воскресенье, 2 августа 2015 г.

Правильный config no-ip.com ddclient ubuntu server


# /etc/ddclient.conf
use=web, web=checkip.dyndns.com/, web-skip='IP Address'
protocol=dyndns2
#use=if, if=eth0
server=dynupdate.no-ip.com
login=flomaster
password='Zet8794'
krolik.ddns.net

суббота, 1 августа 2015 г.

Рабочий samba config


[global]
workgroup = WORKGROUP
server string = Samba Server %v
netbios name = server
security = user
map to guest = bad user
dns proxy = no
#============================ Share Definitions ==============================

[tmp]
path = /tmp
browsable =yes
writable = yes
guest ok = yes
read only = no

[www]
comment = www data
path = /var/www
read only = No
guest ok = Yes
browseable = Yes
writeable = yes

[owncloud]
comment = owncloud data
path = /media/server/owncloud
read only = Yes
guest ok = Yes
browseable = Yes
writeable = No

среда, 6 мая 2015 г.

Установка SSL сертификата на Apache

1) Генерируем key
openssl req -out mydomain.com.csr -new -sha256 -newkey rsa:2048 -nodes -keyout mydomain.com.key
2.Создайте блоки <VirtualHost> для подключения SSL-соединения.

Ниже приведен очень простой пример виртуального хоста для SSL-соединения. Части, выделенные жирным должны быть добавлены в SSL конфигурацию: 

<VirtualHost 192.168.88.1:443>
DocumentRoot /var/www/html/rlan/pub
ServerName www.rlan.tk
SSLEngine on
SSLCertificateFile /path/to/your_domain_name.crt
SSLCertificateKeyFile /path/to/your_private.key
SSLCertificateChainFile /path/to/root.crt

</VirtualHost>

3.Исправьте имена файлов для согласования с файлами сертификатов:



  • SSLCertificateFile должен быть файлом вашего сертификата (например: your_domain_name.crt).
  • SSLCertificateKeyFile должен быть файлом ключа, созданного при генерации CSR.
  • SSLCertificateChainFile должен быть файлом корневого сертификата.

    4. Проверьте конфигурацию Apache до перезапуска.

    Всегда лучше проверить файлы конфигурации Apache на ошибки до перезапуска, потому что Apache не запустится заново, если в файлах конфигурации будут синтаксические ошибки. Используйте следующую команду:

    apachectl configtest 

  • не забываем вписать тут /etc/apache2/mods-available/ssl.conf 


    SSLUseStapling On
    SSLStaplingCache shmcb:${APACHE_RUN_DIR}/ssl_stapling(32768)


    000-default-ssl.conf
    SSLEngine on SSLCertificateFile /etc/ssl/private/2_rlan.tk.crt

    SSLCertificateKeyFile /etc/ssl/private/rlan.tk.key

    SSLCertificateChainFile /etc/ssl/private/1_root_bundle.crt

    пятница, 27 февраля 2015 г.

    LAMP-сервер на базе Ubuntu 14.04 LTS

    Логинимся к серверу по протоколу SSH:
    ssh administrator@IP сервера
    Заходим в систему под именем administrator и своим паролем.
    Получаем права рута:
    sudo su
    Вводим свой пароль.
    Синхронизируем системное время:
    apt-get install ntp ntpdate
    Обновляем систему:
    apt-get update && apt-get upgrade
    31.png

    Мониторинг трафика в реальном времени ubuntu server

    1)sudo vnstat --live 2)sudo iptraf

    Запись загрузочных образов ISO на USB flash в linux ubuntu

    Запись с помощью команды dd

    В консоли набираем следующее:
    dd if=ubuntu-14.04.2-server-amd64.iso of=/dev/sdc bs=1MB
    
    if = и далее путь до файла образа
    of = где /dev/sdc это  флешка. 
    bs=1MB - записывать на флэшку блоками по 1Мбайту

    понедельник, 23 февраля 2015 г.

    Mikrotik Firewall









    Мой вариант фаервола и вильра на домашнем роуторе 951





    /ip firewall filter
    add chain=input connection-state=invalid action=drop comment="Drop Invalid connections"
    add chain=input connection-state=established action=accept comment="Allow Established connections"
    add chain=input protocol=udp action=accept comment="Allow UDP"
    add chain=input protocol=icmp action=accept comment="Allow ICMP"
    add chain=input src-address=192.168.0.0/24 action=accept comment="Allow access to router from known network"
    add chain=input action=drop comment="Drop anything else"

    /ip firewall filter
    add chain=forward protocol=tcp connection-state=invalid action=drop comment="drop invalid connections"
    add chain=forward connection-state=established action=accept comment="allow already established connections"
    add chain=forward connection-state=related action=accept comment="allow related connections"

    add chain=forward src-address=0.0.0.0/8 action=drop
    add chain=forward dst-address=0.0.0.0/8 action=drop
    add chain=forward src-address=127.0.0.0/8 action=drop
    add chain=forward dst-address=127.0.0.0/8 action=drop
    add chain=forward src-address=224.0.0.0/3 action=drop
    add chain=forward dst-address=224.0.0.0/3 action=drop

    add chain=forward protocol=tcp action=jump jump-target=tcp
    add chain=forward protocol=udp action=jump jump-target=udp
    add chain=forward protocol=icmp action=jump jump-target=icmp

    add chain=tcp protocol=tcp dst-port=69 action=drop comment="deny TFTP"
    add chain=tcp protocol=tcp dst-port=111 action=drop comment="deny RPC portmapper"
    add chain=tcp protocol=tcp dst-port=135 action=drop comment="deny RPC portmapper"
    add chain=tcp protocol=tcp dst-port=137-139 action=drop comment="deny NBT"
    add chain=tcp protocol=tcp dst-port=445 action=drop comment="deny cifs"
    add chain=tcp protocol=tcp dst-port=2049 action=drop comment="deny NFS"
    add chain=tcp protocol=tcp dst-port=12345-12346 action=drop comment="deny NetBus"
    add chain=tcp protocol=tcp dst-port=20034 action=drop comment="deny NetBus"
    add chain=tcp protocol=tcp dst-port=3133 action=drop comment="deny BackOriffice"
    add chain=tcp protocol=tcp dst-port=67-68 action=drop comment="deny DHCP"

    add chain=udp protocol=udp dst-port=69 action=drop comment="deny TFTP"
    add chain=udp protocol=udp dst-port=111 action=drop comment="deny PRC portmapper"
    add chain=udp protocol=udp dst-port=135 action=drop comment="deny PRC portmapper"
    add chain=udp protocol=udp dst-port=137-139 action=drop comment="deny NBT"
    add chain=udp protocol=udp dst-port=2049 action=drop comment="deny NFS"
    add chain=udp protocol=udp dst-port=3133 action=drop comment="deny BackOriffice"

    add chain=icmp protocol=icmp icmp-options=0:0 action=accept comment="drop invalid connections"
    add chain=icmp protocol=icmp icmp-options=3:0 action=accept comment="allow established connections"
    add chain=icmp protocol=icmp icmp-options=3:1 action=accept comment="allow already established connections"
    add chain=icmp protocol=icmp icmp-options=4:0 action=accept comment="allow source quench"
    add chain=icmp protocol=icmp icmp-options=8:0 action=accept comment="allow echo request"
    add chain=icmp protocol=icmp icmp-options=11:0 action=accept comment="allow time exceed"
    add chain=icmp protocol=icmp icmp-options=12:0 action=accept comment="allow parameter bad"
    add chain=icmp action=drop comment="deny all other types"


    /ip firewall filter
    add action=drop chain=input comment="drop ssh brute forcers" disabled=no dst-port=22 protocol=tcp src-address-list=ssh_blacklist
    add action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=1w3d chain=input connection-state=new disabled=no dst-port=22 protocol=tcp src-address-list=ssh_stage3
    add action=add-src-to-address-list address-list=ssh_stage3 address-list-timeout=1m chain=input connection-state=new disabled=no dst-port=22 protocol=tcp src-address-list=ssh_stage2
    add action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m chain=input connection-state=new disabled=no dst-port=22 protocol=tcp src-address-list=ssh_stage1
    add action=add-src-to-address-list address-list=ssh_stage1 address-list-timeout=1m chain=input connection-state=new disabled=no dst-port=22 protocol=tcp
    add action=drop chain=input comment="drop telnet brute forcers" disabled=no dst-port=23 protocol=tcp src-address-list=telnet_blacklist
    add action=add-src-to-address-list address-list=telnet_blacklist address-list-timeout=1w3d chain=input connection-state=new disabled=no dst-port=23 protocol=tcp src-address-list=telnet_stage3
    add action=add-src-to-address-list address-list=telnet_stage3 address-list-timeout=1m chain=input connection-state=new disabled=no dst-port=23 protocol=tcp src-address-list=telnet_stage2
    add action=add-src-to-address-list address-list=telnet_stage2 address-list-timeout=1m chain=input connection-state=new disabled=no dst-port=23 protocol=tcp src-address-list=telnet_stage1
    add action=add-src-to-address-list address-list=telnet_stage1 address-list-timeout=1m chain=input connection-state=new disabled=no dst-port=23 protocol=tcp

    add action=drop chain=input disabled=no src-address-list="port scanners" comment="port scanners"
    add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input disabled=no protocol=tcp psd=21,3s,3,1
    add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input disabled=no protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
    add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input disabled=no protocol=tcp tcp-flags=fin,syn
    add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input disabled=no protocol=tcp tcp-flags=syn,rst
    add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input disabled=no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
    add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
    add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input disabled=no protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg

    /ip firewall filter
    add action=drop chain=forward comment="block socials" dst-address-list=!yes_social layer7-protocol=social protocol=tcp src-port=80
    add action=drop chain=forward dst-address-list=!yes_social layer7-protocol=social protocol=tcp src-port=443
    /ip firewall layer7-protocol
    add name=social regexp="^.+(vk.com|vkontakte|odnoklassniki|odnoklasniki|facebook|fall-in-love|loveplanet|my.mail.ru).*\$"


    /ip firewall filter
    add chain=forward protocol=tcp dst-port=25 src-address-list=spammer
    action=drop comment="BLOCK SPAMMERS OR INFECTED USERS"
    add chain=forward protocol=tcp dst-port=25 connection-limit=30,32 limit=50,5 action=add-src-to-address-list
    address-list=spammer address-list-timeout=1d comment="Detect and add-list SMTP virus or spammers"

    /ip firewall filter

    add action=add-src-to-address-list address-list=Syn_Flooder address-list-timeout=30m chain=input \
    comment="Add Syn Flood IP to the list" connection-limit=30,32 disabled=no protocol=tcp tcp-flags=syn
    add action=drop chain=input comment="Drop to syn flood list" disabled=no src-address-list=Syn_Flooder
    add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1w chain=input comment="Port Scanner Detect"\
    disabled=no protocol=tcp psd=21,3s,3,1
    add action=drop chain=input comment="Drop to port scan list" disabled=no src-address-list=Port_Scanner
    add action=jump chain=input comment="Jump for icmp input flow" disabled=no jump-target=ICMP protocol=icmp
    add action=drop chain=input\
    comment="Block all access to the winbox - except to support list # DO NOT ENABLE THIS RULE BEFORE ADD YOUR SUBNET IN THE SUPPORT ADDRESS LIST"\
    disabled=yes dst-port=8291 protocol=tcp src-address-list=!support
    add action=jump chain=forward comment="Jump for icmp forward flow" disabled=no jump-target=ICMP protocol=icmp
    add action=drop chain=forward comment="Drop to bogon list" disabled=no dst-address-list=bogons
    add action=add-src-to-address-list address-list=spammers address-list-timeout=3h chain=forward comment="Add Spammers to the list for 3 hours"\
    connection-limit=30,32 disabled=no dst-port=25,587 limit=30/1m,0 protocol=tcp
    add action=drop chain=forward comment="Avoid spammers action" disabled=no dst-port=25,587 protocol=tcp src-address-list=spammers
    add action=accept chain=input comment="Accept DNS - UDP" disabled=no port=53 protocol=udp
    add action=accept chain=input comment="Accept DNS - TCP" disabled=no port=53 protocol=tcp
    add action=accept chain=input comment="Accept to established connections" connection-state=established\
    disabled=no
    add action=accept chain=input comment="Accept to related connections" connection-state=related disabled=no
    add action=accept chain=input comment="Full access to SUPPORT address list" disabled=no src-address-list=support
    add action=drop chain=input comment="Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED"\
    disabled=yes
    add action=accept chain=ICMP comment="Echo request - Avoiding Ping Flood" disabled=no icmp-options=8:0 limit=1,5 protocol=icmp
    add action=accept chain=ICMP comment="Echo reply" disabled=no icmp-options=0:0 protocol=icmp
    add action=accept chain=ICMP comment="Time Exceeded" disabled=no icmp-options=11:0 protocol=icmp
    add action=accept chain=ICMP comment="Destination unreachable" disabled=no icmp-options=3:0-1 protocol=icmp
    add action=accept chain=ICMP comment=PMTUD disabled=no icmp-options=3:4 protocol=icmp
    add action=drop chain=ICMP comment="Drop to the other ICMPs" disabled=no protocol=icmp
    add action=jump chain=output comment="Jump for icmp output" disabled=no jump-target=ICMP protocol=icmp

    /ip firewall filter

    add chain = forward p2p = all-p2p action = accept comment = "P2P traffic" disabled = no