業務用エアコン関連の技術情報、エラーコード、環境問題対策に関する別サイト「エアコンの安全な修理・適切なフロン回収」

nuy

fedora40_en

Fedora40 : Various settings after installation

1. SELinux DisableFirst, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it can limit the behavior of services and the configuration considerably.Therefore, it is basically invalidated in many cases.You can disable it by doing the following。2. System modernization & Services suspended due to security measures2.1 System modernization3.Network Settings3.1 Set host nameTo set the hostname to "Lepard4.Install NTP server and set up time synchronization service4.1 Chrony Install5.Set server time zoneSet time zone to Japan (Tokyo)6.Install and configure vim editor①Installing the vim package
fedora40_en

Fedora40 : OS Install

Fedora40 ; Download(Released on April 24, 2024)Fedora40 can be downloaded from the following mirrorhttps://ftp.riken.jp/Linux/fedora/releases/40/Server/x86_64/iso/The file to download is the "Fedora-Server-dvd-x86_64-40-1.14.iso" imageCreate an installation disk from the downloaded "Fedora-Server-dvd-x86_64-40-1.14.iso" image on a USB disk and install it on the actual device.Fedora40 ; Install①Change to boot from USB disk on the BIOS change screen of the PC and boot the PC.Select "Install Fedoara 40" at the top and press Enter
fedora41_en

Fedora41 : Tripwire,Logwatch,Disk Usage Check Script

Tripwire1.Install# dnf -y install tripwire2.Passphrase settingLogwatch①Install# dnf install logwatch②Edit configuration fileIntroduce disk usage check script1. Script Creation# cd /var/www/system# vi disk_capacity_check.sh
fedora41_en

Fedora41 : SNORT3 Install

SNORT3Snort is an open source network intrusion detection system that can perform real-time traffic analysis and packet logging on IP networks.It can perform "protocol analysis," "content search," and "matching" and can be used to detect a variety of attacks such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, semantic URL attacks, and server message block probes. detection.
fedora41_en

Fedora41 : Suricata Install

SuricataSURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic.The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.
fedora41_en

Fedora41 : Mysql8 , WordPress

Mysql8 Install# dnf -y install mysql-serverCreate a new charset.cnf with the following contentsWordPress Install1. Create database for Word PressAs an example, assume database [wp_db] database user [wp_user] password [?W123456]
fedora41_en

Fedora41 : SSL Certificate Acquisition( Let's Encrypt ) , Apache , Mail SSL

1.Obtain an SSL certificate ( Let's Encrypt )Install the latest open ssl# dnf install openssl-devel1.1 advance preparation1.Package management system Snappy installedSince the SSL certificate issuing tool "certbot" of Let's Encrypt is recommended to be installed using "snap" after 2021, install Snapd first.(Can also be installed the traditional way with dnf or yum)3. SSL/TLS (Let's Encrypt) settings on the mail server3.1 Obtaining a certificate for the mail serverObtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.
fedora41_en

Fedora41 : WEB Server(Apache2)

1. Apache2 installation and virtual host configuration1.1 Apache2 Install①httpd Install# dnf -y install httpdVersion Check# httpd -vServer version: Apache/2.4.62 (Fedora Linux)Server built: Aug 1 2024 00:00:001.2 Apache Configuration1.3 Virtual Host SettingsAssign and configure the [FQDN] to be operated on the virtual host in the document root [/var/www/html/FQDN] directory2. Ensure CGI Script Usage①Confirmation of CGI availability3. PHP installation and configuration3.1.PHP Install①Install4. Digest authentication in Apache2Since Basic Authentication, a well-known authentication authentication method for http, transmits authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.On the other hand, Digest Authentication encrypts the authentication information and sends it in encrypted form, so there is almost no risk of information leakage
fedora41_en

Fedora41 : FTP Server(Vsftpd) , File Server(Samba)

1.FTP Server Installation1. 1 Vsftpd Install# dnf install vsftpd2. vsftpd SSL/TLSConfigure Vsftpd to use SSL/TLS2.1 Create self-signed certificatesThis work is not required if you are using a trusted, legitimate certificate such as Let's Encrypt.3. File server installation with SambaBuild a file server with access rights that requires user authentication with Samba.Installation Procedure① Create shared folders with access rights that require user authentication②Creation of accessible groups③Creation of users belonging to groups that can be accessed④Configuration File Editing
fedora41_en

Fedora41 : Remote connection with SSH public key cryptography

Remote connection with SSH public key cryptography  Creation of public and private key pairsCreate a public/private key pair for a user connecting to a Linux server using OpenSSH.Use ssh-keygen to create the key pair.The creation of a public/private key pair is performed with the authority of the user logging in remotely.If you do not specify the creation destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, also enter the password for the key.
fedora41_en

Fedora41 : SSH 、Firewalld

1.Remote connection by SSHSSH is a service for connecting remotely to a server, basically running immediately after OS installation, but the default settings are somewhat insecure.Configure the default settings to increase the security of ssh connections.1.1 SSH service configuration file changesThe SSH service configuration file is "/etc/ssh/sshd_config".Open the configuration file in a vi editor.2.Firewall (firewalld) settingsIn Fedora, firewalld is set as the default and is enabled during OS installation.2.1 How to use the "firewall-cmd" command to control "firewalld1)Command to check the status and settings of "firewalld①Check firewalld operation status
fedora41_en

Fedora41 : OS Install , Various settings

Fedora41Download( October 29, 2024 Release)Fedora41 can be downloaded from the following mirror siteshttps://ftp.riken.jp/Linux/fedora/releases/41/Server/x86_64/iso/The file to download is the “Fedora-Server-dvd-x86_64-41-1.4.iso” imageCreate an installation disk from the downloaded “Fedora-Server-dvd-x86_64-41-1.14.iso” image on a USB disk and install it on the actual device.INSTALLChange to boot from USB disk on the BIOS change screen of the PC and boot the PC.Select “Install Fedoara 41” at the top and press EnterThe subsequent installation procedure is the same as for Fedora 40, so please refer to the following page.Various settings1. SELinux DisableFirst, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it can limit the behavior of services and the configuration considerably.Therefore, it is basically invalidated in many cases.You can disable it by doing the following
Rocky Linux8.6_en

Rocky Linux8.6 : SSH Public Key Cryptography Authentication

SSH connection with authentication using RSA public key cryptographyCreation of public and private key pairsCreate a public/private key pair for a user connecting to a Linux server using OpenSSH.Use ssh-keygen to create the key pair.This time, we will create a key set using the RSA cipher used in the SSH protocol Version 2.Creation of public/private key pairs is performed with remote login user privileges (huong).If you do not specify the destination and file name, id_rsa and id_rsa.pub will be created in /home/huong/.ssh/. On the way, enter the password for the key.
Rocky Linux8.6_en

Rocky Linux8.6 : System Backup and Restore

1.Website data backup1-1. Backup under /var/www/html①Creating backup script files# cd /var/www/system# vi backup_html.sh2. MySQL database backup①Creating backup script files# cd /var/www/system3. Restore backup files under html① Store HTML backup files in "/ (root)" directory# cd /var/www/backup/html_bak# cp html_back_20220610.tar.gz /    ←Specify the backup file with the latest date4. Restore Mysql Backup Files①Save DB backup file to any directory(In the example, the directory is "/var/www/backup/db_bak") Extract data
Rocky Linux8.6_en

Rocky Linux8.6 : Logwatch ,Disk Usage Check Script

1. Logwatch① Install# dnf install logwatch② Edit configuration file# cat /usr/share/logwatch/default.conf/logwatch.conf >> /etc/logwatch/conf/logwatch.conf2. Introduce disk usage check script2.1 Scripting# cd /var/www/system