linux中编译Nginx支持Tcp_wrappers的配置方法不简单,自己测试了很久没有成功,后来看到此文章后得己解决了,下面整理一下与各位参考.
Tcp wrappers:Transmission Control Protocol (TCP) Wrappers 为由 inetd 生成的服务提供了增强的安全性。TCP Wrappers 是一种对使用 /etc/inetd.sec 的替换方法。TCP Wrappers 提供防止主机名和主机地址欺骗的保护。欺骗是一种伪装成有效用户或主机以获得对系统进行未经授权的访问的方法。
1、重新编译Nginx,代码如下:
- [root@ipythonnginx-1.6.1]#tarzxf../ngx_tcpwrappers.tar.gz-C./
- [root@ipythonnginx-1.6.1]#./configure--prefix=/software/nginx--user=nginx--group=nginx--with-http_stub_status_module--with-http_ssl_module--with-http_realip_module--with-http_gzip_static_module--with-google_perftools_module--with-debug--http-client-body-temp-path=/var/tmp/nginx/client--http-proxy-temp-path=/var/tmp/nginx/proxy--http-fastcgi-temp-path=/var/tmp/nginx/fastcgi--http-uwsgi-temp-path=/var/tmp/nginx/uwsgi--http-scgi-temp-path=/var/tmp/nginx/scgi--with-pcre=/root/pcre-8.35--with-openssl=/root/openssl-1.0.1i--with-zlib=/root/zlib-1.2.8--add-module=./ngx_tcpwrappers--phpfensi.com
- [root@ipythonnginx-1.6.1]#sed-is'#CFLAGS=-pipe-O-W-Wall-Wpointer-arith-Wno-unused-parameter-Werror#CFLAGS=-pipe-O-W-Wall-Wpointer-arith-Wno-unused-parameter-g#'objs/Makefile
- ####不要makeinstall哦,编译好即可####
- [root@ipythonnginx-1.6.1]#make
2、完成升级,以及模块的使用,Nginx还是很奇特的哦~~代码如下:
- ####备份可执行文件,复制新的文件####
- [root@ipythonnginx-1.6.1]#mv/software/nginx/sbin/nginx/software/nginx/conf/@nginx
- [root@ipythonnginx-1.6.1]#cpobjs/nginx/software/nginx/sbin/
- ####测试新版本的Nginx####
- [root@ipythonnginx-1.6.1]#/software/nginx/sbin/nginx-t
- nginx:theconfigurationfile/software/nginx/conf/nginx.confsyntaxisok
- nginx:configurationfile/software/nginx/conf/nginx.conftestissuccessful
- ###此时没有加入Tcp_wrappers的配置测试下访问###
- [root@ipythonopenssl-1.0.1i]#curl-Ihttp://www.111cn.net
- HTTP/1.1200OK
- Server:nginx/1.6.1
- Date:Mon,11Aug201423:08:08GMT
- Content-Type:text/html
- Content-Length:612
- Last-Modified:Mon,11Aug201422:45:25GMT
- Connection:keep-alive
- ETag:"53e94785-264"
- Accept-Ranges:bytes
- ###平滑升级###
- [root@ipythonnginx-1.6.1]#makeupgrade
- ##测试模块,拒绝1.1.1.30的Nginx请求####在http块里加入如下配置##
- tcpwrapperson;
- tcpwrappers_daemonnginx;
- tcpwrappers_thoroughoff;
- ##hosts.deny如下##
- [root@ipythonnginx-1.6.1]#awk'!/^#/'/etc/hosts.deny
- nginx:1.1.1.30
- ##重新读取Nginx配置文件##
- [root@ipythonnginx-1.6.1]#/software/nginx/sbin/nginx-sreload
- ###此时访问就是403了###
- [root@itchenyi~]#curl-Ihttp://www.111cn.net
- HTTP/1.1403Forbidden
- Server:nginx/1.6.1
- Date:Mon,11Aug201423:12:47GMT
- Content-Type:text/html
- Content-Length:168
- Connection:keep-alive
3、Tcp_warppers 模块指令:
###ngx_Tcp_wrappers 配置指令###
1、tcpwrappers
语法:tcpwrappers [on|off]
默认值:tcpwrappers off
作用域:http,server,location,limit_except
描述:模块的开关,开启则使用TCP Wrappers 进行访问控制,关闭以避免浪费性能.
2、tcpwrappers_daemon
语法:tcpwrappers_daemon name
默认值:tcpwrappers_daemon nginx
作用域:http,server,location,limit_except
描述:该名字的定义用于在/etc/hosts.[allow|deny]识别
3、tcpwrappers_thorough
语法:tcpwrappers_thorough [on|off]
默认值:tcpwrappers_thorough off
作用域:http,server,location,limit_except
描述:基于hosts.ctl以检查使用IP地址、用户名、反向DNS解析,模块的开发者也未提供详细的使用说明.