業務用エアコン関連の技術情報、エラーコード、環境問題対策に関する別サイト「エアコンの安全な修理・適切なフロン回収」

nuy

OpenSUSE15.6_en

OpenSUSE15.6 : OS Install

OpenSUSEOpenSUSE is a Linux distribution that is community-based, free to the public, and active in adopting the latest technologies. It is sponsored by Novell and developed by the community. Originally, SUSE Linux was developed by SUSE, but after the acquisition of SUSE by Novell in 2003, Novell shifted the development structure to community-based by the OpenSUSE project as a distribution aiming for 100% open source, and changed the name from SUSE Linux to OpenSUSE Linux The name was changed to the current name.openSUSE is available as Leap, the stable version, and Tumbleweed, which uses a rolling-release model and is also the basis for the paid-for version of SUSE Linux Enterprise.Leap 15.6 will be released on June 12, 2024 and will provide up-to-date support for the latest hardware with improved YaST functionality and improved installers
OpenSUSE15.6_en

OpenSUSE15.6 : Firewall , SSH、NTP Server

1. Setting up remote connection by SSHSSH is a service for connecting remotely to a server and is basically running immediately after the OS is installed, but the default settings are somewhat insecure.Here we will configure the default settings to increase the security of ssh connections.1.1 SSH service configuration file changesModify the configuration file to change the SSH service settings.The SSH service configuration file is "/etc/ssh/sshd_config".
OpenSUSE15.6_en

OpenSUSE15.6 : SSH connection with public key

Create a private key for the client and a public key for the server to allow login with key pair authentication1.key pair creationCreate a public/private key pair for a user connecting to the Linux server using OpenSSH.Use ssh-keygen to create key pairs.Creation of public/private key pairs is performed with remote login user privileges.If you do not specify the creation destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/huong/.ssh/.On the way, also enter the password for the key.
OpenSUSE15.6_en

OpenSUSE15.6 : FTP Server

1. Vsftpd1.1vsftpd InstallIt is already installed at the time of openSUSE installation.If not, you can install it with the following command
OpenSUSE15.6_en

OpenSUSE15.6 : WEB Server (Apache) Install

1. Web Server (Apache)1.1 apache2 Install2. Apache2 : Using Perl Scripts Configure Perl scripts to be used as CGI3. Apache2 : Virtual Host SettingsConfigure both domains sample1.korodes.com sample2.korodes.com to be displayed on one server4. Apache2 : Using PHP ScriptsInstall and configure PHP so that PHP scripts are available
OpenSUSE15.6_en

OpenSUSE15.6 : Clamav , Mail Server

1. Clamav ( anti-virus software )1.1 Clamav Install2.  Mail server Install2.1 Postfix Install①Install Postfix and build an SMTP server3. Mail Server: Postfix + Clamav + AmavisdSet up Postfix and Clamav to work together to scan incoming and outgoing mail in real time.
OpenSUSE15.6_en

OpenSUSE15.6 : MariaDB , WordPress Install

1. MariaDB InstallUpdate the server package1.2 phpMyAdmin InstallInstalled phpMyAdmin and configured it to operate MariaDB via web browser2. Wordpress Install2.1 Required library installation
OpenSUSE15.6_en

OpenSUSE15.6 : Obtain SSL Certificate (Let's Encrypt) 、Web Server SSL

1.Obtain an SSL Certificate (Let's Encrypt)PreparationEnable mod_ssl1.1Certificate Installation2. Web server SSL conversion2.1 SSL Configuration
OpenSUSE15.6_en

OpenSUSE15.6 : Suricata , SNORT2 Install

SuricataSURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic.The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.SNORT2Snort is a network-based IDS (Intrusion Detection System). It captures packets flowing over a network and detects suspicious packets.The source file is used directly from https://snort.org/.
OpenSUSE15.6_en

OpenSUSE15.6 : Tripwire, Logwatch Install

1. TripwireTripwire is a host-based intrusion detection system (IDS) that monitors files and directories and notifies you when changes are made.1.1 Install and configuration①Install2. Logwatch①Logwatch install
MiracleLinux8.4_en

MiracleLinux8.4 : OS Install

What is MiracleLinux?MIRACLE LINUX is a Japanese Linux distribution provided by Cybertrust Corporation.Miracle Linux (now Cybertrust), established by Oracle Japan and NEC in June 2000, began development of Oracle Database for business and enterprise use with the aim of ensuring stable operation.It has been based on RHEL since Version 2.0 released in May 2001, and has been a full RHEL clone since Version 6.0 released in January 2012, with the latest version being 8.4 as of December 2021.MIRACLE LINUX, the famous domestic RHEL clone, was initially a commercial OS with a paid license, but following the termination of CnetOS8, it was announced that it would be offered free of charge starting with the latest 8.4.For this reason, it is currently in the limelight as a candidate for migration from CentOS8.
MiracleLinux8.4_en

MiracleLinux8.4 : Initial Setup

1. Disable SELinuxselinux is a feature that improves auditing and security in Linux, but when it is enabled, it can be quite restrictive in how services work and what settings are available.Therefore, in many cases, it is basically invalidated.  If you build a server while looking at a website and it doesn't work as expected, it may be because this selinux is enabled.Therefore, remember to disable it after installation.3. Adding Repositories3.1 PowerTools / HighAvailabilityThis is a repository that has been newly provided with MIRACLE LINUX 8.4.Utilization MethodPowerTools and HighAvailability can be used by updating miraclelinux-repos and enabling the repositories.Update miraclelinux-repos to 8.4-3.el8 or later.After the update, the following repository files will be added to /etc/yum.repos.d.miraclelinux-powertools.repomiraclelinux-highavailability.repo
MiracleLinux8.4_en

MiracleLinux8.4 : Firewall , SSH , NTP server

1.Setting up SSH remote connectionSSH is a service to connect to a server remotely, and is basically running right after the OS installation, but the default settings are somewhat insecure.In this section, we will configure the settings to change the default settings and increase the security of the ssh connection.1.1 Change the configuration file of SSH service.2.How to set up a firewall (firewalld)In MiracleLinux, the firewall is set to firewalld by default, which is enabled when the OS is installed.To briefly explain firewalld, when setting up a communication control policy, communication permission/blocking rules are applied to predefined zones, and the zones are assigned to each NIC (network adapter).3.Synchronize the server time with Japan Standard Time.① Change the configuration file as follows
MiracleLinux8.4_en

MiracleLinux8.4 : SSH public key cryptography setting

Public key1.Create a key pair with RSABecome an ordinary user and create a key pair with RSA2.Private Key Login Settings3.Change to login only with private key# vi /etc/ssh/sshd_config●Per line 694.Creating a private key using PuTTYgenLaunch Winscp and start puttygen.exe from Tools
MiracleLinux8.4_en

MiracleLinux8.4 : Vsftpd (FTP server installation)

FTP Server Installation1. Install vsftpdDownload vsftpd-3.0.3-33.el8.x86_64.rpm from the download site to /usr/local/src/.# cd /usr/local/src/# wget ftp://ftp.pbone.net/mirror/ftp.centos.org/8-stream/AppStream/x86_64/os/Packages/vsftpd-3.0.3-33.el8.x86_64.rpm# rpm -ivh vsftpd-3.0.3-33.el8.x86_64.rpm2.Configuring vsftpd