解决方案:
redhat6、7与centos6、7版本升级到openssh8.1版本与openssl-1.1.1自动化脚本,解决linuxOpenSSH输入验证错误漏洞(CVE-2019-16905)
解决步骤:
1、附件
https://www.o6c.com/wp-content/uploads/2020/11/漏洞修补文件命令.rar
2、解压升级包
tar –no-same-owner -zxvf zlib-1.2.11.tar.gz
tar –no-same-owner -zxvf openssh-8.3p1.tar.gz
tar –no-same-owner -zxvf openssl-1.1.1g.tar.gz
3、编译安装zlib
cd zlib-1.2.11
./configure –prefix=/usr/local/zlib
make && make install
4、编译安装openssl
cd openssl-1.1.1g
./config –prefix=/usr/local/ssl -d shared
make && make install
echo ‘/usr/local/ssl/lib’ >> /etc/ld.so.conf
ldconfig -v
5、安装openssh
cd openssh-8.3p1
./configure –prefix=/usr/local/openssh –with-zlib=/usr/local/zlib –with-ssl-dir=/usr/local/ssl
make && make install
6、sshd_config文件修改
echo ‘PermitRootLogin yes’ >>/usr/local/openssh/etc/sshd_config
echo ‘PubkeyAuthentication yes’ >>/usr/local/openssh/etc/sshd_config
echo ‘PasswordAuthentication yes’ >>/usr/local/openssh/etc/sshd_config
7、备份原有文件,并将新的配置复制到指定目录
复制代码
mv /etc/ssh/sshd_config /etc/ssh/sshd_config.bak
cp /usr/local/openssh/etc/sshd_config /etc/ssh/sshd_config
mv /usr/sbin/sshd /usr/sbin/sshd.bak
cp /usr/local/openssh/sbin/sshd /usr/sbin/sshd
mv /usr/bin/ssh /usr/bin/ssh.bak
cp /usr/local/openssh/bin/ssh /usr/bin/ssh
mv /usr/bin/ssh-keygen /usr/bin/ssh-keygen.bak
cp /usr/local/openssh/bin/ssh-keygen /usr/bin/ssh-keygen
mv /etc/ssh/ssh_host_ecdsa_key.pub /etc/ssh/ssh_host_ecdsa_key.pub.bak
cp /usr/local/openssh/etc/ssh_host_ecdsa_key.pub /etc/ssh/ssh_host_ecdsa_key.pub
复制代码
8、启动sshd
service sshd restart
9、查看信息版本
ssh -V
10、升级完成后sftp登录后瞬间断开问题
修改/etc/ssh/sshd_config 文件中sftp路径,改为
Subsystem sftp /usr/libexec/sftp-server
文章不错非常喜欢
I just like the helpful information you provide in your articles. Halie Lorin Gautier
ooooo super 🙂
I am glad you have been on your site on the advice of friends, thanks.
I do not know what I would have tried without these techniques shared by you regarding this subject matter.