Ubuntu Cobbler安全策略设置指南
setenforce 0;永久关闭(需重启):编辑/etc/selinux/config,将SELINUX=enforcing改为SELINUX=disabled。ufw,允许Cobbler必需端口(69/UDP用于TFTP、80/TCP用于HTTP、25150/TCP用于Cobbler XMLRPC API):sudo ufw allow 69/udp
sudo ufw allow 80/tcp
sudo ufw allow 25150/tcp
sudo ufw enable
若使用firewalld(如CentOS),需开放对应端口并禁用SELinux。/etc/cobbler/settings,将default_password_crypted设置为生成的加密密码(使用openssl passwd -1生成):sudo sed -i "s/default_password_crypted:.*/default_password_crypted: $(openssl passwd -1)/" /etc/cobbler/settings
cobblerd、httpd、tftpd等服务以nobody或专用低权限用户运行(默认通常为root,需修改服务配置文件中的User和Group参数)。/etc/cobbler)、镜像目录(如/var/www/cobbler)的权限应设为750,仅允许必要用户访问:sudo chown -R root:nogroup /etc/cobbler /var/www/cobbler
sudo chmod -R 750 /etc/cobbler /var/www/cobbler
sudo apt update && sudo apt upgrade cobbler cobbler-web tftpd-hpa isc-dhcp-server apache2 -y
/etc/cobbler/users.conf,限制XMLRPC API访问权限,仅允许授权用户(如管理员)使用API密钥或用户名/密码登录。Allow from指令),仅允许可信IP地址访问Cobbler Web界面(默认端口80)。/etc/cobbler/settings,开启log_level为debug(生产环境建议设为info),记录所有操作日志:sudo sed -i "s/log_level:.*/log_level: debug/" /etc/cobbler/settings
journalctl或grep命令分析/var/log/cobbler/cobbler.log、/var/log/apache2/access.log,及时发现异常登录、未授权访问等行为。/etc/apache2/sites-available/cobbler.conf,修改Listen指令。/etc/cobbler/settings中设置anonymous_access: False,禁止未授权用户浏览Cobbler资源。