業務用エアコン関連の技術情報、エラーコード、環境問題対策に関する別サイト「エアコンの安全な修理・適切なフロン回収」

nuy

Rocky Linux9.2_en

Rocky Linux9.2 ; OS Install

Rocky Linux9.2The Rocky Release Engineering team announced the latest version of Rocky Linux 9.0 on July 14, 2022.Rocky Linux is a Linux distribution compatible with Red Hat Enterprise Linux; Rocky Linux 9 is a compatible release with RHEL 9 released in May and will be supported until the end of May 2032.This time we will install Rocky Linux 9.2, released May 16, 2023, which is the same as 9.0 9.1.
Almalinux9.2_en

AlmaLinux9.2 ; Anti-virus(Clamav) , Mail Server

Clamav (anti-virus software)Install1.Clam AntiVirus InstallMail Server Install1. Postfix1.1 InstallInstall Postfix and build an SMTP serverMail Server : Postfix + Clamav + Amavisd+SpamAssassin1.Real-time scanning of e-mails①Amavisd ,Clamav Server install
Rocky Linux9.2_en

Rocky Linux9.2 ; SSL Certificate Acquisition( Let's Encrypt ) , Apache SSL , Mail SSL/TLS

1.Obtain an SSL certificate ( Let's Encrypt )Install the latest open ssl# dnf install openssl-devel1.1 advance preparation1.Package management system Snappy installedSince the SSL certificate issuing tool "certbot" of Let's Encrypt is recommended to be installed using "snap" after 2021, install Snapd first.(Can also be installed the traditional way with dnf or yum)2. Converting Apache to httpsInstall the following just in case# dnf -y install mod_ssl3. SSL/TLS (Let's Encrypt) settings on the mail server3.1 Obtaining a certificate for the mail serverObtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.
Almalinux9.2_en

AlmaLinux9.2 ; WEB Server(Apache2) & Virtual Hosts

1.Apache2 Install , Virtual Host Configuration1.1 Apache2 install2. Use of CGI Scripts①CGI availability check3. PHP installation and configuration4. Digest authentication with Apache2Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.On the other hand, Digest Authentication encrypts and transmits authentication information, so there is almost no risk of information leakage.
Almalinux9.2_en

AlmaLinux9.2 ; System Backup and Restore

1.Website data backup1-1.Backup under /var/www/html①Create backup script file# cd /var/www/system# vi backup_html.sh2.MySQL database backup①Create backup script file# cd /var/www/system# vi db_my_backup.sh3.Restore backup files under html①Store HTML backup files in "/ (root)" directory4.Restore Mysql backup file①Save the database backup file to any directory and(In the example, the directory is "/var/www/backup/db_bak".)Extracting data
Almalinux9.2_en

AlmaLinux9.2 ; FTP Server , Samba FileServer Install

2. Vsftpd over SSL/TLSLS2.1 Create self-signed certificatesThis work is not required if you are using a trusted, legitimate certificate such as Let's Encrypt.3. File server installation with SambaBuild a file server with access rights that requires user authentication with Samba.Installation Procedure①Create shared folders with access rights that require user authentication②Accessible group creation③Creation of users belonging to accessible groups④Configuration File Editing
Almalinux9.2_en

AlmaLinux9.2 ; SSH、Firewalld、NTP Server

1.SSH remote connectionSSH is a service for connecting remotely to a server and is basically running immediately after the OS is installed, but the default settings are somewhat insecure.Here we will configure the default settings to increase the security of ssh connections.1.1 SSH service configuration file changes
Almalinux9.2_en

AlmaLinux9.2 ; Logwatch , DiCe , Disk Usage Check Script

Logwatch , DiCe , Disk Usage Check Script
Rocky Linux9.2_en

Rocky Linux9.2 ; Logwatch , DiCE , Disk Usage Check Script

1. Logwatch①Install# dnf install logwatch②Edit configuration file2. DiCEWhenever the global IP changes, which happens when the network is disconnected or the router is disconnected and rebooted, the dynamic DNS must be accessed to inform the user that the global IP has changed. DiCE does this automatically!3.Introduce disk usage check script3.1 Script Creation# cd /var/www/system# vi disk_capacity_check.sh
Rocky Linux9.2_en

Rocky Linux9.2 ; FTP Server , Samba File Server

1.FTP Server1. 1 Vsftpd Install# dnf -y install vsftpd1.2 Configure VsftpdSave the unedited vsftpd.conf with .bak3. File server installation with SambaBuild a file server with access rights that requires user authentication with Samba.Installation Procedure①Create shared folders with access rights that require user authentication②Accessible group creation③Creation of users belonging to accessible groups④Configuration File Editing
Rocky Linux9.2_en

Rocky Linux9.2 ; Suricata , Tripwire , Chkrootkit

SuricataSURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic.The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.1.advance preparation①Activate the EPEL RepositoryTripwire1.Installation# dnf install -y tripwireChkrootkit①Download and install chkrootkit
Rocky Linux9.2_en

Rocky Linux9.2 ; System Backup and Restore

1.Website data backup1-1.Backup under /var/www/html①Create backup script file# cd /var/www/system# vi backup_html.sh2.MySQL database backup①Create backup script file# cd /var/www/system# vi db_my_backup.sh3.Restore backup files under html①Store HTML backup files in "/ (root)" directory4.Restore Mysql backup file①Save the database backup file to any directory and(In the example, the directory is "/var/www/backup/db_bak".)Extracting data
Almalinux9.2_en

AlmaLinux9.2 ; MySQL8 , WordPress Install

Mysql8 , WordPress InstallWordPress Install1. Create database for Word PressAs an example, assume database [wp_db] database user [wp_user] password [?Ww123456]
Almalinux9.2_en

AlmaLinux9.2 ; Authenticated SSH connection with key pair

SSH connection with authentication using public key cryptography Create public and private key pairsCreate a public/private key pair for a user connecting to a Linux server using OpenSSH.Use ssh-keygen to create the key pair.The creation of a public/private key pair must be done as a user with remote login privileges.If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
LinuxTips(RedHat)_en

Delete user

The command to delete a user is userdel.When this command is executed, the user information will be deleted, but the user's home directory will be left behind.If you want to delete the home directory as well, specify "-r" as an option and execute it.