利用 OpenSSL 提升 Linux 网络安全
一 基础加固与更新
二 正确部署 TLS 与证书
openssl genpkey -algorithm RSA -out server.key 2048openssl req -new -key server.key -out server.csropenssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crtssl_protocols TLSv1.2 TLSv1.3;ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384';ssl_prefer_server_ciphers on;ssl_certificate /path/fullchain.pem; ssl_certificate_key /path/privkey.pem;ssl_dhparam /path/dhparams.pem;ssl_stapling on; ssl_stapling_verify on; ssl_trusted_certificate /path/fullchain.pem; resolver 8.8.8.8 8.8.4.4 valid=300s;return 301 https://$host$request_uri;add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;三 验证与测试
openssl s_client -connect example.com:443 -servername example.com -tls1_2,检查返回的协议、套件、证书链与 OCSP 装订状态。openssl verify -CAfile ca_bundle.crt server.crt,并查看证书细节:openssl x509 -in server.crt -noout -text。openssl s_server -www -key server.key -cert server.crt -port 4433,再用 s_client 连接测试。s_client 指定协议版本(如 -tls1_2)确认未退化到低版本/弱套件。四 纵深防护与运维
ausearch 分析异常;结合 nmap/OpenVAS/Nessus 做端口与服务漏洞扫描。