نمایش نتایج: از شماره 1 تا 5 , از مجموع 5

موضوع: آموزش بالا بردن امنیت DirectAdmin

  1. #1
    عضو جدید
    تاریخ عضویت
    Oct 2009
    نوشته ها
    27
    تشکر تشکر کرده 
    1
    تشکر تشکر شده 
    5
    تشکر شده در
    5 پست

    پیش فرض آموزش بالا بردن امنیت DirectAdmin

    آخه یه پست نباید باشه که یه عنوان مناسب داشته باشه!؟
    از مدیر انجمن خواهش می کنم که اگر خودشون و یا دوستانی که این آموزش رو دارند، پست من رو پاک کنند و با همین عنوان و همینجا این مطلب رو ارسال کنند

  2. # ADS




     

  3. #2
    عضو جدید
    تاریخ عضویت
    Oct 2009
    نوشته ها
    27
    تشکر تشکر کرده 
    1
    تشکر تشکر شده 
    5
    تشکر شده در
    5 پست

    پیش فرض پاسخ : آموزش بالا بردن امنیت DirectAdmin

    واقعا این مطلب مهم نبود که کسی توجه نکرد!؟

  4. #3
    عضو دائم nimafire آواتار ها
    تاریخ عضویت
    Aug 2008
    محل سکونت
    تهران - اصفهان
    نوشته ها
    1,521
    تشکر تشکر کرده 
    209
    تشکر تشکر شده 
    3,236
    تشکر شده در
    1,892 پست

    پیش فرض پاسخ : آموزش بالا بردن امنیت DirectAdmin

    دوست عزیز بحث سنگینی هست
    موارد زیادی برای کار داره

    معمولا منیج حرفه ای رو کسی نمیاد به راحتی بیان کنه.

    اما شما سعی کنید پرمیشن 777 نداشته باشید
    دایرکت ادمین شما با https بالا بیاد
    همیشه بروز رسانی هارو انجام بدید

    موفق باشید
    ● مدیر فنی سرور - کانفیگ فنی و امنیتی سیستم عامل و انواع کنترل پنل های لینوکس cPanel - Directadmin / نزدیک به 10 سال تجربه

  5. #4
    عضو دائم TukaNet آواتار ها
    تاریخ عضویت
    Feb 2009
    نوشته ها
    1,432
    تشکر تشکر کرده 
    898
    تشکر تشکر شده 
    3,419
    تشکر شده در
    1,984 پست

    پیش فرض پاسخ : آموزش بالا بردن امنیت DirectAdmin

    در حد نرمال اگه نیاز داشته باشید میتونید از راهنمای خود دایرکت ادمین استفاده کنید + یک فایروال مناسب و خوب

  6. تعداد تشکر ها از TukaNet به دلیل پست مفید


  7. #5
    عضو دائم nimafire آواتار ها
    تاریخ عضویت
    Aug 2008
    محل سکونت
    تهران - اصفهان
    نوشته ها
    1,521
    تشکر تشکر کرده 
    209
    تشکر تشکر شده 
    3,236
    تشکر شده در
    1,892 پست

    پیش فرض پاسخ : آموزش بالا بردن امنیت DirectAdmin

    ببینید من باز هم میگم. امنیت رو فقط متخصصین میتونن تامین کنن. دستورات پابلیک فقط در حد نرمال میتونن امنیت سرور شمارو تضمین کنند.
    دستورات زیر از طرف دایرکت ادمین هست که از tukanet بایت یاد اوری تشکر میکنم.



    Note that it's ultimately the responsibility of the server admin to ensure his system is secure. These are some basic security tips that can be done to help protect your system. This is not an end-all guide for server security, admins must be diligent, but rather some suggestions for a start to securing your server.

    1) At install time, the easiest thing to do is to mount your /tmp partition with the noexec,nosuid options, and mount the /home partition with the nosuid option. This is done in your /etc/fstab and requires those paths to exist as partitions, and not just as subdirectories of /. If you're unsure, type:

    mount
    to get a listing of your partitions and their current mounting options. Use google for more information on these mounting options. Be very careful when editing your /etc/fstab, as any errors could prevent your system from starting up. Note that you must not have "nosuid,noexec" for / or /usr, as those partitions have suid binaries normally (su, passwd, etc).

    2) After the system is installed, a good idea is to add dangerous php functions to the disable_functions list. This prevents php scripts from running "raw" functions that could be used to execute programs on your system. Note that some php scripts do legitimately require these functions to operate, so if your scripts don't run after enabling this function, edit your php.ini to remove the required functions from the list, and restart apache. To add the disable_functions with custombuild, type the following then restart apache:

    cd /usr/local/directadmin/custombuild
    ./build update
    ./build secure_php

    3) Do regular updates of system services, libraries and scripts. It's important to keep your system updated once installed. This is the responsibility of the server administrator. There are several tools and options avaiable to help the admin do this. For system libraries like openssl and other low level system items, this is left to the admin to do how he wish, usually package systems like yum or apt-get can do this for you. For services and scripts that DA installs, you can use the custombuild script. A typical update command with custombuild is:

    cd /usr/local/directadmin/custombuild
    ./build update
    ./build all d
    Note that in the custombuild directory is a file called "options.conf". In this file is a list of all options you've got regarding what custombuild will do. Regarding updates, ensure you have clean_old_webapps=yes present. This removes all scripts from /var/www/html, after updating you do a new one. The options.conf also has cron options to check for updates nightly, or even install these options nightly. I recommend having the nightly cron check, and then a hand-on admin proceed with the update after he gets the notice. To enable a nightly notice replace the following bold options with your relevant information:

    #Cron settings
    cron=yes
    email=email@domain.com
    notifications=yes
    updates=no
    webapps_updates=yes
    Then type:

    ./build cron
    These are the settings for getting nightly notices for updates, but it won't do the updates for you.
    After getting the notice in your inbox, you'd run the following from the custombuild directory:

    ./build update_versions
    to update just those items that require updating. Note that doing "./build all d" can be simpler, but takes longer to run.
    If you wish to have "./build update_versions" be run automatically, change the updates=no to become updates=yes. Just keep in mind that the server admin is still required to be fully aware of the system and it's state if he choses yes for this option. The webapps_updates option only applies when updates=no is used. It's there to still allow updates to the php scripts in /var/www/html, while not affecting compiled services. Set webapps_updates=yes if updates=no and you wish to have automated updates of the webapps scripts with the cron option. If updates=yes, then the webapps_updates value doesn't matter.


    4) If you're running php in "CLI" mode, then enabling both php SafeMode and open_basedir is wise. Safemode is an internal form of disable_functions which also does a bit more checking. See the documentation on Safemode for more info on this. Open_basedir, which is enabled by default, tells php to not allow scripts to access files outside of the set list of paths.
    To control SafeMode and Open_Basedir on your php CLI system (default), go to:

    Admin Level -> Php Safemode Config

    5) suPhp is one option which some admin's like, other's do not. What suPhp (php CGI) does is runs php scripts as the system user of the account, rather than the "apache" user. This solves many issues like permission/ownership when a php script uploads files. It also allows an admin to track down rogue scripts more easily as it's not running as a generic user. Another benefit of suPhp is that you can chmod your php scripts to 700 instead of 755. This makes them more secure in the case you're storing passwords in your scripts. Drawbacks to suPhp include a slight slowdown in performance since there are a few more hoops to jump through to have php run as the user instead of "apache". Also, the items in point 4) above have no effect since suPhp does not monitor VirtualHost php flags. All settings must be done in php.ini files. Note that you can have per-user php.ini files to allow per-user settings, see this link.

    To enable suPhp, see this guide.

    6) If you don't plan on doing any remote access to mysql, then setting up mysqld to only listen on 127.0.0.1 would be a good idea. Note you'll have to keep this in mind if your users start asking you why they can't connect to mysql from a remote location. To set mysql to only bind to 127.0.0.1, add the following to the [mysqld] section of your /etc/my.cnf, then restart mysqld:

    bind-address = 127.0.0.1


    7) One filtering option for apache is mod_security. This is not part of our installation, but mod_security is an apache filter which checks all http requests sent by clients to ensure they're valid. Note that if not setup correctly, it can break frontpage, or other php scripts that often have long URL requests, so proper setup and testing would be important. Check our forum for guides on this, it's not covered by our support.

    8) A firewall is always a good idea. Many people use iptables or apf. A new free plugin is also available here.

    9) Set the User's domains directory to block other Users on the system from seeing in:
    DirectAdmin Knowledge Base

    10) Setup your named.conf to not allow recursion. This should be done by default now, but check anyway with this guide.

    11) Prevent Users from using weak passwords by enabling difficult password enforcement.

    12) Prevent Users from creating subdomains belonging to other Users with this option.

    13) If you're using DirectAdmin with SSL, it's a good idea to force all SSL connections to use SSLv3 instead of other older protocols.

    14) To add another layer of security with the permissions of the perl binary, using a trick similar to step 9, run the following:

    chgrp apache /usr/bin/perl
    chmod 705 /usr/bin/perl
    what this will do is tell the system that any user in group "apache" is not allowed to execute /usr/bin/perl. If you did implement step 9 you could in theory use "access" instead of "apache" for the chgrp value, to also prevent other system account from running it, but apache is the main one. This technique can be applies to other binaries as well, like wget, fetch, etc.. anything you don't want the "apache" user from running. Keep in mind that using suPhp (step 5) essentially negates this issue since php scripts run as the user instead. Note that this is another layer of security, so using it anyway wouldn't hurt anything, in the event that an apache exploit happens independant of php completely
    .
    ● مدیر فنی سرور - کانفیگ فنی و امنیتی سیستم عامل و انواع کنترل پنل های لینوکس cPanel - Directadmin / نزدیک به 10 سال تجربه

  8. تعداد تشکر ها ازnimafire به دلیل پست مفید


اطلاعات موضوع

کاربرانی که در حال مشاهده این موضوع هستند

در حال حاضر 1 کاربر در حال مشاهده این موضوع است. (0 کاربران و 1 مهمان ها)

موضوعات مشابه

  1. پاسخ ها: 0
    آخرين نوشته: October 8th, 2017, 12:29
  2. درخواست لایسنس directadmin بصورت lifetime با پنل مستقیم در سایت directadmin
    توسط shahabkntu در انجمن درخواست انواع لایسنس
    پاسخ ها: 8
    آخرين نوشته: January 22nd, 2017, 11:24
  3. آموزش نصب لایت اسپید روی directadmin
    توسط Kavir_m در انجمن دايرکت ادمين DirectAdmin
    پاسخ ها: 13
    آخرين نوشته: November 13th, 2014, 10:51
  4. پاسخ ها: 0
    آخرين نوشته: September 23rd, 2014, 01:49
  5. آموزش کار با ftp در directadmin
    توسط Hippo در انجمن دايرکت ادمين DirectAdmin
    پاسخ ها: 0
    آخرين نوشته: September 20th, 2012, 01:10

مجوز های ارسال و ویرایش

  • شما نمیتوانید موضوع جدیدی ارسال کنید
  • شما امکان ارسال پاسخ را ندارید
  • شما نمیتوانید فایل پیوست کنید.
  • شما نمیتوانید پست های خود را ویرایش کنید
  •