業務用エアコン関連の技術情報、エラーコード、環境問題対策に関する別サイト「エアコンの安全な修理・適切なフロン回収」

nuy

Debian10.13_en

Debian10.13 : System Backup and Restore

1. System Backup1.1 Backup under /var/www/html① Create backu...
Debian10.13_en

Debian10.13 : logwatch ,Disk Usage Check Script

1. Disk Usage Check Script1.1 Script CreationContents of dis...
Ubuntu24.04_en

Ubuntu24.04 : Zabbix7 Install

Installation of open source integrated monitoring software "Zabbix7".Zabbix is an open source integrated monitoring software for centralized monitoring of servers, networks and applications. It provides monitoring, fault detection and notification functions required for integrated monitoring. With Zabbix agent and SNMP support for many platforms, you can monitor your entire system with a single Zabbix.To run Zabbix, you will need the PHP programming language, MySQL/MariaDB as a database server, and a web server such as Apache or Nginx.In this case, we will assume that all of the following conditions have already been configured.This time we will install Zabbix 7.0 LTS released on 06/04/2024 in the following environment.Apache/2.4.5810.11.8-MariaDBPHP 8.3.6PHP-fpm
Ubuntu24.04_en

Ubuntu Server24.04 : SSH connection with authentication using public key cryptography

SSH connection with authentication using public key cryptography Creation of public and private key pairsCreate a public/private key pair for a user connecting to the Linux server using OpenSSH.Use ssh-keygen to create key pairs.Creation of public/private key pairs is performed with remote login user privileges。If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
Almalinux9.2_en

AlmaLinux9.2 ; Suricata , Tripwire , Chkrootkit

SuricataSURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic.The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.Tripwire1.Download and installationChkrootkit①Download and install chkrootkit
Almalinux9.2_en

AlmaLinux9.2 ; SSL Certificate Acquisition( Let's Encrypt ) , Apache SSL , Mail SSL/TLS

1. .Obtain an SSL certificate ( Let's Encrypt )Install the latest open ssl1.1 advance preparation1.Package management system Snappy installedSince the SSL certificate issuing tool "certbot" of Let's Encrypt is recommended to be installed using "snap" after 2021, install Snapd first.(Can also be installed the traditional way with dnf or yum)2. Converting Apache to httpsInstall the following just in case3. SSL/TLS (Let's Encrypt) settings on the mail server3.1 Obtaining a certificate for the mail serverObtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.
Almalinux9.2_en

AlmaLinux9.2 ; OS Install

AlmaLinux 9.2 InstallAlmaLinux OS is a project launched by CloudLinux in the US as an alternative to CentOS. Currently, the AlmaLinux OS Foundation is the development parent organization.Following the general availability of Red Hat Enterprise Linux 9.0, AlmaLinux 9.0 was released on May 26, 2022.Like Red Hat Enterprise Linux 9, AlmaLinux 9 utilizes the same package versions as the Linux 5.14 kernel, GCC 11, Python 3.9, and RHEL9.Cockpit web management interface, enhanced kernel live patching, improved container and cloud integration, OpenSSL 3, and other security improvements.This time we will install AlmaLinux 9.2 with a minor upgrade on May 11, 2023.
OracleLinux9.4_en

OracleLinux9.4 : OS INSTALL 、Initialization

OracleLinux9.4Oracle Linux provides a 100% application binary compatible alternative to Red Hat Enterprise Linux and CentOS Linux for both hybrid and multi-cloud environments.Since 2006, Oracle Linux has been completely free to download and use. Source code, binaries and updates are provided free of charge. It is freely redistributable. Free for use in production environments.We will proceed with the latest Oracle Linux 9.4 (released May 15, 2024).1.Oracle Linux9.4 DownloadDownload the Oracle Linux 9.4 installation image (OracleLinux-R9-U4-x86_64-dvd.iso ) from the following sitehttps://yum.oracle.com/oracle-linux-isos.html2.Oracle Linux 9.4 InstallInstall USB media, change BIOS settings to boot from USB media, and install.
Almalinux9.2_en

AlmaLinux9.2 ; Various settings after installation

1.Disabling SELinuxFirst, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it places considerable restrictions on the behavior of services and on what can be configured. Therefore, it is basically disabled in many cases.SELinux Operation ModeEnforcing : SELinux functionality is enabled and access control is enabledPermissive : SElinux will warn, but no access restrictions will be placeddisabled : Both SElinux function and access control are disabled
Rocky Linux9.2_en

Rocky Linux9.2 ; MySQL8 , WordPress Install

MySQL8 Installcharset.cnf Create a new one with the followin...
Rocky Linux9.2_en

Rocky Linux9.2 ; Anti-virus(Clamav) , Mail Server

clamav (anti-virus software] Install1.Clam AntiVirus install# dnf -y install clamav clamd clamav-update2.Clam AntiVirus  Configuration File EditMail Server Install1. Postfix1.1 InstallInstall Postfix and build an SMTP server
Rocky Linux9.2_en

Rocky Linux9.2 ; WEB Server(Apache2) & Virtual Hosts

1.Apache2 Install , Virtual Host Configuration1.1 Apache2 install①httpd install# dnf -y install httpd1.3 Virtual Host SettingsAssign and configure the domain name [rocky.korodes.com] to the document root [/var/www/html/rocky.korodes.com] directory for virtual host operation2. Use of CGI Scripts①CGI availability check3. PHP installation and configuration1.PHP8 Install4. Digest authentication with Apache2Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.On the other hand, Digest Authentication encrypts and transmits authentication informa
Rocky Linux9.2_en

Rocky Linux9.2 ; SSH connection with public key

SSH connection with authentication using public key cryptography Creation of public and private key pairsCreate a public/private key pair for a user connecting to the Linux server using OpenSSH.Use ssh-keygen to create key pairs.Creation of public/private key pairs is performed with remote login user privileges。If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
Rocky Linux9.2_en

Rocky Linux9.2 ; Various settings after installation

1.Disabling SELinuxFirst, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it places considerable restrictions on the behavior of services and on what can be configured. Therefore, it is basically disabled in many cases.SELinux operating modesEnforcing : SELinux functionality is enabled and access control is enabledPermissive : SElinux will warn, but no access restrictions will be placeddisabled : Both SElinux function and access control are disabled2.System ModernizationPackage updates are performed as soon as possible immediately after OS installation.However, when a dnf update is performed, a kernel update is also performed at the same time.A kernel update may require rebooting the system or stopping services, or worse, a kernel panic may occur and the system may not boot. It is wiser to exclude the kernel from the update.The kernel can be excluded from updates by running dnf -y update with "--exclude=kernel*" after it.
Rocky Linux9.2_en

Rocky Linux9.2 ; SSH、firewalld 、NTP Server

1.Remote connection via SSHSSH is a service for connecting remotely to a server and is basically running immediately after the OS is installed, but the default settings are somewhat insecure.Here we will configure the default settings to increase the security of ssh connections.1.1 Edit SSH service configuration fileModify the configuration file to change the SSH service settings.The SSH service configuration file is "/etc/ssh/sshd_config".2.Firewall (firewalld) settingsThe firewall is set to firewalld as default and is enabled during OS installation.4.NTP ServerBuild an NTP server to synchronize the server time with Japan Standard Time