log | wc -l
 +sudo grep "Failed password for invalid user" /var/log/auth.log | wc -l
 </code> </code>
  
行 21: 行 27:
   * <color #ff7f27>''%%sudo systemctl restart sshd%%''</color>   * <color #ff7f27>''%%sudo systemctl restart sshd%%''</color>
   * <color #ff7f27>''%%sudo service ssh restart%%''</color>   * <color #ff7f27>''%%sudo service ssh restart%%''</color>
 +
 +<code>
 +// 统计以 root 用户尝试登录到数量
 +sudo grep "Failed password for root" /var/log/auth.log | wc -l
 +// 统计以其它用户试登录到数量
 +sudo grep "Failed password for invalid user" /var/log/auth.log | wc -l
 +</code>
  
 <code> <code>
行 50: 行 63:
 如果依然可以密码登录,则是 <color #7092be>You can disable keyboard-interactive by setting KbdInteractiveAuthentication to "no"</color> 的原因。 如果依然可以密码登录,则是 <color #7092be>You can disable keyboard-interactive by setting KbdInteractiveAuthentication to "no"</color> 的原因。
  
-=== fail2ban ===+===== fail2ban =====
 安装 fail2ban 防止攻击 <color #ff7f27>''%%sudo apt-get install fail2ban%%''</color> (([[https://linux.cn/article-5067-1.html|为ssh服务器配置fail2ban]])) 安装 fail2ban 防止攻击 <color #ff7f27>''%%sudo apt-get install fail2ban%%''</color> (([[https://linux.cn/article-5067-1.html|为ssh服务器配置fail2ban]]))
  
 +检查状态 <color #ff7f27>''%%sudo iptables --list -n%%''</color>\\
 解锁ssh fail2ban-client set sshd unbanip <ip>\\ 解锁ssh fail2ban-client set sshd unbanip <ip>\\
 或者更改 /etc/fail2ban/jail.conf  文件,为某些IP设置白名单。 或者更改 /etc/fail2ban/jail.conf  文件,为某些IP设置白名单。
  
-添加对nginx 和 wordpress 的保护 mkdir -p /root/wwwlog+ 
 +添加对nginx 和 wordpress 的保护 mkdir -p /root/wwwlogs\\ 
 +然后重启服务  
 +  * service fail2ban restart  
 +  * fail2ban-client reload
 ++++ jail.local | ++++ jail.local |
 <code> <code>
行 64: 行 82:
 filter  = sshd filter  = sshd
 action  = iptables[name=SSH, port=26568, protocol=tcp] action  = iptables[name=SSH, port=26568, protocol=tcp]
-logpath = /var/log/secure+logpath = /var/log/fail2ban.log
  
 # HTTP 验证防暴力破解 # HTTP 验证防暴力破解
行 71: 行 89:
 filter  = nginx-http-auth filter  = nginx-http-auth
 port    = http,https port    = http,https
-logpath  = /root/wwwlogs/access.log+logpath  = /var/log/nginx/error.log
    
 #屏蔽恶意爬虫 #屏蔽恶意爬虫
行 78: 行 96:
 port    = http,https port    = http,https
 filter  = nginx-badbots filter  = nginx-badbots
-logpath  =  /root/wwwlogs/access.log+logpath  =  /var/log/nginx/error.log
 maxretry = 2 maxretry = 2
    
行 86: 行 104:
 port    = http,https port    = http,https
 filter  = nginx-nohome filter  = nginx-nohome
-logpath  =  /root/wwwlogs/access.log+logpath  =  /var/log/nginx/error.log
 maxretry = 2 maxretry = 2
    
行 94: 行 112:
 port    = http,https port    = http,https
 filter  = nginx-noproxy filter  = nginx-noproxy
-logpath  =  /root/wwwlogs/access.log+logpath  =  /var/log/nginx/error.log
 maxretry = 2 maxretry = 2
  
行 105: 行 123:
 findtime = 60 findtime = 60
 bantime = 43600 bantime = 43600
-logpath  =  /root/wwwlogs/access.log+logpath  =  /var/log/fail2ban.log
  
 #防止 WordPress 受到 xmlrpc.php CC 攻击 #防止 WordPress 受到 xmlrpc.php CC 攻击
行 112: 行 130:
 port = http,https port = http,https
 filter = xmlrpc filter = xmlrpc
-logpath  = /root/wwwlogs/access.log+logpath  = /var/log/fail2ban.log
 bantime = 43600 bantime = 43600
 maxretry = 1 maxretry = 1
it/server/保护.1661632624.txt.gz · 最后更改: 2022-08-27 20:37 由 goldentianya
回到顶部
CC Attribution-Share Alike 4.0 International
Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0