{"id":61731,"date":"2025-04-29T09:20:25","date_gmt":"2025-04-29T01:20:25","guid":{"rendered":"https:\/\/fwq.ai\/blog\/61731\/"},"modified":"2025-04-29T09:20:25","modified_gmt":"2025-04-29T01:20:25","slug":"%e5%a6%82%e4%bd%95%e4%bf%9d%e6%8a%a4centos%e6%9c%8d%e5%8a%a1%e5%99%a8%e5%85%8d%e5%8f%97%e7%bd%91%e7%bb%9c%e6%94%bb%e5%87%bb-2","status":"publish","type":"post","link":"https:\/\/fwq.ai\/blog\/61731\/","title":{"rendered":"\u5982\u4f55\u4fdd\u62a4CentOS\u670d\u52a1\u5668\u514d\u53d7\u7f51\u7edc\u653b\u51fb"},"content":{"rendered":"<p>\u5982\u4f55\u4fdd\u62a4centos\u670d\u52a1\u5668\u514d\u53d7\u7f51\u7edc\u653b\u51fb<\/p>\n<p>\u73b0\u5982\u4eca\uff0c\u7f51\u7edc\u5b89\u5168\u95ee\u9898\u53d8\u5f97\u65e5\u76ca\u4e25\u91cd\uff0c\u670d\u52a1\u5668\u5b89\u5168\u662f\u7f51\u7ad9\u548c\u5e94\u7528\u7a0b\u5e8f\u8fd0\u884c\u7684\u5173\u952e\u8981\u7d20\u4e4b\u4e00\u3002\u672c\u6587\u5c06\u4ecb\u7ecd\u5982\u4f55\u4fdd\u62a4centos\u670d\u52a1\u5668\u514d\u53d7\u7f51\u7edc\u653b\u51fb\uff0c\u5e76\u63d0\u4f9b\u4e00\u4e9b\u5177\u4f53\u7684\u4ee3\u7801\u793a\u4f8b\u3002<\/p>\n<ol>\n<li>\u53ca\u65f6\u66f4\u65b0\u7cfb\u7edf\u8865\u4e01<br \/>\u670d\u52a1\u5668\u64cd\u4f5c\u7cfb\u7edf\u548c\u8f6f\u4ef6\u7684\u6f0f\u6d1e\u662f\u9ed1\u5ba2\u653b\u51fb\u7684\u5e38\u89c1\u5165\u53e3\u4e4b\u4e00\u3002\u4e3a\u4e86\u4fdd\u62a4\u670d\u52a1\u5668\u514d\u53d7\u5df2\u77e5\u6f0f\u6d1e\u7684\u653b\u51fb\uff0c\u53ca\u65f6\u66f4\u65b0\u7cfb\u7edf\u8865\u4e01\u662f\u975e\u5e38\u91cd\u8981\u7684\u3002<\/li>\n<\/ol>\n<p>\u5728CentOS\u4e0a\uff0c\u53ef\u4ee5\u4f7f\u7528\u4ee5\u4e0b\u547d\u4ee4\u66f4\u65b0\u7cfb\u7edf\u8f6f\u4ef6\u5305\uff1a<\/p>\n<pre>sudo yum update<\/pre>\n<p>  \u767b\u5f55\u540e\u590d\u5236   <\/p>\n<ol>\n<li>\u5b89\u88c5\u9632\u706b\u5899<br \/>\u9632\u706b\u5899\u53ef\u4ee5\u63a7\u5236\u8fdb\u51fa\u670d\u52a1\u5668\u7684\u7f51\u7edc\u6d41\u91cf\uff0c\u9632\u6b62\u672a\u7ecf\u6388\u6743\u7684\u8bbf\u95ee\u3002CentOS\u9ed8\u8ba4\u4f7f\u7528\u7684\u9632\u706b\u5899\u662ffirewalld\u3002\u4ee5\u4e0b\u662f\u4e00\u4e9b\u5e38\u7528\u7684\u547d\u4ee4\uff1a<\/li>\n<\/ol>\n<pre># \u68c0\u67e5\u9632\u706b\u5899\u72b6\u6001\nsudo systemctl status firewalld\n\n# \u542f\u52a8\u9632\u706b\u5899\nsudo systemctl start firewalld\n\n# \u505c\u6b62\u9632\u706b\u5899\nsudo systemctl stop firewalld\n\n# \u5f00\u673a\u542f\u52a8\u9632\u706b\u5899\nsudo systemctl enable firewalld\n\n# \u5173\u95ed\u5f00\u673a\u542f\u52a8\nsudo systemctl disable firewalld\n\n# \u5f00\u542f\u7aef\u53e3\nsudo firewall-cmd --zone=public --add-port=80\/tcp --permanent\n\n# \u91cd\u65b0\u52a0\u8f7d\u89c4\u5219\nsudo firewall-cmd --reload<\/pre>\n<p>  \u767b\u5f55\u540e\u590d\u5236   <\/p>\n<ol>\n<li>\u914d\u7f6eSSH\u5b89\u5168<br \/>SSH\u662f\u8fdc\u7a0b\u7ba1\u7406\u670d\u52a1\u7684\u5e38\u7528\u5de5\u5177\uff0c\u540c\u65f6\u4e5f\u662f\u9ed1\u5ba2\u653b\u51fb\u7684\u4e3b\u8981\u76ee\u6807\u3002\u4ee5\u4e0b\u662f\u4e00\u4e9b\u52a0\u5f3aSSH\u5b89\u5168\u6027\u7684\u63aa\u65bd\uff1a<\/li>\n<\/ol>\n<ul>\n<li>\u7981\u7528SSH\u7684root\u767b\u5f55\uff1a<br \/>\u4f7f\u7528\u666e\u901a\u7528\u6237\u767b\u5f55\u670d\u52a1\u5668\uff0c\u518d\u4f7f\u7528su\u547d\u4ee4\u5207\u6362\u5230root\u7528\u6237\u8fdb\u884c\u7ba1\u7406\u64cd\u4f5c\u3002<\/li>\n<li>\u4fee\u6539\u9ed8\u8ba4SSH\u7aef\u53e3\uff1a<br \/>\u9ed1\u5ba2\u901a\u5e38\u4f1a\u626b\u63cf\u670d\u52a1\u5668\u9ed8\u8ba4\u768422\u7aef\u53e3\uff0c\u5c06SSH\u7aef\u53e3\u4fee\u6539\u4e3a\u975e\u5e38\u7528\u7aef\u53e3\u53ef\u4ee5\u589e\u52a0\u5b89\u5168\u6027\u3002<\/li>\n<li>\u4f7f\u7528\u5bc6\u94a5\u767b\u5f55\uff1a<br \/>\u5bc6\u94a5\u767b\u5f55\u76f8\u6bd4\u4e8e\u5bc6\u7801\u767b\u5f55\u66f4\u52a0\u5b89\u5168\uff0c\u53ef\u4ee5\u4f7f\u7528SSH\u5bc6\u94a5\u5bf9\u6765\u5b9e\u73b0\u3002\u4ee5\u4e0b\u662f\u5bc6\u94a5\u751f\u6210\u548c\u914d\u7f6e\u7684\u6b65\u9aa4\uff1a<\/li>\n<\/ul>\n<pre># \u751f\u6210\u5bc6\u94a5\u5bf9\nssh-keygen -t rsa\n\n# \u590d\u5236\u516c\u94a5\u5230\u670d\u52a1\u5668\nssh-copy-id user@server\n\n# \u4fee\u6539SSH\u914d\u7f6e\u6587\u4ef6\nsudo vi \/etc\/ssh\/sshd_config\n\u5c06\u4ee5\u4e0b\u884c\u4fee\u6539\u6216\u6dfb\u52a0\u4e3a\uff1a\nPasswordAuthentication no\nPubkeyAuthentication yes<\/pre>\n<p>  \u767b\u5f55\u540e\u590d\u5236   <\/p>\n<ul>\n<li>\u914d\u7f6eSSH\u767b\u5f55\u5931\u8d25\u6b21\u6570\u9650\u5236\uff1a<br \/>\u9ed1\u5ba2\u5e38\u5e38\u5c1d\u8bd5\u4f7f\u7528\u66b4\u529b\u7834\u89e3\u65b9\u5f0f\u767b\u5f55SSH\uff0c\u901a\u8fc7\u9650\u5236\u767b\u5f55\u5931\u8d25\u6b21\u6570\u53ef\u4ee5\u51cf\u8f7b\u98ce\u9669\u3002\u4ee5\u4e0b\u662f\u4e00\u4e2a\u4f8b\u5b50\uff1a<\/li>\n<\/ul>\n<pre># \u4fee\u6539SSH\u914d\u7f6e\u6587\u4ef6\nsudo vi \/etc\/ssh\/sshd_config\n\u5c06\u4ee5\u4e0b\u884c\u4fee\u6539\u6216\u6dfb\u52a0\u4e3a\uff1a\nMaxAuthTries 3<\/pre>\n<p>  \u767b\u5f55\u540e\u590d\u5236   <\/p>\n<ol>\n<li>\u4f7f\u7528\u5b89\u5168\u534f\u8bae\u548c\u52a0\u5bc6\u8fde\u63a5<br \/>\u4f7f\u7528HTTPS\u534f\u8bae\u548cSSL\/TLS\u8bc1\u4e66\u4e3a\u7f51\u7ad9\u63d0\u4f9b\u52a0\u5bc6\u8fde\u63a5\uff0c\u53ef\u4ee5\u4fdd\u969c\u6570\u636e\u7684\u5b89\u5168\u6027\u3002\u4ee5\u4e0b\u662f\u4e00\u4e2a\u914d\u7f6eNginx\u670d\u52a1\u5668\u4f7f\u7528HTTPS\u7684\u793a\u4f8b\uff1a<\/li>\n<\/ol>\n<pre># \u5b89\u88c5Nginx\nsudo yum install nginx\n\n# \u751f\u6210SSL\u8bc1\u4e66\nsudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout \/etc\/nginx\/nginx.key -out \/etc\/nginx\/nginx.crt\n\n# \u914d\u7f6eNginx\nsudo vi \/etc\/nginx\/conf.d\/default.conf\n\u5c06\u4ee5\u4e0b\u884c\u4fee\u6539\u6216\u6dfb\u52a0\u4e3a\uff1a\nserver {\n  listen 443 ssl;\n  ssl_certificate \/etc\/nginx\/nginx.crt;\n  ssl_certificate_key \/etc\/nginx\/nginx.key;\n  ...\n}\n\n# \u91cd\u542fNginx\nsudo systemctl restart nginx<\/pre>\n<p>  \u767b\u5f55\u540e\u590d\u5236   <\/p>\n<ol>\n<li>\u5b89\u88c5\u5165\u4fb5\u68c0\u6d4b\u7cfb\u7edf<br \/>\u5165\u4fb5\u68c0\u6d4b\u7cfb\u7edf\uff08Intrusion Detection System\uff0c\u7b80\u79f0IDS\uff09\u53ef\u4ee5\u76d1\u63a7\u670d\u52a1\u5668\u4e0a\u7684\u5f02\u5e38\u884c\u4e3a\u548c\u6076\u610f\u6d3b\u52a8\uff0c\u5e76\u53ca\u65f6\u91c7\u53d6\u76f8\u5e94\u7684\u63aa\u65bd\u3002\u4ee5\u4e0b\u662f\u4e00\u4e2a\u793a\u4f8b\uff0c\u4f7f\u7528Snort\u4f5c\u4e3aIDS\uff1a<\/li>\n<\/ol>\n<pre># \u5b89\u88c5Snort\nsudo yum install epel-release -y\nsudo yum install snort -y\n\n# \u914d\u7f6eSnort\nsudo vi \/etc\/snort\/snort.conf\n\u8fdb\u884c\u5fc5\u8981\u7684\u914d\u7f6e\uff0c\u5982\u7f51\u7edcIP\u3001\u89c4\u5219\u6587\u4ef6\u7b49\u3002\n\n# \u542f\u52a8Snort\nsudo snort -d -c \/etc\/snort\/snort.conf<\/pre>\n<p>  \u767b\u5f55\u540e\u590d\u5236   <\/p>\n<p>\u7efc\u4e0a\u6240\u8ff0\uff0c\u4fdd\u62a4CentOS\u670d\u52a1\u5668\u514d\u53d7\u7f51\u7edc\u653b\u51fb\u662f\u4e00\u4e2a\u591a\u65b9\u9762\u7684\u5de5\u4f5c\u3002\u53ea\u6709\u7efc\u5408\u4f7f\u7528\u591a\u79cd\u5b89\u5168\u63aa\u65bd\uff0c\u624d\u80fd\u66f4\u597d\u5730\u4fdd\u62a4\u670d\u52a1\u5668\u5b89\u5168\u3002\u6700\u91cd\u8981\u7684\u662f\u8981\u53ca\u65f6\u66f4\u65b0\u7cfb\u7edf\u3001\u5b89\u88c5\u9632\u706b\u5899\u3001\u52a0\u56faSSH\u548c\u4f7f\u7528\u5b89\u5168\u534f\u8bae\u3002\u914d\u5408\u5b89\u88c5\u5165\u4fb5\u68c0\u6d4b\u7cfb\u7edf\uff0c\u80fd\u591f\u53ca\u65f6\u53d1\u73b0\u5f02\u5e38\u884c\u4e3a\u5e76\u505a\u51fa\u76f8\u5e94\u54cd\u5e94\u3002\u4ee5\u4e0a\u63d0\u4f9b\u7684\u793a\u4f8b\u4ee3\u7801\u53ef\u4ee5\u5e2e\u52a9\u60a8\u66f4\u597d\u5730\u5b9e\u65bd\u8fd9\u4e9b\u5b89\u5168\u63aa\u65bd\u3002<\/p>\n<p>\u4ee5\u4e0a\u5c31\u662f\u5982\u4f55\u4fdd\u62a4CentOS\u670d\u52a1\u5668\u514d\u53d7\u7f51\u7edc\u653b\u51fb\u7684\u8be6\u7ec6\u5185\u5bb9\uff0c\u66f4\u591a\u8bf7\u5173\u6ce8FDCServers\u5176\u5b83\u76f8\u5173\u6587\u7ae0\uff01<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5982\u4f55\u4fdd\u62a4centos\u670d\u52a1\u5668\u514d\u53d7\u7f51\u7edc\u653b\u51fb \u73b0\u5982\u4eca\uff0c\u7f51\u7edc\u5b89\u5168\u95ee\u9898\u53d8\u5f97\u65e5\u76ca\u4e25\u91cd\uff0c\u670d\u52a1\u5668\u5b89\u5168\u662f\u7f51\u7ad9\u548c\u5e94\u7528\u7a0b\u5e8f\u8fd0\u884c\u7684\u5173\u952e\u8981\u7d20\u4e4b\u4e00\u3002\u672c\u6587\u5c06\u4ecb\u7ecd\u5982\u4f55\u4fdd\u62a4centos\u670d\u52a1\u5668\u514d\u53d7\u7f51\u7edc\u653b\u51fb\uff0c\u5e76\u63d0\u4f9b\u4e00\u4e9b\u5177\u4f53\u7684\u4ee3\u7801\u793a\u4f8b\u3002 \u53ca\u65f6\u66f4\u65b0\u7cfb\u7edf\u8865\u4e01\u670d\u52a1\u5668\u64cd\u4f5c\u7cfb\u7edf\u548c\u8f6f\u4ef6\u7684\u6f0f\u6d1e\u662f\u9ed1\u5ba2\u653b\u51fb\u7684\u5e38\u89c1\u5165\u53e3\u4e4b\u4e00\u3002\u4e3a\u4e86\u4fdd\u62a4\u670d\u52a1\u5668\u514d\u53d7\u5df2\u77e5\u6f0f\u6d1e\u7684\u653b\u51fb\uff0c\u53ca\u65f6\u66f4\u65b0\u7cfb\u7edf\u8865\u4e01\u662f\u975e\u5e38\u91cd\u8981\u7684\u3002 \u5728CentOS\u4e0a\uff0c\u53ef\u4ee5\u4f7f\u7528\u4ee5\u4e0b\u547d\u4ee4\u66f4\u65b0\u7cfb\u7edf\u8f6f\u4ef6\u5305\uff1a sudo yum update \u767b\u5f55\u540e\u590d\u5236 \u5b89\u88c5\u9632\u706b\u5899\u9632\u706b\u5899\u53ef\u4ee5\u63a7\u5236\u8fdb\u51fa\u670d\u52a1\u5668\u7684\u7f51\u7edc\u6d41\u91cf\uff0c\u9632\u6b62\u672a\u7ecf\u6388\u6743\u7684\u8bbf\u95ee\u3002CentOS\u9ed8\u8ba4\u4f7f\u7528\u7684\u9632\u706b\u5899\u662ffirewalld\u3002\u4ee5\u4e0b\u662f\u4e00\u4e9b\u5e38\u7528\u7684\u547d\u4ee4\uff1a # \u68c0\u67e5\u9632\u706b\u5899\u72b6\u6001 sudo systemctl status firewalld # \u542f\u52a8\u9632\u706b\u5899 sudo systemctl start firewalld # \u505c\u6b62\u9632\u706b\u5899 sudo systemctl stop firewalld # \u5f00\u673a\u542f\u52a8\u9632\u706b\u5899 sudo systemctl enable firewalld # \u5173\u95ed\u5f00\u673a\u542f\u52a8 sudo systemctl disable firewalld # \u5f00\u542f\u7aef\u53e3 sudo firewall-cmd &#8211;zone=public &#8211;add-port=80\/tcp &#8211;permanent # \u91cd\u65b0\u52a0\u8f7d\u89c4\u5219 sudo firewall-cmd &#8211;reload \u767b\u5f55\u540e\u590d\u5236 \u914d\u7f6eSSH\u5b89\u5168SSH\u662f\u8fdc\u7a0b\u7ba1\u7406\u670d\u52a1\u7684\u5e38\u7528\u5de5\u5177\uff0c\u540c\u65f6\u4e5f\u662f\u9ed1\u5ba2\u653b\u51fb\u7684\u4e3b\u8981\u76ee\u6807\u3002\u4ee5\u4e0b\u662f\u4e00\u4e9b\u52a0\u5f3aSSH\u5b89\u5168\u6027\u7684\u63aa\u65bd\uff1a \u7981\u7528SSH\u7684root\u767b\u5f55\uff1a\u4f7f\u7528\u666e\u901a\u7528\u6237\u767b\u5f55\u670d\u52a1\u5668\uff0c\u518d\u4f7f\u7528su\u547d\u4ee4\u5207\u6362\u5230root\u7528\u6237\u8fdb\u884c\u7ba1\u7406\u64cd\u4f5c\u3002 \u4fee\u6539\u9ed8\u8ba4SSH\u7aef\u53e3\uff1a\u9ed1\u5ba2\u901a\u5e38\u4f1a\u626b\u63cf\u670d\u52a1\u5668\u9ed8\u8ba4\u768422\u7aef\u53e3\uff0c\u5c06SSH\u7aef\u53e3\u4fee\u6539\u4e3a\u975e\u5e38\u7528\u7aef\u53e3\u53ef\u4ee5\u589e\u52a0\u5b89\u5168\u6027\u3002 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-61731","post","type-post","status-publish","format-standard","hentry","category-os"],"_links":{"self":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts\/61731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/comments?post=61731"}],"version-history":[{"count":0,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts\/61731\/revisions"}],"wp:attachment":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/media?parent=61731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/categories?post=61731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/tags?post=61731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}