SSH防护:修订间差异
跳转到导航
跳转到搜索
无编辑摘要 |
无编辑摘要 |
||
| 第6行: | 第6行: | ||
==fail2ban== | ==fail2ban== | ||
''' | |||
=== 安装 === | |||
'''apt install fail2ban''' | |||
=== 配置 === | |||
vim /etc/fail2ban/jail.local<syntaxhighlight lang="bash"> | vim /etc/fail2ban/jail.local<syntaxhighlight lang="bash"> | ||
| 第15行: | 第20行: | ||
logpath = /var/log/auth.log | logpath = /var/log/auth.log | ||
maxretry = 5 | maxretry = 5 | ||
</syntaxhighlight>service fail2ban restart | bantime = 12h | ||
</syntaxhighlight> | |||
=== 重启 === | |||
service fail2ban restart | |||
'''fail2ban-client status sshd''' | '''fail2ban-client status sshd''' | ||
=== 日志 === | |||
/var/log/fail2ban.log | |||
2023年10月16日 (一) 05:35的版本
日志
/var/log/auth.log 中记录了SSH登录尝试,如果没有此文件,可尝试重启syslog: service syslog restart
防护
fail2ban
安装
apt install fail2ban
配置
vim /etc/fail2ban/jail.local
[sshd]
enabled = true
port = 14213
filter = sshd
logpath = /var/log/auth.log
maxretry = 5
bantime = 12h
重启
service fail2ban restart
fail2ban-client status sshd
日志
/var/log/fail2ban.log