这篇文章上次修改于 241 天前,可能其部分内容已经发生变化,如有疑问可询问作者。

debian初始化:

connect using SSH -->

copy
    sudo su
    passwd root
    useradd appadmin
    passwd appadmin
Xshell

打开SSH配置文件/etc/ssh/sshd_config,使用root权限进行编辑:

copy
    vim /etc/ssh/sshd_config
Xshell
copy
 PermitRootLogin no                         //允许root登录      
 PasswordAuthentication yes                 //设置是否使用口令验证
Xshell
copy
    service sshd reload
Xshell

在root账号下,执行如下命令安装sudo。

copy
apt install sudo -y
Xshell

添加你的本地用户到 sudo 组,可以使用 usermod 命令,如下:

copy
usermod -aG sudo linux265
Xshell

校正日期和时间:
-- 时区列表

copy
    timedatectl list-timezones
Xshell

-- 修改系统时区为亚洲/上海

copy
    sudo timedatectl set-timezone Asia/Shanghai
Xshell

-- 查看

copy
    timedatectl
Xshell

进行系统更新:

copy
    sudo apt update
    sudo apt upgrade -y
Xshell

完成后安装常用软件:

copy
    sudo apt-get install zsh wget curl zip git vim -y
Xshell

1.没有ls命令:

copy
    vi /root/.bashrc 
    . /root/.bashrc 
Xshell

2.创建shadowsock,查看官网最新版本
参考:https://github.com/shadowsocks/shadowsocks-rust
例如:

  • 下载:download shadowsocks

    copy
      wget https://github.com/shadowsocks/shadowsocks-rust/releases/download/v1.16.1/shadowsocks-v1.16.1.x86_64-unknown-linux-gnu.tar.xz
    Xshell
  • 处理

    copy
      tar -xf shadowsocks-v1.16.1.x86_64-unknown-linux-gnu.tar.xz 
      mv ss* /usr/local/bin/.
      cd /etc
      mkdir shadowsocks
      cd shadowsocks/
      vi config.json
      ssserver -c /etc/shadowsocks/config.json
      nohup ssserver -c /etc/shadowsocks/config.json &
      ps -ef|grep sss
    Xshell
  • 加入系统服务:

    copy
      cd /etc/systemd/system/
      vi shadowsocks.service
      input:
      
      [Unit]
      Description=Shadowsocks Logging Service
      [Service]
      Type=simple
      ExecStart=/usr/local/bin/ssserver -c /etc/shadowsocks/config.json
      [Install]
      WantedBy=multi-user.target
      
      systemctl daemon-reload
      systemctl enable shadowsocks
      systemctl start shadowsocks
    Xshell

3.安装fail2ban:

copy
    apt-get install fail2ban
    
    systemctl status fail2ban
    cd /etc/fail2ban/
    cp jail.local .
    
    systemctl start fail2ban
Xshell