Apache安全加固–修复SSL/TLS弱密码漏洞(中危)和禁用TRACE/TRACK方法(高危)


先看看扫描到的漏洞截图下面是详细的操作解决方案(以下的配置经过了多次的修改才将漏洞真正修复完毕):安全配置一:[root@liulingli html]# find / -name .htaccess/var/www/html/wp-content/cache/autoptimize/.htaccessvim /var/www/html/wp-content/cache/autoptimize/.htaccess添加如下5行RewriteEngine onRewriteCond %{REQUEST_METHOD}^(TRACE|TRACK)RewriteRule .*-[F]重启httpd服务[root@liulingli html]# service httpd restartStopping httpd: [ OK ]Starting httpd: [ OK ]安全配置二:echo “net.ipv4.tcp_timestamps = 0” >> /etc/sysctl.confsysctl -p安全配置三:免费云主机域名vim /etc/httpd/conf.d/ssl.conf原来的配置# SSL Protocol support:# List the enable protocol levels with which clients will be able to# connect. Disable SSLv2 access by default:SSLProtocol all -SSLv2# SSL Cipher Suite:# List the ciphers that the client is permitted to negotiate.# See the mod_ssl documentation for a complete list.SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW修改成以下配置:SSLProtocol all -SSLv2 -SSLv3# SSL Cipher Suite:# List the ciphers that the client is permitted to negotiate.# See the mod_ssl documentation for a complete list.SSLHonorCipherOrder onSSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-RC4-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:RC4-SHA:!aNULL:!MD5:!DSS:!RC4并且添加以下三行RewriteEngine onRewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)RewriteRule .* – [F]service httpd restart注意}后面有空格,否则无法重启httpd服务再次对网站进行扫描,发现高危和中危漏洞警报都已经消除。经过了10次修改和扫描,才最终解决。

相关推荐: ubuntu中如何卸载google

这篇文章主要介绍“ubuntu中如何卸载google”,在日常操作中,相信很多人在ubuntu中如何卸载google问题上存在疑惑,小编查阅了各式资料,整理出简单好用的操作方法,希望对大家解答”ubuntu中如免费云主机域名何卸载google”的疑惑有所帮助!…

免责声明:本站发布的图片视频文字,以转载和分享为主,文章观点不代表本站立场,本站不承担相关法律责任;如果涉及侵权请联系邮箱:360163164@qq.com举报,并提供相关证据,经查实将立刻删除涉嫌侵权内容。

(0)
打赏 微信扫一扫 微信扫一扫
上一篇 01/24 18:30
下一篇 01/24 18:31