CentOS上防止SSH被try密碼
利用pam_tally2
因為/etc/pam.d/sshd有include password-auth
所以修改password-auth-ac就好
怕出意外,就備份一下
#cp password-auth-ac password-auth-ac.bak
( password-auth 是 link 到 password-auth-ac )
#vi /etc/pam.d/password-auth-ac
auth required pam_env.so
auth required pam_tally2.so deny=2 unlock_time=60 audit
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
account required pam_unix.so
account sufficient pam_localuser.so
account required pam_tally2.so
account sufficient pam_succeed_if.so uid < 500 quiet
account required pam_permit.so
存檔
deny=2 兩次login失敗後,鎖住帳號
even_deny_root 連root也一樣
unlock_timeout=60 在60秒後解除鎖定
#service sshd restart
查看被鎖的情況
#pam_tally2
解鎖某帳號
#pam_tally2 --user=[usernmae] --rest
查看log
#more /var/log/secure
- Jun 09 Mon 2014 09:04
CentOS上防止SSH被try密碼
close
全站熱搜
留言列表
發表留言