总体安全原则
最小化启用与访问控制
加固 xinetd 配置
only_from = 192.168.1.0/24instances = 3deny_users = root(或仅允许特定用户:only_users = telnetuser)access_times = 08:00-18:00service telnet
{
flags = REUSE
socket_type = stream
wait = no
user = root
server = /usr/sbin/in.telnetd
log_on_failure += USERID
disable = no
only_from = 192.168.1.0/24
instances = 3
deny_users = root
access_times = 08:00-18:00
}
systemctl restart xinetd(或 service xinetd restart)。加密与网络层防护
apt-get/yum install openssh-server && systemctl start sshd && systemctl enable sshdfirewall-cmd --permanent --add-service=ssh && firewall-cmd --reloadapt-get/yum install stunnel4openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/stunnel/stunnel.pem -out /etc/stunnel/stunnel.pem[telnet]
accept = 12345
connect = 127.0.0.1:23
cert = /etc/stunnel/stunnel.pem
key = /etc/stunnel/stunnel.pem
systemctl start stunnel4 && systemctl enable stunnel4telnet your_server 12345(实际通过TLS加密传输)运维与审计建议
telnet host 80 验证HTTP服务),不作为日常远程登录手段。