Linux安全加固脚本的示例分析
短信预约 -IT技能 免费直播动态提醒
今天就跟大家聊聊有关Linux安全加固脚本的示例分析,可能很多人都不太了解,为了让大家更加了解,小编给大家总结了以下内容,希望大家根据这篇文章可以有所收获。
#安全加固脚本#!/bin/bash #version1.0;write at 2017-03-29;#write by Ringoo; #1.将root管理员名称修改为Ringoouseradd -u 0 -g 0 -o ringoouseradd pso #2.修改默认密码策略#备份文件cp /etc/login.defs /etc/login.defs.baksed -i 's/99999/90/' /etc/login.defs #3.设置3次输错密码锁定用户#备份文件cp /etc/pam.d/system-auth /etc/pam.d/system-auth.baksed -e '5 i\auth required /lib64/security/pam_tally2.so deny=3 unlock_time=300' -i /etc/pam.d/system-auth#密码复杂度设置sed -e "14 i\password requisite pam_cracklib.so minlen=10 difok=3 lcredit=-1 ucredit=-1 dcredit=-1 ocredit=-1 try_first_pass retry=3" -i /etc/pam.d/system-authsed -e '15d' -i /etc/pam.d/system-auth #修改/etc/profile#备份文件cp /etc/profile /etc/profile.baksed -e 's/HISTSIZE=1000/HISTSIZE=3000/' -i /etc/profilesed -i "/HISTSIZE=3000/a HISTTIMEFORMAT=\"%F %T \"" /etc/profilesed -i "/HISTSIZE=3000/a TMOUT=1800" /etc/profilesed -i "$ a\export HISTORY_FILE=/var/log/useraudit.log" /etc/profilesed -i "$ a\export PROMPT_COMMAND=\'{ h=\`history 1\`;w=\`who am i\`;echo -e \$(date \"+%Y-%m-%d %H:%M:%S\") --- \$w ---\$h;} >> \$HISTORY_FILE\'" /etc/profile /bin/touch /var/log/useraudit.log/bin/chmod 777 /var/log/useraudit.log/usr/bin/chattr +a /var/log/useraudit.log #修改sshd配置#备份文件cp /etc/ssh/sshd_config /etc/ssh/sshd_config.baksed -e 's/\#PermitRootLogin yes/PermitRootLogin no/' -i /etc/ssh/sshd_configsed -e 's/\#Port 22/Port 2222/' -i /etc/ssh/sshd_configsed -e 's/\#UseDNS yes/UseDNS no/' -i /etc/ssh/sshd_configsed -e 's/X11Forwarding yes/X11Forwarding no/' -i /etc/ssh/sshd_configsed -e 's/GSSAPIAuthentication yes/\#GSSAPIAuthentication yes/' -i /etc/ssh/sshd_configsed -e 's/GSSAPICleanupCredentials yes/\#GSSAPICleanupCredentials yes/' -i /etc/ssh/sshd_config#/etc/init.d/sshd restart #禁用不需要的服务/sbin/chkconfig ip6tables off/sbin/chkconfig iptables off/sbin/chkconfig avahi-daemon off/sbin/chkconfig avahi-dnsconfd off #数据库服务器这里请酌情配置#备份文件#cp /etc/pam.d/login /etc/pam.d/login.bak#cp /etc/security/limits.conf /etc/security/limits.conf.bak#sed -i "$ a\session required /lib64/security/pam_limits.so" /etc/pam.d/login#sed -i "$ a\* soft nofile 65535" /etc/security/limits.conf#sed -i "$ a\* hard nofile 65535" /etc/security/limits.conf echo "please restart the server for the settings to take effect,press enter exit" read pauseexit 1
看完上述内容,你们对Linux安全加固脚本的示例分析有进一步的了解吗?如果还想了解更多知识或者相关内容,请关注编程网行业资讯频道,感谢大家的支持。
免责声明:
① 本站未注明“稿件来源”的信息均来自网络整理。其文字、图片和音视频稿件的所属权归原作者所有。本站收集整理出于非商业性的教育和科研之目的,并不意味着本站赞同其观点或证实其内容的真实性。仅作为临时的测试数据,供内部测试之用。本站并未授权任何人以任何方式主动获取本站任何信息。
② 本站未注明“稿件来源”的临时测试数据将在测试完成后最终做删除处理。有问题或投稿请发送至: 邮箱/279061341@qq.com QQ/279061341