安装SSH
yum install ssh 安全
启动SSH
service sshd start 服务器
设置开机运行
chkconfig sshd on ssh
相关配置文件修改
[root@sample ~]# vi /etc/ssh/sshd_config ← 用vi打开SSH的配置文件
tcp
#Protocol 2,1 ← 找到此行将行头“#”删除,再将行末的“,1”删除,只容许SSH2方式的链接
↓
Protocol 2 ← 修改后变为此状态,仅使用SSH2 ide
#ServerKeyBits 768 ← 找到这一行,将行首的“#”去掉,并将768改成1024
↓
ServerKeyBits 1024 ← 修改后变为此状态,将ServerKey强度改成1024比特 .net
#PermitRootLogin yes ← 找到这一行,将行首的“#”去掉,并将yes改成no
↓
PermitRootLogin no ← 修改后变为此状态,不容许用root进行登陆 rest
#PasswordAuthentication yes ← 找到这一行,将yes改成no
↓
PasswordAuthentication no ← 修改后变为此状态,不容许密码方式的登陆 server
#PermitEmptyPasswords no ← 找到此行将行头的“#”删除,不容许空密码登陆
↓
PermitEmptyPasswords no ← 修改后变为此状态,禁止空密码进行登陆 ci
由于咱们只想让SSH服务为管理系统提供方便,因此在不经过外网远程管理系统的状况下,只容许内网客户端经过SSH登陆到服务器,以最大限度减小不安全因素。设置方法以下:
[root@sample ~]# vi /etc/hosts.deny ← 修改屏蔽规则,在文尾添加相应行 rem
#
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the ‘/usr/sbin/tcpd’ server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
# you should know that NFS uses portmap!
sshd: ALL ← 添加这一行,屏蔽来自全部的SSH链接请求
[root@sample ~]# vi /etc/hosts.allow ← 修改容许规则,在文尾添加相应行
#
# hosts.allow This file describes the names of the hosts which are
# allowed to use the local INET services, as decided
# by the ‘/usr/sbin/tcpd’ server.
#
sshd: 192.168.0. ← 添加这一行,只容许来自内网的SSH链接请求
注意:hosts.deny 和hosts.allow在简单配置能够不修改,
如遇此两个文件只读,能够chmod提权
最后重启动SSH启动 # /etc/rc.d/init.d/sshd restart