{"id":51787,"date":"2024-12-03T14:11:00","date_gmt":"2024-12-03T06:11:00","guid":{"rendered":"https:\/\/fwq.ai\/blog\/51787\/"},"modified":"2024-12-03T14:11:00","modified_gmt":"2024-12-03T06:11:00","slug":"%e9%98%b2%e6%ad%a2%e5%a4%96%e9%83%a8%e6%94%bb%e5%87%bb%e8%80%85%e5%af%b9centos%e7%b3%bb%e7%bb%9f%e8%bf%9b%e8%a1%8c%e7%ab%af%e5%8f%a3%e6%89%ab%e6%8f%8f%e7%9a%84%e9%85%8d%e7%bd%ae%e6%96%b9%e6%b3%95","status":"publish","type":"post","link":"https:\/\/fwq.ai\/blog\/51787\/","title":{"rendered":"\u9632\u6b62\u5916\u90e8\u653b\u51fb\u8005\u5bf9CentOS\u7cfb\u7edf\u8fdb\u884c\u7aef\u53e3\u626b\u63cf\u7684\u914d\u7f6e\u65b9\u6cd5"},"content":{"rendered":"<p><b><\/b>     <\/p>\n<h1>\u9632\u6b62\u5916\u90e8\u653b\u51fb\u8005\u5bf9CentOS\u7cfb\u7edf\u8fdb\u884c\u7aef\u53e3\u626b\u63cf\u7684\u914d\u7f6e\u65b9\u6cd5<\/h1>\n<p>\u73cd\u60dc\u65f6\u95f4\uff0c\u52e4\u594b\u5b66\u4e60\uff01\u4eca\u5929\u7ed9\u5927\u5bb6\u5e26\u6765\uff0c\u6b63\u6587\u5185\u5bb9\u4e3b\u8981\u6d89\u53ca\u5230<span style=\"color: #FF6600;, Helvetica, Arial, sans-serif;font-size: 14px;background-color: #FFFFFF\"><\/span>\u7b49\u7b49\uff0c\u5982\u679c\u4f60\u6b63\u5728\u5b66\u4e60<span style=\"color: #FF6600;, Helvetica, Arial, sans-serif;font-size: 14px;background-color: #FFFFFF\">\u6587\u7ae0<\/span>\uff0c\u6216\u8005\u662f\u5bf9<span style=\"color: #FF6600;, Helvetica, Arial, sans-serif;font-size: 14px;background-color: #FFFFFF\">\u6587\u7ae0<\/span>\u6709\u7591\u95ee\uff0c\u6b22\u8fce\u5927\u5bb6\u5173\u6ce8\u6211\uff01\u540e\u9762\u6211\u4f1a\u6301\u7eed\u66f4\u65b0\u76f8\u5173\u5185\u5bb9\u7684\uff0c\u5e0c\u671b\u90fd\u80fd\u5e2e\u5230\u6b63\u5728\u5b66\u4e60\u7684\u5927\u5bb6\uff01<\/p>\n<p>\u5982\u4f55\u8bbe\u7f6eCentOS\u7cfb\u7edf\u4ee5\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u7684\u7aef\u53e3\u626b\u63cf<\/p>\n<p>\u6458\u8981\uff1a<br \/>\u968f\u7740\u4e92\u8054\u7f51\u7684\u4e0d\u65ad\u53d1\u5c55\uff0c\u7f51\u7edc\u5b89\u5168\u95ee\u9898\u8d8a\u6765\u8d8a\u7a81\u51fa\u3002\u5916\u90e8\u653b\u51fb\u8005\u7ecf\u5e38\u901a\u8fc7\u7aef\u53e3\u626b\u63cf\u6765\u5bfb\u627e\u7cfb\u7edf\u4e2d\u7684\u5b89\u5168\u6f0f\u6d1e\u3002\u4e3a\u4e86\u4fdd\u62a4\u6211\u4eec\u7684\u7cfb\u7edf\uff0c\u6211\u4eec\u9700\u8981\u91c7\u53d6\u63aa\u65bd\u6765\u963b\u6b62\u8fd9\u4e9b\u626b\u63cf\u3002\u672c\u6587\u5c06\u4ecb\u7ecd\u5982\u4f55\u8bbe\u7f6eCentOS\u7cfb\u7edf\u4ee5\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u7684\u7aef\u53e3\u626b\u63cf\uff0c\u5e76\u63d0\u4f9b\u4e86\u76f8\u5173\u7684\u4ee3\u7801\u793a\u4f8b\u3002<\/p>\n<p>\u4e00\u3001\u5b89\u88c5\u5e76\u914d\u7f6e\u9632\u706b\u5899<br \/>CentOS\u7cfb\u7edf\u81ea\u5e26\u4e86firewalld\u9632\u706b\u5899\uff0c\u6211\u4eec\u53ef\u4ee5\u901a\u8fc7\u914d\u7f6e\u9632\u706b\u5899\u6765\u9650\u5236\u5bf9\u7cfb\u7edf\u7684\u7aef\u53e3\u626b\u63cf\u3002<\/p>\n<p>1.\u5b89\u88c5firewalld\uff1a<br \/>sudo yum install firewalld<\/p>\n<p>2.\u542f\u52a8firewalld\u670d\u52a1\uff1a<br \/>sudo systemctl start firewalld<\/p>\n<p>3.\u8bbe\u7f6efirewalld\u5f00\u673a\u81ea\u542f\u52a8\uff1a<br \/>sudo systemctl enable firewalld<\/p>\n<p>4.\u67e5\u770bfirewalld\u72b6\u6001\uff1a<br \/>sudo firewall-cmd &#8211;state<\/p>\n<p>\u4e8c\u3001\u6dfb\u52a0\u7aef\u53e3\u89c4\u5219<br \/>\u6211\u4eec\u53ef\u4ee5\u4f7f\u7528firewalld\u547d\u4ee4\u6765\u6dfb\u52a0\u7aef\u53e3\u89c4\u5219\uff0c\u4ee5\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u7684\u7aef\u53e3\u626b\u63cf\u3002<\/p>\n<p>1.\u67e5\u770b\u7cfb\u7edf\u5f00\u653e\u7684\u7aef\u53e3\uff1a<br \/>sudo firewall-cmd &#8211;list-ports<\/p>\n<p>2.\u6dfb\u52a0\u5141\u8bb8\u8bbf\u95ee\u7684\u7aef\u53e3\uff1a<br \/>sudo firewall-cmd &#8211;add-port=80\/tcp &#8211;permanent<br \/>sudo firewall-cmd &#8211;add-port=443\/tcp &#8211;permanent<\/p>\n<p>3.\u79fb\u9664\u9ed8\u8ba4\u5f00\u653e\u7684\u7aef\u53e3\uff1a<br \/>sudo firewall-cmd &#8211;remove-service=http &#8211;permanent<br \/>sudo firewall-cmd &#8211;remove-service=https &#8211;permanent<\/p>\n<p>4.\u91cd\u65b0\u52a0\u8f7dfirewalld\u914d\u7f6e\uff1a<br \/>sudo firewall-cmd &#8211;reload<\/p>\n<p>\u4e09\u3001\u7981\u7528ICMP\u56de\u5e94<br \/>\u9664\u4e86\u9650\u5236\u7aef\u53e3\u8bbf\u95ee\uff0c\u6211\u4eec\u8fd8\u53ef\u4ee5\u7981\u7528ICMP\u56de\u5e94\uff0c\u8fd9\u6837\u53ef\u4ee5\u6709\u6548\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u8fdb\u884c\u5e38\u89c4\u7684ping\u626b\u63cf\u3002<\/p>\n<p>1.\u7981\u7528ICMP\u56de\u5e94\uff1a<br \/>sudo firewall-cmd &#8211;permanent &#8211;add-rich-rule=&#8217;rule protocol value=&#8221;icmp&#8221; drop&#8217;<\/p>\n<p>2.\u91cd\u65b0\u52a0\u8f7dfirewalld\u914d\u7f6e\uff1a<br \/>sudo firewall-cmd &#8211;reload<\/p>\n<p>\u56db\u3001\u5f00\u542fSYN Cookie\u4fdd\u62a4<br \/>SYN Cookie\u662f\u4e00\u79cd\u9632\u8303DoS\u548cDDoS\u653b\u51fb\u7684\u673a\u5236\uff0c\u901a\u8fc7\u5f00\u542fSYN Cookie\u4fdd\u62a4\uff0c\u6211\u4eec\u53ef\u4ee5\u6709\u6548\u9632\u6b62\u5916\u90e8\u653b\u51fb\u8005\u5bf9\u7cfb\u7edf\u8fdb\u884c\u7aef\u53e3\u626b\u63cf\u3002<\/p>\n<p>1.\u5f00\u542fSYN Cookie\u4fdd\u62a4\uff1a<br \/>sudo echo &#8220;net.ipv4.tcp_syncookies = 1&#8221; &gt;&gt; \/etc\/sysctl.conf<br \/>sudo sysctl -p<\/p>\n<p>2.\u91cd\u65b0\u52a0\u8f7dsysctl\u914d\u7f6e\uff1a<br \/>sudo sysctl &#8211;system<\/p>\n<p>\u4e94\u3001\u9650\u5236SSH\u8bbf\u95ee<br \/>SSH\u662f\u5916\u90e8\u653b\u51fb\u8005\u5e38\u7528\u7684\u5165\u4fb5\u624b\u6bb5\u4e4b\u4e00\uff0c\u6211\u4eec\u53ef\u4ee5\u901a\u8fc7\u9650\u5236SSH\u8bbf\u95ee\u6765\u51cf\u5c11\u7cfb\u7edf\u53d7\u5230\u653b\u51fb\u7684\u98ce\u9669\u3002<\/p>\n<p>1.\u7f16\u8f91SSH\u914d\u7f6e\u6587\u4ef6\uff1a<br \/>sudo vi \/etc\/ssh\/sshd_config<\/p>\n<p>2.\u5c06\u4ee5\u4e0b\u884c\u6ce8\u91ca\u53d6\u6d88\u5e76\u4fee\u6539\u4e3a\u6307\u5b9a\u7684\u7aef\u53e3\u548cIP\uff1a<\/p>\n<h1>Port 22<\/h1>\n<h1>PermitRootLogin yes<\/h1>\n<h1>PasswordAuthentication yes<\/h1>\n<h1>AllowUsers user_name@ip_address<\/h1>\n<p>3.\u4fdd\u5b58\u6587\u4ef6\u5e76\u91cd\u65b0\u542f\u52a8SSH\u670d\u52a1\uff1a<br \/>sudo service sshd restart<\/p>\n<p>\u516d\u3001\u76d1\u63a7\u7cfb\u7edf\u65e5\u5fd7<br \/>\u6700\u540e\uff0c\u6211\u4eec\u5e94\u8be5\u5b9a\u671f\u76d1\u63a7\u7cfb\u7edf\u7684\u65e5\u5fd7\uff0c\u4ee5\u4fbf\u53ca\u65f6\u53d1\u73b0\u5e76\u5e94\u5bf9\u53ef\u80fd\u7684\u653b\u51fb\u3002<\/p>\n<p>1.\u67e5\u770b\u7cfb\u7edf\u65e5\u5fd7\uff1a<br \/>sudo tail -f \/var\/log\/messages<\/p>\n<p>\u4ee3\u7801\u793a\u4f8b\uff1a<\/p>\n<p>1.\u6dfb\u52a0\u5141\u8bb880\u548c443\u7aef\u53e3\u8bbf\u95ee\u7684\u89c4\u5219\uff1a<br \/>sudo firewall-cmd &#8211;add-port=80\/tcp &#8211;permanent<br \/>sudo firewall-cmd &#8211;add-port=443\/tcp &#8211;permanent<\/p>\n<p>2.\u7981\u7528ICMP\u56de\u5e94\u7684\u793a\u4f8b\uff1a<br \/>sudo firewall-cmd &#8211;permanent &#8211;add-rich-rule=&#8217;rule protocol value=&#8221;icmp&#8221; drop&#8217;<\/p>\n<p>3.\u5f00\u542fSYN Cookie\u4fdd\u62a4\u7684\u793a\u4f8b\uff1a<br \/>sudo echo &#8220;net.ipv4.tcp_syncookies = 1&#8221; &gt;&gt; \/etc\/sysctl.conf<br \/>sudo sysctl -p<\/p>\n<p>\u603b\u7ed3\uff1a<br \/>\u901a\u8fc7\u5b89\u88c5\u5e76\u914d\u7f6e\u9632\u706b\u5899\u3001\u6dfb\u52a0\u7aef\u53e3\u89c4\u5219\u3001\u7981\u7528ICMP\u56de\u5e94\u3001\u5f00\u542fSYN Cookie\u4fdd\u62a4\u548c\u9650\u5236SSH\u8bbf\u95ee\u7b49\u63aa\u65bd\uff0c\u6211\u4eec\u53ef\u4ee5\u6709\u6548\u5730\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u7684\u7aef\u53e3\u626b\u63cf\uff0c\u63d0\u9ad8\u7cfb\u7edf\u7684\u5b89\u5168\u6027\u3002\u540c\u65f6\uff0c\u6211\u4eec\u4e5f\u5e94\u8be5\u5b9a\u671f\u76d1\u63a7\u7cfb\u7edf\u65e5\u5fd7\uff0c\u53ca\u65f6\u53d1\u73b0\u5e76\u5e94\u5bf9\u6f5c\u5728\u7684\u653b\u51fb\u3002\u53ea\u6709\u7efc\u5408\u8fd0\u7528\u5404\u79cd\u5b89\u5168\u63aa\u65bd\uff0c\u6211\u4eec\u624d\u80fd\u66f4\u597d\u5730\u4fdd\u62a4\u6211\u4eec\u7684\u7cfb\u7edf\u514d\u53d7\u5916\u90e8\u653b\u51fb\u7684\u5a01\u80c1\u3002<\/p>\n<p>\u4eca\u5929\u5173\u4e8e\u300a\u9632\u6b62\u5916\u90e8\u653b\u51fb\u8005\u5bf9CentOS\u7cfb\u7edf\u8fdb\u884c\u7aef\u53e3\u626b\u63cf\u7684\u914d\u7f6e\u65b9\u6cd5\u300b\u7684\u5185\u5bb9\u5c31\u4ecb\u7ecd\u5230\u8fd9\u91cc\u4e86\uff0c\u662f\u4e0d\u662f\u5b66\u8d77\u6765\u4e00\u76ee\u4e86\u7136\uff01\u60f3\u8981\u4e86\u89e3\u66f4\u591a\u5173\u4e8e\u7aef\u53e3\u626b\u63cf,\u9632\u5fa1,CentOS\u7684\u5185\u5bb9\u8bf7\u5173\u6ce8\u7c73\u4e91\u516c\u4f17\u53f7\uff01<\/p>\n<dl>\n<dt><\/dt>\n<dd>\n   PHP\u5f00\u53d1\u5546\u57ce\u4e2d\u7528\u6237\u8d26\u53f7\u5b89\u5168\u627e\u56de\u529f\u80fd\u7684\u5b9e\u73b0\u65b9\u6cd5\n <\/dd>\n<\/dl>\n","protected":false},"excerpt":{"rendered":"<p>\u9632\u6b62\u5916\u90e8\u653b\u51fb\u8005\u5bf9CentOS\u7cfb\u7edf\u8fdb\u884c\u7aef\u53e3\u626b\u63cf\u7684\u914d\u7f6e\u65b9\u6cd5 \u73cd\u60dc\u65f6\u95f4\uff0c\u52e4\u594b\u5b66\u4e60\uff01\u4eca\u5929\u7ed9\u5927\u5bb6\u5e26\u6765\uff0c\u6b63\u6587\u5185\u5bb9\u4e3b\u8981\u6d89\u53ca\u5230\u7b49\u7b49\uff0c\u5982\u679c\u4f60\u6b63\u5728\u5b66\u4e60\u6587\u7ae0\uff0c\u6216\u8005\u662f\u5bf9\u6587\u7ae0\u6709\u7591\u95ee\uff0c\u6b22\u8fce\u5927\u5bb6\u5173\u6ce8\u6211\uff01\u540e\u9762\u6211\u4f1a\u6301\u7eed\u66f4\u65b0\u76f8\u5173\u5185\u5bb9\u7684\uff0c\u5e0c\u671b\u90fd\u80fd\u5e2e\u5230\u6b63\u5728\u5b66\u4e60\u7684\u5927\u5bb6\uff01 \u5982\u4f55\u8bbe\u7f6eCentOS\u7cfb\u7edf\u4ee5\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u7684\u7aef\u53e3\u626b\u63cf \u6458\u8981\uff1a\u968f\u7740\u4e92\u8054\u7f51\u7684\u4e0d\u65ad\u53d1\u5c55\uff0c\u7f51\u7edc\u5b89\u5168\u95ee\u9898\u8d8a\u6765\u8d8a\u7a81\u51fa\u3002\u5916\u90e8\u653b\u51fb\u8005\u7ecf\u5e38\u901a\u8fc7\u7aef\u53e3\u626b\u63cf\u6765\u5bfb\u627e\u7cfb\u7edf\u4e2d\u7684\u5b89\u5168\u6f0f\u6d1e\u3002\u4e3a\u4e86\u4fdd\u62a4\u6211\u4eec\u7684\u7cfb\u7edf\uff0c\u6211\u4eec\u9700\u8981\u91c7\u53d6\u63aa\u65bd\u6765\u963b\u6b62\u8fd9\u4e9b\u626b\u63cf\u3002\u672c\u6587\u5c06\u4ecb\u7ecd\u5982\u4f55\u8bbe\u7f6eCentOS\u7cfb\u7edf\u4ee5\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u7684\u7aef\u53e3\u626b\u63cf\uff0c\u5e76\u63d0\u4f9b\u4e86\u76f8\u5173\u7684\u4ee3\u7801\u793a\u4f8b\u3002 \u4e00\u3001\u5b89\u88c5\u5e76\u914d\u7f6e\u9632\u706b\u5899CentOS\u7cfb\u7edf\u81ea\u5e26\u4e86firewalld\u9632\u706b\u5899\uff0c\u6211\u4eec\u53ef\u4ee5\u901a\u8fc7\u914d\u7f6e\u9632\u706b\u5899\u6765\u9650\u5236\u5bf9\u7cfb\u7edf\u7684\u7aef\u53e3\u626b\u63cf\u3002 1.\u5b89\u88c5firewalld\uff1asudo yum install firewalld 2.\u542f\u52a8firewalld\u670d\u52a1\uff1asudo systemctl start firewalld 3.\u8bbe\u7f6efirewalld\u5f00\u673a\u81ea\u542f\u52a8\uff1asudo systemctl enable firewalld 4.\u67e5\u770bfirewalld\u72b6\u6001\uff1asudo firewall-cmd &#8211;state \u4e8c\u3001\u6dfb\u52a0\u7aef\u53e3\u89c4\u5219\u6211\u4eec\u53ef\u4ee5\u4f7f\u7528firewalld\u547d\u4ee4\u6765\u6dfb\u52a0\u7aef\u53e3\u89c4\u5219\uff0c\u4ee5\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u7684\u7aef\u53e3\u626b\u63cf\u3002 1.\u67e5\u770b\u7cfb\u7edf\u5f00\u653e\u7684\u7aef\u53e3\uff1asudo firewall-cmd &#8211;list-ports 2.\u6dfb\u52a0\u5141\u8bb8\u8bbf\u95ee\u7684\u7aef\u53e3\uff1asudo firewall-cmd &#8211;add-port=80\/tcp &#8211;permanentsudo firewall-cmd &#8211;add-port=443\/tcp &#8211;permanent 3.\u79fb\u9664\u9ed8\u8ba4\u5f00\u653e\u7684\u7aef\u53e3\uff1asudo firewall-cmd &#8211;remove-service=http &#8211;permanentsudo firewall-cmd &#8211;remove-service=https &#8211;permanent 4.\u91cd\u65b0\u52a0\u8f7dfirewalld\u914d\u7f6e\uff1asudo firewall-cmd &#8211;reload \u4e09\u3001\u7981\u7528ICMP\u56de\u5e94\u9664\u4e86\u9650\u5236\u7aef\u53e3\u8bbf\u95ee\uff0c\u6211\u4eec\u8fd8\u53ef\u4ee5\u7981\u7528ICMP\u56de\u5e94\uff0c\u8fd9\u6837\u53ef\u4ee5\u6709\u6548\u963b\u6b62\u5916\u90e8\u653b\u51fb\u8005\u8fdb\u884c\u5e38\u89c4\u7684ping\u626b\u63cf\u3002 1.\u7981\u7528ICMP\u56de\u5e94\uff1asudo firewall-cmd &#8211;permanent &#8211;add-rich-rule=&#8217;rule protocol value=&#8221;icmp&#8221; drop&#8217; 2.\u91cd\u65b0\u52a0\u8f7dfirewalld\u914d\u7f6e\uff1asudo firewall-cmd &#8211;reload \u56db\u3001\u5f00\u542fSYN Cookie\u4fdd\u62a4SYN Cookie\u662f\u4e00\u79cd\u9632\u8303DoS\u548cDDoS\u653b\u51fb\u7684\u673a\u5236\uff0c\u901a\u8fc7\u5f00\u542fSYN [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-51787","post","type-post","status-publish","format-standard","hentry","category-os"],"_links":{"self":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts\/51787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/comments?post=51787"}],"version-history":[{"count":0,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts\/51787\/revisions"}],"wp:attachment":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/media?parent=51787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/categories?post=51787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/tags?post=51787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}