防范Linux Telnet的安全風險可以采取以下措施:
sudo systemctl stop telnet.socket
sudo systemctl disable telnet.socket
sudo apt-get install openssh-server # Debian/Ubuntu
sudo yum install openssh-server # CentOS/RHEL
sudo systemctl start sshd
sudo systemctl enable sshd
iptables:sudo iptables -A INPUT -p tcp --dport 23 -s <trusted_ip> -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 23 -j DROP
ufw(Uncomplicated Firewall):sudo ufw allow from <trusted_ip> to any port 23
sudo ufw deny 23
sudo passwd <username>
sudo apt-get update && sudo apt-get upgrade # Debian/Ubuntu
sudo yum update # CentOS/RHEL
rsyslog或syslog-ng來記錄SSH登錄嘗試:sudo nano /etc/rsyslog.conf
# 添加以下行
auth,authpriv.* /var/log/auth.log
sudo tail -f /var/log/auth.log
sudo setenforce 1 # 啟用SELinux
sudo nano /etc/selinux/config
# 設置 SELINUX=enforcing
sudo aa-enforce /etc/apparmor.d/usr.sbin.sshd
sudoers文件來限制用戶的權限:sudo visudo
# 添加以下行來限制特定用戶的權限
username ALL=(ALL) ALL, !/usr/sbin/telnetd
通過以上措施,可以顯著降低Linux Telnet帶來的安全風險。建議優先考慮使用SSH作為遠程管理工具。