Ubuntu 上 vsftpd 防止暴力破解的实用方案
一 核心思路
二 快速落地步骤
安装并启用 Fail2Ban
sudo apt-get update && sudo apt-get install fail2ban -ysudo nano /etc/fail2ban/jail.local[DEFAULT]
bantime = 600
maxretry = 3
[vsftpd]
enabled = true
port = ftp
filter = vsftpd
logpath = /var/log/vsftpd.log
maxretry = 3
bantime = 600
sudo systemctl restart fail2ban && sudo systemctl enable fail2ban加固 vsftpd 基础配置
sudo nano /etc/vsftpd.confanonymous_enable=NO
local_enable=YES
write_enable=YES
chroot_local_user=YES
allow_writeable_chroot=YES
userlist_enable=YES
userlist_deny=NO
userlist_file=/etc/vsftpd/user_list
xferlog_enable=YES
xferlog_file=/var/log/vsftpd.log
启用 SSL/TLS 加密
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/ssl/private/vsftpd.key -out /etc/ssl/certs/vsftpd.crtssl_enable=YES
rsa_cert_file=/etc/ssl/certs/vsftpd.crt
rsa_private_key_file=/etc/ssl/private/vsftpd.key
force_local_logins_ssl=YES
force_local_data_ssl=YES
防火墙与被动端口
sudo ufw allow 21/tcp
sudo ufw allow 40000:50000/tcp
sudo ufw enable
三 进阶防护与可选措施
PAM 账户锁定(可选,叠加 Fail2Ban 更稳妥)
sudo nano /etc/pam.d/vsftpdauth required pam_tally2.so deny=3 unlock_time=300
account required pam_tally2.so
访问控制与端口隐蔽
sudo ufw deny 21/tcp
sudo ufw allow from <可信IP或网段> to any port 21
listen_port=2123
四 验证与运维
sudo fail2ban-client status vsftpdsudo tail -f /var/log/vsftpd.log,确认失败登录是否出现并被 Fail2Ban 处理sudo apt-get update && sudo apt-get upgrade -y,及时修补安全漏洞。