mirror of
https://github.com/LCTT/TranslateProject.git
synced 2025-01-25 23:11:02 +08:00
translated
This commit is contained in:
parent
1733733ee9
commit
323a039a8b
@ -1,58 +0,0 @@
|
|||||||
translating---geekpi
|
|
||||||
|
|
||||||
How to Keep Hackers out of Your Linux Machine Part 1: Top Two Security Tips
|
|
||||||
============================================================
|
|
||||||
|
|
||||||
|
|
||||||
![Keep hackers out](https://www.linux.com/sites/lcom/files/styles/rendered_file/public/security-webinar.jpg?itok=af6QqiAm "Keep hackers out")
|
|
||||||
In this series, we’ll cover the five easiest ways to keep hackers out. Watch the free webinar on-demand for more information.[Creative Commons Zero][1]Pixabay
|
|
||||||
|
|
||||||
There is nothing a hacker likes more than a tasty Linux machine available on the Internet. In my recent Linux Foundation webinar I shared tactics, tools, and methods hackers use to invade your space.
|
|
||||||
|
|
||||||
In this blog series, we’ll cover the five easiest ways to keep hackers out and know if they have made it in. Want more information? Watch the[ ][3][free webinar on-demand][4].
|
|
||||||
|
|
||||||
### Easy Linux Security Tip #1
|
|
||||||
|
|
||||||
**If you are not using Secure Shell, you should be.**
|
|
||||||
|
|
||||||
This has been a thing for a very, very long time. Telnet is insecure. rLogin is insecure. There are still services out there that require those services but they shouldn't be exposed to the Internet. If you don’t have SSH just turn off your Internet connection. As we always say: use SSH keys.
|
|
||||||
|
|
||||||
Rule No. 1 of SSH: Don't use password authentication. The second rule of SSH is: Don't use password authentication. This is really, really important.
|
|
||||||
|
|
||||||
If you have a Linux machine on the Internet for any period of time, you are going to get brute forced. It is just going to happen. The brute force is scripted. Scanners see port 22 open to the Internet and they have to hammer it hard.
|
|
||||||
|
|
||||||
The other thing you can do is you can move SSH off of the standard port which many of us do. That works to prevent a small number of brute force attacks but, in general, just don't use password authentication and you'll be safe.
|
|
||||||
|
|
||||||
The third rule of SSH is: All keys have passphrases. A no-passphrase key may as well not be a key at all. I realize that makes services hard to deal with if you are trying to log into something automatically or trying to automate stuff but all keys should have passphrases.
|
|
||||||
|
|
||||||
My favorite thing to do is to compromise a host and find home directories with private keys. As soon as I have private keys, it's game over. I can log into anything that the public key provides access to.
|
|
||||||
|
|
||||||
If you provide a passphrase or even a password, it doesn't have to be a long passphrase on your keys, then it makes my life much, much more difficult.
|
|
||||||
|
|
||||||
### Easy Linux Security Tip #2
|
|
||||||
|
|
||||||
**Install Fail2ban.**
|
|
||||||
|
|
||||||
Those brute force attacks that I was talking about? This helps dramatically. It will automatically activate iptables rules to block repeated attempts to SSH into your machine. Be sure to configure it in such a way that it doesn't lock you out or doesn't take up too many resources. But use it, love it, and watch it.
|
|
||||||
|
|
||||||
It has its own logs so make sure to watch them and check to see if it’s actually functioning. That's a really important thing as well.
|
|
||||||
|
|
||||||
In [part 2 of this series][5], I’ll give you three more easy security tips for keeping hackers out of your Linux machine. You can also [watch the entire free webinar on-demand][6] now.
|
|
||||||
|
|
||||||
--------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
via: https://www.linux.com/news/webinar/2017/how-keep-hackers-out-your-linux-machine-part-1-top-two-security-tips
|
|
||||||
|
|
||||||
作者:[Mike Guthrie][a]
|
|
||||||
译者:[译者ID](https://github.com/译者ID)
|
|
||||||
校对:[校对者ID](https://github.com/校对者ID)
|
|
||||||
|
|
||||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
|
||||||
|
|
||||||
[a]:https://www.linux.com/users/anch
|
|
||||||
[1]:https://www.linux.com/licenses/category/creative-commons-zero
|
|
||||||
[2]:https://www.linux.com/files/images/security-webinarjpg
|
|
||||||
[3]:http://bit.ly/2j89ISJ
|
|
||||||
[4]:http://bit.ly/2j89ISJ
|
|
||||||
[5]:https://www.linux.com/news/webinar/2017/how-keep-hackers-out-your-linux-machine-part-2-three-more-easy-security-tips
|
|
||||||
[6]:http://bit.ly/2j89ISJ
|
|
@ -0,0 +1,56 @@
|
|||||||
|
如何让你的 Linux 远离黑客 第一部分:两个安全建议
|
||||||
|
============================================================
|
||||||
|
|
||||||
|
|
||||||
|
![Keep hackers out](https://www.linux.com/sites/lcom/files/styles/rendered_file/public/security-webinar.jpg?itok=af6QqiAm "Keep hackers out")
|
||||||
|
在本系列中,我们将介绍防止黑客入侵的五种最简单的方法。观看免费网络研讨会以了解更多信息。 [Creative Commons Zero] [1] Pixabay
|
||||||
|
|
||||||
|
在互联网上没有什么比好的 Linux 机器让黑客更喜欢的了。在最近的 Linux 基金会网络研讨会中,我分享了黑客用来侵入你空间的战术、工具和方法。
|
||||||
|
|
||||||
|
在这个博客系列中,我们将介绍五个最简单的方法来防范黑客,并知道他们是否已经侵入。想要了解更多信息?请观看[][3][免费的网络研讨会点播][4]。
|
||||||
|
|
||||||
|
### 简单的 Linux 安全提示 #1
|
||||||
|
|
||||||
|
**如果你没有在使用安全 shell,你应该取使用它。**
|
||||||
|
|
||||||
|
这是一个有非常非常长时间的提示了。Telnet 是不安全的。 rLogin 是不安全的。仍然有服务需要这些,但它们不应该暴露在互联网。如果你没有 SSH ,你只要关闭互联网连接。我们总是说:使用 SSH 密钥。
|
||||||
|
|
||||||
|
SSH 规则 1:不要使用密码认证。SSH 第二条规则:不要使用密码身份验证。这真的真的很重要。
|
||||||
|
|
||||||
|
如果任何时间你有一台 Linux 机器在互联网上,你会被暴力破解。这会发生。暴力破解用的是脚本。扫描器会看到对互联网开放的端口 22,它们就会攻击它。
|
||||||
|
|
||||||
|
你可以做的另一件事是修改 SSH 的标准端口,我们许多人这么做。这可以防止少量的暴力攻击,但一般来说,不使用密码认证,你会更安全。
|
||||||
|
|
||||||
|
SSH 的第三条规则:所有密钥都有密码。无密码密钥不是真正的密钥。我知道如果你试图自动登录或试图自动化一些事情,这会使服务难以处理,但所有的密钥应该有密码。
|
||||||
|
|
||||||
|
我最喜欢做的是入侵一台主机,并找到主目录与私钥。一旦我拥有了私钥,那它的游戏结束了。我可以访问使用公钥的服务。
|
||||||
|
|
||||||
|
如果你有口令短语或者只是密码,它不一定是你的密钥上的长密码,那么它会使我的行为更加更加困难。
|
||||||
|
|
||||||
|
### 简单的 Linux 安全提示 #2
|
||||||
|
|
||||||
|
**安装 Fail2ban.**
|
||||||
|
|
||||||
|
我说的那些暴力攻击?fail2ban 将大大有助于它。它将自动激活 iptables 规则以阻止重复尝试 SSH 到你的机器。你一定要配置它,使它不会锁定你或者占用太多的资源。要使用它、爱它、监视它。
|
||||||
|
|
||||||
|
它有自己的日志,所以一定要查看它们,并检查它是否在实际运行。这是一件非常重要的事情。
|
||||||
|
|
||||||
|
在[本系列的第2部分][5],我会给你三个更容易的安全提示,以防止黑客远离你的 Linux 机器。你也可以[现在观看完整的免费网络研讨会][6]。
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
via: https://www.linux.com/news/webinar/2017/how-keep-hackers-out-your-linux-machine-part-1-top-two-security-tips
|
||||||
|
|
||||||
|
作者:[Mike Guthrie][a]
|
||||||
|
译者:[geekpi](https://github.com/geekpi)
|
||||||
|
校对:[校对者ID](https://github.com/校对者ID)
|
||||||
|
|
||||||
|
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
||||||
|
|
||||||
|
[a]:https://www.linux.com/users/anch
|
||||||
|
[1]:https://www.linux.com/licenses/category/creative-commons-zero
|
||||||
|
[2]:https://www.linux.com/files/images/security-webinarjpg
|
||||||
|
[3]:http://bit.ly/2j89ISJ
|
||||||
|
[4]:http://bit.ly/2j89ISJ
|
||||||
|
[5]:https://www.linux.com/news/webinar/2017/how-keep-hackers-out-your-linux-machine-part-2-three-more-easy-security-tips
|
||||||
|
[6]:http://bit.ly/2j89ISJ
|
Loading…
Reference in New Issue
Block a user