業務用エアコン関連の技術情報、エラーコード、環境問題対策に関する別サイト「エアコンの安全な修理・適切なフロン回収」

nuy

Rocly Linux8.8_en

RockyLinux8.8 : Tripwire , Logwatch , disk usage check script

Tripwire1.Install# dnf install -y tripwire2..Passphrase settingSet site passphrase and local passphraseLogwatch①Install# dnf install logwatch -y②Edit configuration fileIntroduce disk usage check script3.1  Script Creation# cd /var/www/system# vi disk_capacity_check.shContents of disk_capacity_check.sh
Almalinux9.4_en

AlmaLinux9.4 : OS Install , Various settings

1.AlmaLinux 9.4AlmaLinux OS is a project launched by CloudLinux in the US as an alternative to CentOS. Currently, the AlmaLinux OS Foundation is the development parent organization.Following the general availability of Red Hat Enterprise Linux 9.0, AlmaLinux 9.0 was released on May 26, 2022.Like Red Hat Enterprise Linux 9, AlmaLinux 9 utilizes the same package versions as the Linux 5.14 kernel, GCC 11, Python 3.9, and RHEL9.Cockpit web management interface, enhanced kernel live patching, improved container and cloud integration, OpenSSL 3, and other security improvements.This time we will install AlmaLinux 9.4 with a minor upgrade on May 4, 2024.1.1 AlmaLinux 9.4 DownloadFor the AlmaLinux 9.4 installation image, go to the following site and download "AlmaLinux-9.4-x86_64-dvd.iso".https://ftp.jaist.ac.jp/pub/Linux/almalinux/9.4/isos/x86_64/
Almalinux9.4_en

AlmaLinux9.4 : FTP Server , Samba File Server

AlmaLinux9.4 ; FTP Server , Samba File Server1. FTP Server1. 1 Vsftpd Install# dnf -y install vsftpdInstalled: vsftpd-3.0.5-5.el9.x86_64Complete!2. vsftpd SSL/TLSConfigure Vsftpd to use SSL/TLS2.1 Create self-signed certificatesThis work is not required if you are using a trusted, legitimate certificate such as Let's Encrypt.3. File server installation with SambaBuild a file server with access rights that requires user authentication with Samba.Installation Procedure①Create shared folders with access rights that require user authentication②Accessible group creation③Creation of users belonging to accessible groups④Configuration File Editing
Almalinux9.4_en

AlmaLinux9.4 : WEB Server(Apache2) & Virtual Hosts

1.Apache2 Install , Virtual Host Configuration1.1 Apache2 install①httpd install# dnf -y install httpd1.3 Virtual Host SettingsAssign and configure the domain name [rocky.korodes.com] to the document root [/var/www/html/rocky.korodes.com] directory for virtual host operation2. Use of CGI Scripts①CGI availability check3. PHP installation and configuration1.PHP8 Install4. Digest authentication with Apache2Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.On the other hand, Digest Authentication encrypts and transmits authentication informa
Almalinux9.4_en

AlmaLinux9.4 : Anti-virus(Clamav) , Mail Server

clamav (anti-virus software] Install1.Clam AntiVirus install# dnf -y install clamav clamd clamav-update2.Clam AntiVirus  Configuration File EditMail Server Install1. Postfix1.1 InstallInstall Postfix and build an SMTP serverMail : Postfix + Clamav + clamav-milter+SpamAssassin1.Real-time scanning of e-mails①clamav-milter InstallVirus checks are performed on the mail server side using Clam AntiVirus.The mail server and Clam AntiVirus are linked using clamav-milter.
Almalinux9.4_en

AlmaLinux9.4 : SSL Certificate Acquisition( Let's Encrypt ) , Apache/Mail SSL

1.Obtain an SSL certificate ( Let's Encrypt )Install the latest open ssl# dnf install openssl-devel1.1 advance preparation1.Package management system Snappy installedSince the SSL certificate issuing tool "certbot" of Let's Encrypt is recommended to be installed using "snap" after 2021, install Snapd first.(Can also be installed the traditional way with dnf or yum)2. Converting Apache to httpsInstall the following just in case# dnf -y install mod_ssl3. SSL/TLS (Let's Encrypt) settings on the mail server3.1 Obtaining a certificate for the mail serverObtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.
Almalinux9.4_en

AlmaLinux9.4 : Suricata , Tripwire , Chkrootkit

SuricataSURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic.The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.1.advance preparation①Activate the EPEL RepositoryTripwire1.Installation# dnf install -y tripwireChkrootkit①Download and install chkrootkit
Almalinux9.4_en

AlmaLinux9.4 : SNORT3 Install

SNORT3 Snort is an open source network intrusion detection system capable of performing real-time traffic analysis and packet logging on IP networks。It can perform “protocol analysis,” “content search,” and “matching,” and can be used to detect various attacks such as “buffer overflows,” “stealth port scans,” “CGI attacks,” “SMB probes,” “OS fingerprinting attempts,” “semantic URL attacks,” and “server message block probes. The system can be used to detect a variety of attacks, such as
Almalinux9.4_en

AlmaLinux9.4 : Logwatch , Disk Usage Check Script

1. Logwatch①Install# dnf install logwatch②Edit configuration file2.Introduce disk usage check script2.1 Script Creation# cd /var/www/system# vi disk_capacity_check.sh
Debian12.8_en

Debian12.8 : SSH , UFW(Firewall)Setting

1. SSH Service Security SettingsThe SSH service allows the root user to log in by default, and since the root user already knows the user name and can log in to the server with administrative privileges once the password is known, we will deny this setting.1.1 Creating a General Userf you have created a general user when installing Debian, this procedure is not necessary.If the only user created on the server is root, remote login via SSH will not be possible, so if a user has not been created during OS installation, a user must be created in advance.Users can be created with the "useradd" command. The "-m" option creates a home directory and the "-p" option specifies the password.For example, to set "debianuser" as the user account name and "123456" as the password, execute the following2. Firewall SettingsSince Debian often uses software called "ufw" to configure firewalls, we will configure firewall settings using ufw.Since ufw is not installed when the OS is installed, the ufw package must be installed prior to configuration. The following is a procedure to configure minimal filter settings after installation.Filter rules to be set in ufw• All packets forwarded to the server are rejected• All packets sent from the server to the outside are allowed• The first port to allow is the port for SSH• Limit packets coming into the server
Debian12.8_en

Debian12.8 : SSH connection using public key cryptography

Create a key pairCreate a public/private key pair for a user connecting to a Linux server using OpenSSH.Use ssh-keygen to create the key pair.The creation of a public/private key pair must be done as a user with remote login privileges.If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
Debian12.8_en

Debian12.8 : WEB Server(Apache) , Digest authentication

Web server Apache2 installationAllow http:80 and https:443 ports in UFW before installation3.  Apache2; Using Perl ScriptsEnable CGI to make Perl scripts available①Install Perl4 Apache2 : Using PHP Scripts①Install PHP5. Virtual Host SettingsCopy the default configuration file (file name is arbitrary, in this case vhost-yourdomain.conf as an example) and configure the virtual host6. Digest authentication with Apache2Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.On the other hand, Digest Authentication encrypts and transmits authentication information, so there is almost no risk of information leakage.
Debian12.8_en

Debian12.8 : Anti-virus(Clamav) 、Mail Server

1.Antivirus software Clamav installedInstall Clam AntiVirus, a free anti-virus software for Linux, as an anti-virus measure.By installing this anti-virus software, you can not only scan the entire server for viruses, but also scan incoming and outgoing mail for viruses if you build and configure a mail server.2. Mail server installationPostfix was developed as a Mail Transport Agent (MTA) to replace sendmail, and is a mail server that is highly compatible with sendmail, secure, easy to maintain, and fast.In addition, since Postfix only functions as an SMTP server for sending mail, the POP server Dovecot for receiving mail will be installed separately in the latter half.3 Applied ClamAV to mail server PostfixSet up Postfix and Clamav to work together to scan incoming and outgoing mail in real time.4 Apply spam checks to the mail server4.1 Spam checking using spamassassin and procmail①spamassassin and procmail installation
Debian12.8_en

Debian12.8 : Let's Encrypt, WEB/Mail Server SSL

1. Obtain a certificate(Let's Encrypt)1.1 advance preparation1.Enable mod_ssl# a2enmod ssl2.Package management system Snappy installedLet's Encrypt's SSL certificate issuing tool "certbot" is recommended to be installed using "snap" after 2021, so install Snapd first.2. SSL/TLS (Let's Encrypt) configuration for Apache2①Edit Apache2 SSL-related configuration fileshoge.com-ssl in hoge.com-ssl.conf is an arbitrary name3. SSL/TLS (Let's Encrypt) settings on the mail server3.1 Obtaining a certificate for the mail serverObtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.
Debian12.8_en

Debian12.8 : MariaDB , WordPress Install

1. MariaDB1.1 Install# apt install mariadb-serverMariaDB version confirmation# mariadb -Vmariadb Ver 15.1 Distrib 10.11.6-MariaDB, for debian-linux-gnu (x86_64) using EditLine wrapper1.2 MariaDB Server Security SettingsMariaDB comes with a default security script, mariadb-secure-installation, which can be used to improve the security of your MariaDB installation, includingSet a password for the root account (if necessary).Disable remote root login to the database.Delete anonymous user accounts.Delete the test database to which anonymous users have access by default.2.WordPress2.1 Database CreationCreate a database for Word Press (for example, in this case, the database name is "wp_db", the user name is "wp_user", and the password is "?Y123456y")