<Directory /data/wwwroot/www.123.com/upload> php_admin_flag engine off </Directory>
[root@yong-02 111.com]# vim /usr/local/apache2/conf/extra/httpd-vhosts.conf 把代码放入到配置文件中 <Directory /data/wwwroot/111.com/upload> ##把upload目录下全部的php禁止解析 php_admin_flag engine off //禁止解析php <FilesMatch (.*)\.php(.*)> //如今这里全部访问php都会是403 ##这里的 .用\脱义 Order allow,deny //若是不作这个deny,就会直接访问到源代码,这样就不太友好 Deny from all </FilesMatch> 而后保存退出
[root@yong-02 111.com]# /usr/local/apache2/bin/apachectl -t Syntax OK [root@yong-02 111.com]# /usr/local/apache2/bin/apachectl graceful
[root@yong-02 111.com]# mkdir upload [root@yong-02 111.com]# ls 123.php 1.php admin images index.php qq123.png upload [root@yong-02 111.com]# cp 123.php upload/ [root@yong-02 111.com]# ls upload/ 123.php
[root@yong-02 111.com]# curl -x127.0.0.1:80 '111.com/upload/123.php' -I HTTP/1.1 403 Forbidden Date: Fri, 01 Jun 2018 14:14:20 GMT Server: Apache/2.4.33 (Unix) PHP/7.1.6 Content-Type: text/html; charset=iso-8859-1
[root@yong-02 111.com]# vim /usr/local/apache2/conf/extra/httpd-vhosts.conf <Directory /data/wwwroot/111.com/upload> ##把upload目录下全部的php禁止解析 php_admin_flag engine off #<FilesMatch (.*)\.php(.*)> ##这里的 .用\脱义 #Order allow,deny #Deny from all #</FilesMatch> </Directory> 而后保存退出
[root@yong-02 111.com]# /usr/local/apache2/bin/apachectl -t Syntax OK [root@yong-02 111.com]# /usr/local/apache2/bin/apachectl graceful
[root@yong-02 111.com]# curl -x127.0.0.1:80 '111.com/upload/123.php' <?php echo "123.php";
<Directory /data/wwwroot/111.com/upload> ##把upload目录下全部的php禁止解析 php_admin_flag engine off <FilesMatch (.*)\.php(.*)> ##这里的 .用\脱义 Order allow,deny Deny from all </FilesMatch> </Directory>
[root@yong-02 111.com]# /usr/local/apache2/bin/apachectl -t Syntax OK [root@yong-02 111.com]# /usr/local/apache2/bin/apachectl graceful
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{HTTP_USER_AGENT} .*curl.* [NC,OR] RewriteCond %{HTTP_USER_AGENT} .*baidu.com.* [NC] RewriteRule .* - [F] </IfModule>
有时候,网站会受到一种叫 cc 攻击,CC攻击就是黑客,经过软件,肉鸡同时去访问一个站点,超过服务器的并发,就会致使站点宕机;经过肉鸡,软件去访问站点,就是普通的访问,没有什么特殊的,只是让站点超过并发致使严重超负荷而宕机,因此没办法去进行控制;所谓CC攻击都会有一个规律的特征,就是user_agent是一致的,好比同一个IP、同一个标识、同一个地址;遇到这种规律的user_agent频繁访问的状况咱们就能够断定他就是CC攻击,咱们就能够经过限制他的user_agent 减轻服务器压力,只须要让他从正常访问的200,限制为403,就能减轻服务器的压力,由于403仅仅是一个请求,只会使用到不多的带宽,毕竟他没有牵扯到php 和mysqlphp
cc攻击html
肉鸡 (受黑客远程控制的电脑)mysql
[root@yong-02 111.com]# vim /usr/local/apache2/conf/extra/httpd-vhosts.conf <IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{HTTP_USER_AGENT} .*curl.* [NC,OR] //条件 RewriteCond %{HTTP_USER_AGENT} .*baidu.com.* [NC] //条件 RewriteRule .* - [F] </IfModule>
[root@yong-02 111.com]# /usr/local/apache2/bin/apachectl -t Syntax OK [root@yong-02 111.com]# /usr/local/apache2/bin/apachectl graceful
[root@yong-02 111.com]# curl -x127.0.0.1:80 '111.com/upload/123.php' -I HTTP/1.1 403 Forbidden Date: Fri, 01 Jun 2018 14:38:08 GMT Server: Apache/2.4.33 (Unix) PHP/7.1.6 Content-Type: text/html; charset=iso-8859-1 [root@yong-02 111.com]# curl -x127.0.0.1:80 '111.com/123.php' -I HTTP/1.1 403 Forbidden Date: Fri, 01 Jun 2018 14:38:17 GMT Server: Apache/2.4.33 (Unix) PHP/7.1.6 Content-Type: text/html; charset=iso-8859-1
[root@yong-02 111.com]# tail -5 /usr/local/apache2/logs/111.com-access_20180601.log 192.168.180.1 - - [01/Jun/2018:22:25:28 +0800] "GET /favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.104 Safari/537.36 Core/1.53.4482.400 QQBrowser/9.7.13001.400" 192.168.180.1 - - [01/Jun/2018:22:25:28 +0800] "GET /favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.104 Safari/537.36 Core/1.53.4482.400 QQBrowser/9.7.13001.400" 192.168.180.1 - - [01/Jun/2018:22:25:29 +0800] "GET /upload/1fasdfas.php HTTP/1.1" 403 228 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.104 Safari/537.36 Core/1.53.4482.400 QQBrowser/9.7.13001.400" 127.0.0.1 - - [01/Jun/2018:22:38:08 +0800] "HEAD HTTP://111.com/upload/123.php HTTP/1.1" 403 - "-" "curl/7.29.0" 127.0.0.1 - - [01/Jun/2018:22:38:17 +0800] "HEAD HTTP://111.com/123.php HTTP/1.1" 403 - "-" "curl/7.29.0"
模拟user_agent,去访问会看到状态码为200 能够正常访问 [root@yong-02 111.com]# curl -A "liyueyong liyueyong" -x127.0.0.1:80 '111.com/123.php' -I HTTP/1.1 200 OK Date: Fri, 01 Jun 2018 14:40:20 GMT Server: Apache/2.4.33 (Unix) PHP/7.1.6 X-Powered-By: PHP/7.1.6 Content-Type: text/html; charset=UTF-8 [root@yong-02 111.com]# curl -A "liyueyong liyueyong" -x127.0.0.1:80 '111.com/123.php' 123.php[root@yong-02 111.com]#
[root@yong-02 111.com]# tail -5 /usr/local/apache2/logs/111.com-access_20180601.log 192.168.180.1 - - [01/Jun/2018:22:25:29 +0800] "GET /upload/1fasdfas.php HTTP/1.1" 403 228 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.104 Safari/537.36 Core/1.53.4482.400 QQBrowser/9.7.13001.400" 127.0.0.1 - - [01/Jun/2018:22:38:08 +0800] "HEAD HTTP://111.com/upload/123.php HTTP/1.1" 403 - "-" "curl/7.29.0" 127.0.0.1 - - [01/Jun/2018:22:38:17 +0800] "HEAD HTTP://111.com/123.php HTTP/1.1" 403 - "-" "curl/7.29.0" 127.0.0.1 - - [01/Jun/2018:22:40:20 +0800] "HEAD HTTP://111.com/123.php HTTP/1.1" 200 - "-" "liyueyong liyueyong" 127.0.0.1 - - [01/Jun/2018:22:40:29 +0800] "GET HTTP://111.com/123.php HTTP/1.1" 200 7 "-" "liyueyong liyueyong"
[root@yong-02 111.com]# ls 123.php 1.php admin images index.php qq123.png upload [root@yong-02 111.com]# vim index.php [root@yong-02 111.com]# cd /usr/local/src/php-7.1.6/ [root@yong-02 php-7.1.6]# cp php.ini-development /usr/local/php7/etc/php.ini [root@yong-02 php-7.1.6]# /usr/local/apache2/bin/apachectl graceful [root@yong-02 php-7.1.6]# 这时用浏览器访问看到配置文件的路径
[root@yong-02 php-7.1.6]# vim /usr/local/php7/etc/php.ini 搜索 /disable 在disable_functions =后禁掉一些危险的函数 disable_functions = eval,assert,popen,passthru,escapeshellarg,escapeshellcmd,passthru,exec,system,chroot,scandir,chgrp,chown,escapeshellcmd,escapeshellarg,shell_exec,proc_get_status,ini_alter,ini_restore,dl,pfsockopen,openlog,syslog,readlink,symlink,leak,popepassthru,stream_socket_server,popen,proc_open,proc_close,phpinfo 而后保存
[root@yong-02 php-7.1.6]# /usr/local/apache2/bin/apachectl graceful
[root@yong-02 php-5.6.32]# vim /usr/local/php/etc/php.ini 搜索/timezone 在date.timezone定义时区 须要删除 ; 分号 date.timezone = Asia/Shanghai 搜索/display 须要删除 ; 分号 将display_errors = On更改成display_errors = Off 而后保存退出
[root@yong-02 php-7.1.6]# /usr/local/apache2/bin/apachectl -t Syntax OK [root@yong-02 php-7.1.6]# /usr/local/apache2/bin/apachectl graceful
搜索/log_errors,将错误日志文件打开 log_errors = On 搜索/error_log,将错误日志文件定义到tmp目录下 须要删除 ; 分号 error_log = /tmp/php_errors.log 而后保存退出
[root@yong-02 php-7.1.6]# curl -A "a" -x127.0.0.1:80 http://111.com/index.php [root@yong-02 php-7.1.6]# ls /tmp/ pear php_errors.log
[root@yong-02 php-7.1.6]# ll /tmp/php_errors.log -rw-r--r-- 1 daemon daemon 137 6月 1 23:54 /tmp/php_errors.log
[root@yong-02 php-7.1.6]# ps aux |grep httpd root 1336 0.0 0.7 258888 13660 ? Ss 21:58 0:01 /usr/local/apache2/bin/httpd -k start daemon 3758 0.0 1.0 680948 18968 ? Sl 23:54 0:00 /usr/local/apache2/bin/httpd -k start daemon 3759 0.0 0.5 545716 10348 ? Sl 23:54 0:00 /usr/local/apache2/bin/httpd -k start daemon 3760 0.0 0.5 545716 10348 ? Sl 23:54 0:00 /usr/local/apache2/bin/httpd -k start root 3891 0.0 0.0 112676 984 pts/0 R+ 23:56 0:00 grep --color=auto httpd
[root@yong-02 php-7.1.6]# grep error_log /usr/local/php7/etc/php.ini ; server-specific log, STDERR, or a location specified by the error_log ; Set maximum length of log_errors. In error_log information about the source is error_log = /tmp/php_errors.log ;error_log = syslog ; OPcache error_log file name. Empty string assumes "stderr". ;opcache.error_log=
[root@yong-02 php-7.1.6]# touch /tmp/php_errors.log ; chmod 777 /tmp/php_errors.log - 能够先建立好/tmp/php_errors.log文件,而后赋予chmod 777权限
[root@yong-02 php-7.1.6]# cat /tmp/php_errors.log //会告诉你由于安全的缘由,这个函数已经被禁掉了 [01-Jun-2018 23:54:36 Asia/Shanghai] PHP Parse error: syntax error, unexpected end of file in /data/wwwroot/111.com/index.php on line 4
打开php配置文件linux
[root@yong-02 php-7.1.6]# vim /usr/local/php7/etc/php.ini 搜索/open_basedir,并上删除 ; 号 open_basedir = /data/wwwroot/111.com:/tmp 而后保存退出
[root@yong-02 php-7.1.6]# /usr/local/apache2/bin/apachectl -t Syntax OK [root@yong-02 php-7.1.6]# /usr/local/apache2/bin/apachectl graceful
[root@yong-02 php-7.1.6]# curl -A "a" -x127.0.0.1:80 111.com/index.php -I HTTP/1.1 200 OK Date: Fri, 01 Jun 2018 16:22:43 GMT Server: Apache/2.4.33 (Unix) PHP/7.1.6 X-Powered-By: PHP/7.1.6 Content-Type: text/html; charset=UTF-8
[root@yong-02 php-7.1.6]# vim /usr/local/apache2/conf/extra/httpd-vhosts.conf php_admin_value open_basedir "/data/wwwroot/111.com:/tmp/" 而后保存退出
[root@yong-02 php-7.1.6]# /usr/local/apache2/bin/apachectl -t Syntax OK [root@yong-02 php-7.1.6]# /usr/local/apache2/bin/apachectl graceful
[root@yong-02 php-7.1.6]# curl -A "a" -x127.0.0.1:80 111.com/index.php 111.com[root@yong-02 php-7.1.6]# curl -A "a" -x127.0.0.1:80 111.com/2.php 123[root@yong-02 php-7.1.6]#