当前位置:首页>Linux>等保测评命令——rocky linux

等保测评命令——rocky linux

  • 2026-03-25 11:13:30
等保测评命令——rocky linux

各位大佬,想看那种网络设备/操作系统/数据库/中间件的测评命令清单,可在留言区留言,我会以最快速度给你们总结,然后发出来!

依据 GB/T 22239-2019《信息安全技术 网络安全等级保护基本要求》第三级"安全计算环境" 条款,结合 Rocky Linux 8.x/9.x 官方安全指南、CIS Rocky Linux Benchmark 及多家测评机构现场实践,给出可直接落地的 测评命令清单

已在 Rocky Linux 8.9 / 9.3 环境验证通过,支持 Minimal / Server / Server with GUI 多种安装模式。


一、身份鉴别(8.1.4.1)

1.1 账户唯一性与密码策略

控制项
测评命令
达标判据
空口令检查
awk -F: '$2==""{print $1}' /etc/shadow
无输出
密码锁定账户
awk -F: '$2~"^!"{print $1}' /etc/shadow
核实锁定原因
密码有效期
chage -l username
 / grep -E 'PASS_MAX_DAYS|PASS_MIN_DAYS|PASS_WARN_AGE' /etc/login.defs
≤90天,≥1天,≥7天预警
密码复杂度
cat /etc/security/pwquality.conf
 / authselect current
启用pam_pwquality,minlen=8,minclass=3
密码历史
grep 'remember' /etc/pam.d/system-auth /etc/pam.d/password-auth
remember≥12

Rocky Linux特有配置:

# Rocky Linux使用authselect管理PAM配置(替代传统pam_tally2)authselect currentauthselect list# 查看密码策略详细配置cat /etc/security/pwquality.conf | grep -v '^#' | grep -v '^$'# 查看特定用户密码状态chage -l username# 查看所有用户密码过期信息for user in $(awk -F: '$3>=1000{print $1}' /etc/passwd); do    echo "=== $user ==="    chage -l $user 2>/dev/null | head -5done# Rocky特有:使用authselect启用with-pwhistory配置文件authselect select sssd --force 2>/dev/null || authselect select minimal with-pwhistory --force# 检查是否启用faillock(替代pam_tally2)grep 'pam_faillock' /etc/pam.d/system-auth /etc/pam.d/password-authcat /etc/security/faillock.conf | grep -v '^#' | grep -v '^$'

1.2 登录失败处理与会话超时

控制项
测评命令
达标判据
登录失败锁定
cat /etc/security/faillock.conf
 / grep 'pam_faillock' /etc/pam.d/system-auth
deny=5,unlock_time=300
失败记录查看
faillock --user username
查看具体用户失败记录
会话超时
echo $TMOUT
 / cat /etc/profile.d/tmout.sh
TMOUT=600(秒)
SSH超时
grep -E 'ClientAliveInterval|ClientAliveCountMax' /etc/ssh/sshd_config
300秒无操作断开

Rocky Linux特有配置:

# Rocky Linux 8/9默认使用pam_faillock(替代pam_tally2)cat /etc/pam.d/system-auth | grep faillockcat /etc/pam.d/password-auth | grep faillock# 查看faillock详细配置cat /etc/security/faillock.conf | grep -v '^#' | grep -v '^$'# 查看特定用户失败记录faillock --user rootfaillock --user username --reset# 查看全局超时配置cat /etc/profile.d/tmout.sh 2>/dev/null || grep TMOUT /etc/profile /etc/bashrc# Rocky特有:使用tmout.sh标准配置cat > /etc/profile.d/tmout.sh << 'EOF'TMOUT=600readonly TMOUTexport TMOUTEOF# 查看SSH安全配置grep -E 'PermitRootLogin|Protocol|PasswordAuthentication|PubkeyAuthentication|ClientAlive' /etc/ssh/sshd_config# 检查cockpit服务超时(Rocky默认启用)grep 'IdleTimeout' /etc/cockpit/cockpit.conf 2>/dev/null || echo "未配置cockpit超时"

1.3 远程管理安全

# 查看SSH服务状态(Rocky使用systemd)systemctl status sshd# 检查SSH安全配置grep -E 'PermitRootLogin|Protocol|PasswordAuthentication|PubkeyAuthentication|AllowUsers|AllowGroups' /etc/ssh/sshd_config# 查看SSH监听地址ss -tlnp | grep :22# 检查Telnet(应未安装)rpm -qa | grep telnetdnf list installed telnet-server 2>/dev/null || echo "Telnet未安装"# 检查cockpit(Rocky默认Web管理工具)systemctl status cockpit.socket 2>/dev/null || echo "cockpit未启用"grep -E 'Origins|ProtocolHeader|ForwardTo' /etc/cockpit/cockpit.conf 2>/dev/null | head -5# 查看允许的SSH用户/组grep -E 'AllowUsers|AllowGroups|DenyUsers|DenyGroups' /etc/ssh/sshd_config# Rocky特有:检查是否启用SCAP安全策略rpm -qa | grep scap-security-guideoscap info /usr/share/xml/scap/ssg/content/ssg-rl9-ds.xml 2>/dev/null || \oscap info /usr/share/xml/scap/ssg/content/ssg-rl8-ds.xml 2>/dev/null || \echo "SCAP安全指南未安装"

高风险项:启用Telnet或允许root远程登录、未限制cockpit访问、SSH使用弱算法,直接判定不符合三级要求。


1.4 双因子认证(高风险项)

测评方法:

  • 访谈确认:是否采用"口令+智能卡/硬件令牌/YubiKey"组合

  • 技术核查

# 检查Google Authenticator配置cat /etc/pam.d/sshd | grep google-authenticatorcat /etc/pam.d/login | grep google-authenticator# 检查YubiKey配置cat /etc/pam.d/sshd | grep yubikeyrpm -qa | grep yubikey# 检查智能卡/CCID配置cat /etc/pam.d/sshd | grep pam_pkcs11systemctl status pcscd 2>/dev/null || echo "PCSC智能卡服务未运行"# 查看已安装的2FA软件包rpm -qa | grep -E 'google-authenticator|yubikey|libu2f|pam_u2f'# 检查SSH密钥认证ls -la /home/*/.ssh/authorized_keys 2>/dev/null | head -5find /home -name "authorized_keys" -exec ls -la {} \; 2>/dev/null | head -5# Rocky特有:检查是否启用FIDO2/WebAuthn(9.x支持)grep 'AuthenticationMethods' /etc/ssh/sshd_config 2>/dev/null

二、访问控制(8.1.4.2)

2.1 账户与权限管理

控制项
测评命令
达标判据
系统账户
awk -F: '$3<1000 && $1!="root"{print $1}' /etc/passwd
仅保留必需系统账户
sudo授权
cat /etc/sudoers
 / ls -la /etc/sudoers.d/
最小权限原则,使用wheel组
关键文件权限
stat -c '%a %n' /etc/passwd /etc/shadow /etc/group /etc/gshadow
644/000/644/000
umask值
grep -r 'umask' /etc/profile.d/ /etc/profile /etc/bashrc 2>/dev/null
022或027

Rocky Linux特有配置:

# Rocky默认sudo配置(使用wheel组)grep '%wheel' /etc/sudoersgrep '%wheel' /etc/sudoers.d/* 2>/dev/null | head -3# 查看具体用户sudo权限sudo -l -U username# 检查polkit权限(Rocky默认)cat /etc/polkit-1/localauthority.conf.d/*.conf 2>/dev/null | head -10rpm -qa | grep polkit# 检查关键文件权限stat -c '%a %U:%G' /etc/passwd /etc/shadow /etc/group /etc/gshadow# Rocky特有:检查是否启用fapolicyd(应用程序白名单)systemctl status fapolicyd 2>/dev/null || echo "fapolicyd未启用"cat /etc/fapolicyd/rules.d/ 2>/dev/null | head -5# 检查SELinux状态(Rocky默认启用Enforcing)getenforcesestatuscat /etc/selinux/config | grep SELINUX=

2.2 默认账户清理

# 确认默认账户禁用或删除grep -E 'games|news|uucp|proxy|www-data|backup|list|irc|gnats' /etc/shadow# Rocky特有:检查系统账户锁定状态for user in games news uucp proxy backup list irc gnats; do    passwd -S $user 2>/dev/null | grep -E 'LK|NP' && echo "$user: 已锁定或无密码"done# 检查无登录shell的账户awk -F: '$7=="/sbin/nologin" || $7=="/bin/false" || $7=="/usr/sbin/nologin"{print $1}' /etc/passwd | head -10# 锁定不必要的账户sudo passwd -l games 2>/dev/nullsudo passwd -l news 2>/dev/null# Rocky特有:检查是否删除preuseradd创建的默认账户cat /etc/default/useradd | grep INACTIVEuseradd -D | grep INACTIVE

2.3 SELinux强制访问控制(Rocky核心安全特性)

# Rocky Linux默认启用SELinux,这是与CentOS/RHEL一致的核心安全机制# 查看SELinux状态getenforcesestatus# 查看SELinux模式配置cat /etc/selinux/config | grep -E '^SELINUX=|^SELINUXTYPE='# 查看当前策略sestatus | grep 'Loaded policy name'# 查看SELinux布尔值getsebool -a | grep -E 'ssh|http|ftp|nfs|samba' | head -20# 查看文件安全上下文ls -Z /etc/passwd /etc/shadow /var/www/html 2>/dev/null | head -5# 查看进程安全上下文ps -eZ | grep -E 'sshd|httpd|crond' | head -5# 查看SELinux审计日志ausearch -m avc,user_avc,selinux_err -ts today 2>/dev/null | tail -10cat /var/log/audit/audit.log 2>/dev/null | grep 'type=AVC' | tail -5# 查看SELinux故障排除sealert -a /var/log/audit/audit.log 2>/dev/null | head -10 || echo "setroubleshoot未安装"# Rocky特有:检查是否启用SELinux用户约束semanage login -l 2>/dev/null | head -10semanage user -l 2>/dev/null | head -10

三、安全审计(8.1.4.3)

3.1 审计服务启用

控制项
测评命令
达标判据
auditd服务
systemctl is-active auditd && systemctl is-enabled auditd
active & enabled
审计规则
auditctl -l | wc -l
≥30条
日志保留
grep -E 'max_log_file|num_logs' /etc/audit/auditd.conf
单文件≥50MB,保留≥6个月
日志权限
stat -c '%a %U:%G' /var/log/audit/audit.log
640 root:root

Rocky Linux特有配置:

# Rocky默认启用auditd(与RHEL一致)systemctl status auditdsystemctl is-enabled auditd# 查看审计规则auditctl -l 2>/dev/null | wc -lauditctl -l 2>/dev/null | head -20# 查看审计规则文件ls -la /etc/audit/rules.d/cat /etc/audit/rules.d/audit.rules 2>/dev/null || cat /etc/audit/audit.rules# Rocky特有:使用预定义审计规则ls /usr/share/doc/audit/rules/ 2>/dev/null | head -10# 生成审计报告aureport --summary 2>/dev/null | head -20aureport --login --summary -i 2>/dev/null | head -10aureport --user -i --summary 2>/dev/null | head -10# 查看SELinux审计(与auditd协同)ausearch -m avc -ts recent 2>/dev/null | tail -10# Rocky特有:检查是否启用auditd插件(如syslog转发)cat /etc/audit/plugins.d/ 2>/dev/null | head -5

3.2 日志管理与保护

# Rocky使用rsyslog + journald(systemd)# 查看rsyslog配置cat /etc/rsyslog.conf | grep -v '^#' | grep -v '^$' | head -20ls -la /etc/rsyslog.d/# 查看rsyslog远程转发grep '@' /etc/rsyslog.conf /etc/rsyslog.d/*.conf 2>/dev/null | head -5# 查看journald配置cat /etc/systemd/journald.conf | grep -v '^#' | grep -v '^$'# 查看日志持久化grep Storage /etc/systemd/journald.conf  # 应为persistent# 查看日志磁盘使用journalctl --disk-usage# 查看日志保留策略journalctl --vacuum-time=6months  # 设置保留6个月# 查看日志权限ls -la /var/log/ | head -15stat -c '%a %U:%G' /var/log/messages /var/log/secure /var/log/audit/audit.log 2>/dev/null# Rocky特有:检查是否启用logrotate(默认启用)cat /etc/logrotate.conf | grep -v '^#' | head -10ls /etc/logrotate.d/ | head -10# 检查是否启用systemd-coredump(替代传统core dump)cat /etc/systemd/coredump.conf 2>/dev/null | head -10

四、入侵防范(8.1.4.4)

4.1 最小化安装与漏洞修复

控制项
测评命令
达标判据
待更新包
dnf check-update 2>/dev/null | wc -l
及时更新安全补丁
安全更新
dnf updateinfo list security 2>/dev/null
无未修复安全漏洞
服务最小化
systemctl list-unit-files --state=enabled | grep -vE 'ssh|audit|rsyslog|cron|systemd'
仅业务所需
监听端口
ss -tulnp | grep LISTEN
无高危端口(111, 23, 513等)

Rocky Linux特有配置:

# 查看可更新包dnf check-update 2>/dev/null | wc -l | xargs -I {} echo "可更新包数: {}"# 查看安全更新(Rocky特有,使用Red Hat安全数据)dnf updateinfo list security 2>/dev/null | head -20dnf updateinfo list sec 2>/dev/null | head -20# 查看已安装包数量rpm -qa | wc -l# 查看系统版本cat /etc/os-release | grep -E 'NAME|VERSION|ID_LIKE'cat /etc/redhat-release 2>/dev/null || cat /etc/rocky-release# 查看已启用服务systemctl list-unit-files --state=enabled | grep -vE 'ssh|audit|rsyslog|cron|systemd|chrony|NetworkManager|firewalld' | head -20# 检查高危端口ss -tulnp | grep LISTEN | grep -E ':23|:111|:513|:514|:2049'# Rocky特有:检查是否启用kpatch/livepatch(内核热补丁)systemctl status kpatch 2>/dev/null || echo "kpatch未启用"dnf list installed kpatch-dnf 2>/dev/null || echo "kpatch未安装"# 检查是否启用BPF/BCC工具rpm -qa | grep -E 'bcc-tools|bpftrace' | head -5

4.2 防火墙与网络防护

# Rocky默认使用firewalld(替代iptables)# 查看firewalld状态systemctl status firewalldfirewall-cmd --state# 查看firewalld默认区域firewall-cmd --get-default-zonefirewall-cmd --get-active-zones# 查看firewalld规则firewall-cmd --list-allfirewall-cmd --list-all-zones | head -50# 查看富规则firewall-cmd --list-rich-rules# 查看直接规则(兼容iptables)firewall-cmd --direct --get-all-rules# 检查nftables后端(Rocky 9默认)nft list ruleset 2>/dev/null | head -30# 检查iptables兼容模式iptables -L -n -v 2>/dev/null | head -10# 检查TCP Wrapper配置(传统兼容)cat /etc/hosts.allowcat /etc/hosts.deny# 检查fail2ban(入侵防御)systemctl status fail2ban 2>/dev/null || echo "fail2ban未运行"fail2ban-client status 2>/dev/nullfail2ban-client status sshd 2>/dev/null# Rocky特有:检查是否启用fapolicyd(应用程序白名单)systemctl status fapolicyd 2>/dev/null || echo "fapolicyd未启用"cat /etc/fapolicyd/fapolicyd.conf 2>/dev/null | head -10fapolicyd-cli --list 2>/dev/null | head -10

4.3 安全启动与内核加固

# 检查Secure Boot状态mokutil --sb-state 2>/dev/null || echo "Secure Boot未启用或mokutil未安装"bootctl status 2>/dev/null | head -10# 查看内核参数安全设置sysctl -a 2>/dev/null | grep -E 'icmp_echo_ignore_all|rp_filter|syncookies|kptr_restrict' | head -10# 查看当前内核启动参数cat /proc/cmdline# Rocky特有:检查是否启用内核模块签名cat /proc/sys/kernel/modules_disabled 2>/dev/nullsysctl kernel.modules_disabled 2>/dev/null# 查看内核锁定(Rocky 9支持)cat /proc/sys/kernel/lockdown 2>/dev/null || echo "内核锁定未配置"# 检查IMA/EVM(完整性度量)cat /sys/kernel/security/ima/ascii_runtime_measurements 2>/dev/null | head -5dmesg | grep -i 'ima\|evm' | head -5# 查看已加载的内核模块签名状态modinfo $(lsmod | awk 'NR==2{print $1}') 2>/dev/null | grep -E 'sig|signer'

五、恶意代码防范(8.1.4.5)

控制项
测评命令
达标判据
ClamAV安装
rpm -qa | grep clamav
已安装
ClamAV状态
systemctl is-active clamd
active
病毒库更新
freshclam --version
24小时内更新
实时扫描
systemctl is-active clamav-daemon
active(如安装)

Rocky Linux特有配置:

# 检查ClamAV安装rpm -qa | grep clamav | head -5# 查看ClamAV服务systemctl status clamd@scan 2>/dev/null || systemctl status clamd 2>/dev/null || echo "clamd未运行"# 手动更新病毒库sudo freshclam# 查看病毒库版本freshclam --version 2>/dev/null# 查看ClamScan计划任务cat /etc/cron.d/clamav-update 2>/dev/nullcat /etc/sysconfig/freshclam 2>/dev/null | head -5# 检查Rootkit Hunterrpm -qa | grep rkhuntersudo rkhunter --check --sk 2>/dev/null | tail -20# 检查 chkrootkitrpm -qa | grep chkrootkit# Rocky特有:检查是否启用OpenSCAP扫描rpm -qa | grep openscap-scanneroscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis /usr/share/xml/scap/ssg/content/ssg-rl9-ds.xml 2>/dev/null | tail -20 || \oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis /usr/share/xml/scap/ssg/content/ssg-rl8-ds.xml 2>/dev/null | tail -20 || \echo "SCAP扫描未执行或内容未安装"# 检查是否启用AIDE(文件完整性)rpm -qa | grep aidecat /etc/aide.conf 2>/dev/null | head -20

六、可信验证(8.1.4.6)

控制项
测评命令
达标判据
TPM状态
dmesg | grep -i tpm
TPM 2.0就绪
Secure Boot
mokutil --sb-state
SecureBoot enabled
内核模块签名
cat /proc/sys/kernel/modules_disabled
模块签名验证
文件完整性
rpm -Va 2>/dev/null | head -20
无关键文件被篡改

Rocky Linux特有配置:

# 查看TPM状态dmesg | grep -i "tpm\|trusted platform"ls /dev/tpm* 2>/dev/null# 查看Secure Boot状态mokutil --sb-state 2>/dev/null || echo "Secure Boot未启用"bootctl status 2>/dev/null | grep -E 'SecureBoot|SetupMode'# 查看内核安全启动cat /proc/sys/kernel/secure_boot 2>/dev/null# 验证RPM包完整性(Rocky原生支持)rpm -Va 2>/dev/null | grep -E '^S.5....T\|^..5....T\|^.......T' | head -20# 验证特定关键包rpm -V coreutils bash kernel systemd 2>/dev/null | head -10# 查看内核模块签名modinfo $(lsmod | awk 'NR==2{print $1}') 2>/dev/null | grep -E 'sig|signer|integ'# Rocky特有:检查是否启用IMA appraisalcat /sys/kernel/security/ima/policy 2>/dev/null | head -5# 安装并运行Lynis安全扫描rpm -qa | grep lynissudo lynis audit system --quick 2>/dev/null | grep -E 'Warning|Suggestion' | head -20# 使用OpenSCAP进行合规扫描oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_stig /usr/share/xml/scap/ssg/content/ssg-rl9-ds.xml 2>/dev/null || \oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_stig /usr/share/xml/scap/ssg/content/ssg-rl8-ds.xml 2>/dev/null

七、数据备份与恢复(8.1.4.9)

控制项
测评命令
达标判据
备份策略
cat /etc/cron.d/backup 2>/dev/null | grep -i backup
每日/每周任务
备份工具
rpm -qa | grep -E 'rear|bacula|amanda|restic|borg'
已安装备份工具
备份目录权限
stat -c '%a %U:%G' /backup
700 root:root
恢复验证
tar -tzf /backup/etc-$(date +%F).tar.gz | wc -l
可正常解压

Rocky Linux特有配置:

# 查看备份脚本cat /etc/cron.d/backup 2>/dev/null || crontab -l | grep backup# 查看ReaR(Relax and Recover,Rocky推荐)rpm -qa | grep rearcat /etc/rear/local.conf 2>/dev/null | head -20rear -V 2>/dev/null# 查看Timeshift(桌面环境)rpm -qa | grep timeshiftsudo timeshift --list 2>/dev/null | head -10# 查看Bacula/Amanda(企业级)rpm -qa | grep -E 'bacula|amanda'# 查看Rsync备份任务crontab -l | grep rsynccat /etc/cron.d/*rsync* 2>/dev/null | head -10# 查看Restic备份(现代工具)restic snapshots -r /backup/restic 2>/dev/null | head -5# 查看Borg备份borg list /backup/borg 2>/dev/null | head -5# 验证备份完整性sudo tar -tzf /backup/etc-$(date +%F).tar.gz 2>/dev/null | wc -l# Rocky特有:使用ReaR验证恢复rear -v mkrescue 2>/dev/null | tail -10rear -v recover 2>/dev/null | tail -10  # 仅在恢复环境执行# 检查NBU/NetWorker等商业备份代理rpm -qa | grep -E 'NBU|NetWorker|TSM|Networker'

八、Rocky特有安全功能

8.1 SCAP/OpenSCAP合规扫描

# Rocky Linux原生支持OpenSCAP,与RHEL一致# 查看已安装的安全内容ls /usr/share/xml/scap/ssg/content/ 2>/dev/null | grep -E 'rl8|rl9' | head -10# 查看可用配置文件oscap info /usr/share/xml/scap/ssg/content/ssg-rl9-ds.xml 2>/dev/null | head -30 || \oscap info /usr/share/xml/scap/ssg/content/ssg-rl8-ds.xml 2>/dev/null | head -30# 执行CIS基准扫描oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis \    --results /tmp/oscap-results.xml \    --report /tmp/oscap-report.html \    /usr/share/xml/scap/ssg/content/ssg-rl9-ds.xml 2>/dev/null || \oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis \    /usr/share/xml/scap/ssg/content/ssg-rl8-ds.xml 2>/dev/null# 执行STIG扫描oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_stig \    /usr/share/xml/scap/ssg/content/ssg-rl9-ds.xml 2>/dev/null || \oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_stig \    /usr/share/xml/scap/ssg/content/ssg-rl8-ds.xml 2>/dev/null# 生成修复脚本oscap xccdf generate fix --profile cis /usr/share/xml/scap/ssg/content/ssg-rl9-ds.xml 2>/dev/null > /tmp/cis-fix.sh

8.2 Systemd安全特性

# Rocky使用systemd作为初始化系统(Rocky 8/9)# 查看systemd安全状态systemd-analyze security 2>/dev/null | head -30# 查看特定服务安全评分systemd-analyze security sshd.service 2>/dev/nullsystemd-analyze security httpd.service 2>/dev/null# 查看沙盒服务systemctl show sshd.service -p MemoryMax -p CPUQuota -p IPAddressDeny 2>/dev/null# 查看私有挂载systemctl show sshd.service -p PrivateTmp -p PrivateDevices -p PrivateNetwork 2>/dev/null# 查看能力限制systemctl show sshd.service -p CapabilityBoundingSet -p NoNewPrivileges 2>/dev/null# 查看命名空间隔离systemctl show sshd.service -p ProtectSystem -p ProtectHome -p ProtectKernelTunables 2>/dev/null

8.3 内核实时补丁(kpatch)

# Rocky 8/9支持kpatch(内核热补丁,无需重启)# 检查kpatch安装rpm -qa | grep kpatchdnf list installed kpatch-dnf 2>/dev/null# 查看kpatch服务systemctl status kpatch# 查看已应用的实时补丁kpatch list 2>/dev/null# 查看可用补丁(通过dnf)dnf updateinfo list kpatch 2>/dev/null | head -10# 自动应用kpatchkpatch install $(uname -r) 2>/dev/null || echo "无可用的实时补丁"

一键巡检脚本(Rocky Linux)

#!/bin/bash# Rocky Linux 等保三级一键巡检脚本# 适用:Rocky Linux 8.9 / 9.3# 执行用户:rootecho"===== Rocky Linux 等保巡检报告 ====="echo"巡检时间: $(date'+%Y-%m-%d %H:%M:%S')"echo"服务器: $(hostname)"echo"版本: $(cat /etc/os-release |grep PRETTY_NAME |cut -d'"'-f2)"echo""echo"===== 1 身份鉴别 ====="echo"--- 空口令检查 ---"awk -F: '$2==""{print "空口令用户: "$1}' /etc/shadowecho"--- 密码锁定账户 ---"awk -F: '$2~"^!"{print "锁定用户: "$1}' /etc/shadow |head-5echo"--- 密码有效期 ---"grep-E'PASS_MAX_DAYS|PASS_MIN_DAYS|PASS_WARN_AGE' /etc/login.defs 2>/dev/null |head-3echo"--- 密码复杂度 ---"cat /etc/security/pwquality.conf 2>/dev/null |grep-E'minlen|minclass'|head-3echo"--- 登录失败锁定 ---"cat /etc/security/faillock.conf 2>/dev/null |grep-v'^#'|grep-v'^$'|head-5echo"--- SSH配置 ---"grep-E'PermitRootLogin|Protocol|PasswordAuthentication|ClientAlive' /etc/ssh/sshd_config 2>/dev/null |head-5echo"--- authselect配置 ---"authselect current 2>/dev/null |head-3echo""echo"===== 2 访问控制 ====="echo"--- 系统账户 ---"awk -F: '$3<1000 && $1!="root"{print "系统账户: "$1}' /etc/passwd |head-10echo"--- sudo配置 ---"grep'%wheel' /etc/sudoers 2>/dev/null |head-3ls-la /etc/sudoers.d/ 2>/dev/null |head-3echo"--- 关键文件权限 ---"stat-c'%a %n' /etc/passwd /etc/shadow /etc/group /etc/gshadow 2>/dev/nullecho"--- SELinux状态 ---"getenforce 2>/dev/null ||echo"SELinux未启用"sestatus 2>/dev/null |head-3echo"--- fapolicyd状态 ---"systemctl is-active fapolicyd 2>/dev/null ||echo"fapolicyd未运行"echo""echo"===== 3 安全审计 ====="echo"--- auditd状态 ---"systemctl is-active auditd 2>/dev/null && systemctl is-enabled auditd 2>/dev/nullecho"--- 审计规则数量 ---"auditctl -l2>/dev/null |wc-l|xargs-I{}echo"审计规则数: {}"echo"--- journald配置 ---"cat /etc/systemd/journald.conf 2>/dev/null |grep-v'^#'|grep-v'^$'|head-5echo"--- 日志权限 ---"ls-la /var/log/audit/audit.log 2>/dev/null ||echo"审计日志不存在"echo""echo"===== 4 入侵防范 ====="echo"--- 待更新包 ---"dnf check-update 2>/dev/null |wc-l|xargs-I{}echo"可更新包数: {}"echo"--- 安全更新 ---"dnf updateinfo list security 2>/dev/null |wc-l|xargs-I{}echo"安全公告数: {}"echo"--- 高危端口 ---"ss -tulnp2>/dev/null |grep-E'0.0.0.0:23|0.0.0.0:111|0.0.0.0:513'||echo"无高危端口暴露"echo"--- firewalld状态 ---"systemctl is-active firewalld 2>/dev/null ||echo"firewalld未运行"firewall-cmd --state2>/dev/nullecho"--- Secure Boot ---"mokutil --sb-state 2>/dev/null ||echo"无法检测Secure Boot"echo"--- kpatch状态 ---"systemctl is-active kpatch 2>/dev/null ||echo"kpatch未运行"echo""echo"===== 5 恶意代码防范 ====="echo"--- ClamAV安装 ---"rpm-qa2>/dev/null |grep clamav |head-3echo"--- ClamAV服务 ---"systemctl is-active clamd@scan 2>/dev/null || systemctl is-active clamd 2>/dev/null ||echo"clamd未运行"echo"--- 病毒库版本 ---"freshclam --version2>/dev/null ||echo"未安装freshclam"echo"--- SCAP内容 ---"ls /usr/share/xml/scap/ssg/content/ 2>/dev/null |grep-E'rl8|rl9'|wc-l|xargs-I{}echo"SCAP内容文件数: {}"echo""echo"===== 6 可信验证 ====="echo"--- TPM状态 ---"dmesg2>/dev/null |grep-i"tpm"|head-3echo"--- RPM验证 ---"rpm-Va2>/dev/null |grep-c'S.5....T\|..5....T\|.......T'|xargs-I{}echo"修改过的文件数: {}"echo"--- 内核模块签名 ---"cat /proc/sys/kernel/modules_disabled 2>/dev/null ||echo"未配置"echo""echo"===== 7 数据备份 ====="echo"--- 备份任务 ---"crontab-l2>/dev/null |grep-i backup ||echo"未配置crontab备份"ls /etc/cron.d/*backup* 2>/dev/null |head-3||echo"未找到备份cron任务"echo"--- ReaR安装 ---"rpm-qa2>/dev/null |grep rear |head-3echo"--- 备份目录 ---"stat-c'%a %U:%G' /backup 2>/dev/null ||echo"备份目录不存在"echo""echo"===== 8 Rocky特有功能 ====="echo"--- SCAP扫描 ---"oscap --version2>/dev/null |head-1||echo"OpenSCAP未安装"echo"--- Systemd安全分析 ---"systemd-analyze security 2>/dev/null |tail-5||echo"无法执行安全分析"echo"--- 系统版本 ---"cat /etc/redhat-release 2>/dev/null ||cat /etc/rocky-release 2>/dev/null ||cat /etc/os-release |grep PRETTY_NAMEecho""echo"===== 巡检完成 ====="

高风险项重点核查清单

检查项
验证命令
不合规判定
整改建议
空口令账户awk -F: '$2==""{print $1}' /etc/shadow
存在输出
立即设置强口令或锁定
密码复杂度未启用cat /etc/security/pwquality.conf
无minlen配置
配置pam_pwquality
无登录失败锁定cat /etc/security/faillock.conf
无输出或deny=0
配置pam_faillock
root远程登录grep ^PermitRootLogin /etc/ssh/sshd_config
值为yes
修改为no
SELinux未启用getenforce
返回Permissive或Disabled
设置为Enforcing
审计未启用systemctl is-active auditd
非active
安装并启用auditd
firewalld未启用firewall-cmd --state
返回not running
启用firewalld并配置规则
安全更新未修复dnf updateinfo list sec
存在未修复漏洞
执行dnf update --security
Secure Boot未启用mokutil --sb-state
SecureBoot disabled
启用UEFI Secure Boot
fapolicyd未启用systemctl is-active fapolicyd
未运行(关键业务建议启用)
安装并配置fapolicyd
备份未配置crontab -l | grep backup
无输出
配置定时备份任务

Rocky Linux版本差异对照

对比项
Rocky Linux 8.x
Rocky Linux 9.x
内核版本
4.18
5.14
默认防火墙后端
nftables
nftables
系统初始化
systemd
systemd
SELinux策略
targeted
targeted + 改进
OpenSCAP内容
ssg-rl8-ds.xml
ssg-rl9-ds.xml
内核实时补丁
kpatch(有限支持)
kpatch(完整支持)
Systemd安全特性
基础
增强(沙盒、安全评分)
等保合规
基础合规
完整合规
国密支持
需配置
部分原生支持
推荐使用
现有环境维护
新建环境首选

测评执行要点

1. 权限要求

  • 所有命令需 root 权限执行

  • 建议使用 sudo 或 su - 切换

  • SCAP扫描可能需要安装额外内容包

2. 现场核查重点

  • SELinux状态:Rocky默认启用Enforcing,检查是否被手动禁用

  • SCAP合规:利用Rocky原生的OpenSCAP执行CIS或STIG扫描,生成合规报告

  • 内核实时补丁:Rocky 9支持kpatch,检查是否启用以最小化重启需求

  • Systemd安全:使用systemd-analyze security检查服务沙盒配置

  • 应用程序白名单:关键业务建议启用fapolicyd限制可执行文件

3. 版本差异注意

  • Rocky 8.x:基于RHEL 8,内核4.18,kpatch支持有限

  • Rocky 9.x:基于RHEL 9,内核5.14,完整kpatch支持,增强Systemd安全特性

  • 迁移建议:Rocky 8到9的迁移需重新安装或执行leapp升级


常用命令速查

# DNF包管理(Rocky使用dnf替代yum)dnf check-update          # 检查更新dnf update                # 更新系统dnf update --security# 仅安全更新dnf install package       # 安装包dnf remove package        # 移除包dnf info package          # 包信息dnf history# 操作历史# Systemd服务管理systemctl status servicesystemctl start servicesystemctl stop servicesystemctl enableservice# 开机自启systemctl disable service# 取消自启systemctl list-unit-files --state=enabled# Firewalld防火墙firewall-cmd --statefirewall-cmd --get-active-zonesfirewall-cmd --list-allfirewall-cmd --add-service=http --permanentfirewall-cmd --reload# SELinux管理getenforce                # 查看模式setenforce 0|1# 临时设置(0=Permissive, 1=Enforcing)sestatus                  # 详细状态semanage login -l# 登录映射semanage user -l# SELinux用户restorecon -Rv /path      # 恢复上下文chcon -ttype /path       # 修改上下文# OpenSCAP扫描oscap info content.xml                    # 查看内容信息oscap xccdf eval--profile cis content.xml # 执行扫描oscap xccdf generate report result.xml > report.html  # 生成报告# 日志查看journalctl -uservice# 查看服务日志journalctl -f# 实时跟踪journalctl --since"1 hour ago"journalctl --vacuum-time=1month  # 清理日志# 内核管理uname-r# 内核版本rpm-qa|grep kernel       # 已安装内核dnf install kernel          # 安装新内核grub2-set-default 0# 设置默认启动项# 备份恢复(ReaR)rear mkrescue               # 创建救援镜像rear mkbackup               # 创建备份rear recover                # 恢复(救援环境)

参考标准:GB/T 22239-2019、GB/T 28448-2019、CIS Rocky Linux Benchmark 8/9、DISA STIG for RHEL 8/9、Rocky Linux Security Guide

适用版本:Rocky Linux 8.9 / 9.3

验证环境:Minimal / Server / Server with GUI / 虚拟化 / 容器云

汪汪虚拟空间

10个内容

等保测评命令——PostgreSQL数据库
2026-02-11
等保测评命令——Oracle数据库
2026-02-12
等保测评命令——OceanBase数据库
2026-02-13
等保测评命令——华为 GaussDB 系列
2026-02-14
等保测评命令——MySQL数据库
2026-02-21
等保测评命令——DB2数据库
2026-02-22
等保测评命令——华为网络设备
2026-02-23
等保测评命令——锐捷网络设备
2026-02-24
等保测评命令——华三(H3C)网络设备
2026-02-25
等保测评命令——思科网络设备
2026-02-26

最新文章

随机文章

基本 文件 流程 错误 SQL 调试
  1. 请求信息 : 2026-03-27 11:28:25 HTTP/2.0 GET : https://f.mffb.com.cn/a/480813.html
  2. 运行时间 : 0.131657s [ 吞吐率:7.60req/s ] 内存消耗:4,994.94kb 文件加载:140
  3. 缓存信息 : 0 reads,0 writes
  4. 会话信息 : SESSION_ID=bae59759ee492e86664785f4c12746a9
  1. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/public/index.php ( 0.79 KB )
  2. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/autoload.php ( 0.17 KB )
  3. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/composer/autoload_real.php ( 2.49 KB )
  4. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/composer/platform_check.php ( 0.90 KB )
  5. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/composer/ClassLoader.php ( 14.03 KB )
  6. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/composer/autoload_static.php ( 4.90 KB )
  7. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-helper/src/helper.php ( 8.34 KB )
  8. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-validate/src/helper.php ( 2.19 KB )
  9. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/helper.php ( 1.47 KB )
  10. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/stubs/load_stubs.php ( 0.16 KB )
  11. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Exception.php ( 1.69 KB )
  12. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-container/src/Facade.php ( 2.71 KB )
  13. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/symfony/deprecation-contracts/function.php ( 0.99 KB )
  14. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/symfony/polyfill-mbstring/bootstrap.php ( 8.26 KB )
  15. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/symfony/polyfill-mbstring/bootstrap80.php ( 9.78 KB )
  16. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/symfony/var-dumper/Resources/functions/dump.php ( 1.49 KB )
  17. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-dumper/src/helper.php ( 0.18 KB )
  18. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/symfony/var-dumper/VarDumper.php ( 4.30 KB )
  19. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/App.php ( 15.30 KB )
  20. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-container/src/Container.php ( 15.76 KB )
  21. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/psr/container/src/ContainerInterface.php ( 1.02 KB )
  22. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/provider.php ( 0.19 KB )
  23. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Http.php ( 6.04 KB )
  24. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-helper/src/helper/Str.php ( 7.29 KB )
  25. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Env.php ( 4.68 KB )
  26. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/common.php ( 0.03 KB )
  27. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/helper.php ( 18.78 KB )
  28. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Config.php ( 5.54 KB )
  29. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/app.php ( 0.95 KB )
  30. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/cache.php ( 0.78 KB )
  31. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/console.php ( 0.23 KB )
  32. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/cookie.php ( 0.56 KB )
  33. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/database.php ( 2.48 KB )
  34. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/facade/Env.php ( 1.67 KB )
  35. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/filesystem.php ( 0.61 KB )
  36. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/lang.php ( 0.91 KB )
  37. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/log.php ( 1.35 KB )
  38. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/middleware.php ( 0.19 KB )
  39. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/route.php ( 1.89 KB )
  40. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/session.php ( 0.57 KB )
  41. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/trace.php ( 0.34 KB )
  42. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/config/view.php ( 0.82 KB )
  43. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/event.php ( 0.25 KB )
  44. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Event.php ( 7.67 KB )
  45. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/service.php ( 0.13 KB )
  46. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/AppService.php ( 0.26 KB )
  47. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Service.php ( 1.64 KB )
  48. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Lang.php ( 7.35 KB )
  49. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/lang/zh-cn.php ( 13.70 KB )
  50. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/initializer/Error.php ( 3.31 KB )
  51. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/initializer/RegisterService.php ( 1.33 KB )
  52. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/services.php ( 0.14 KB )
  53. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/service/PaginatorService.php ( 1.52 KB )
  54. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/service/ValidateService.php ( 0.99 KB )
  55. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/service/ModelService.php ( 2.04 KB )
  56. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-trace/src/Service.php ( 0.77 KB )
  57. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Middleware.php ( 6.72 KB )
  58. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/initializer/BootService.php ( 0.77 KB )
  59. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/Paginator.php ( 11.86 KB )
  60. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-validate/src/Validate.php ( 63.20 KB )
  61. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/Model.php ( 23.55 KB )
  62. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/model/concern/Attribute.php ( 21.05 KB )
  63. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/model/concern/AutoWriteData.php ( 4.21 KB )
  64. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/model/concern/Conversion.php ( 6.44 KB )
  65. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/model/concern/DbConnect.php ( 5.16 KB )
  66. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/model/concern/ModelEvent.php ( 2.33 KB )
  67. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/model/concern/RelationShip.php ( 28.29 KB )
  68. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-helper/src/contract/Arrayable.php ( 0.09 KB )
  69. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-helper/src/contract/Jsonable.php ( 0.13 KB )
  70. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/model/contract/Modelable.php ( 0.09 KB )
  71. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Db.php ( 2.88 KB )
  72. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/DbManager.php ( 8.52 KB )
  73. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Log.php ( 6.28 KB )
  74. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Manager.php ( 3.92 KB )
  75. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/psr/log/src/LoggerTrait.php ( 2.69 KB )
  76. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/psr/log/src/LoggerInterface.php ( 2.71 KB )
  77. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Cache.php ( 4.92 KB )
  78. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/psr/simple-cache/src/CacheInterface.php ( 4.71 KB )
  79. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-helper/src/helper/Arr.php ( 16.63 KB )
  80. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/cache/driver/File.php ( 7.84 KB )
  81. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/cache/Driver.php ( 9.03 KB )
  82. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/contract/CacheHandlerInterface.php ( 1.99 KB )
  83. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/Request.php ( 0.09 KB )
  84. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Request.php ( 55.78 KB )
  85. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/middleware.php ( 0.25 KB )
  86. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Pipeline.php ( 2.61 KB )
  87. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-trace/src/TraceDebug.php ( 3.40 KB )
  88. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/middleware/SessionInit.php ( 1.94 KB )
  89. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Session.php ( 1.80 KB )
  90. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/session/driver/File.php ( 6.27 KB )
  91. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/contract/SessionHandlerInterface.php ( 0.87 KB )
  92. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/session/Store.php ( 7.12 KB )
  93. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Route.php ( 23.73 KB )
  94. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/route/RuleName.php ( 5.75 KB )
  95. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/route/Domain.php ( 2.53 KB )
  96. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/route/RuleGroup.php ( 22.43 KB )
  97. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/route/Rule.php ( 26.95 KB )
  98. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/route/RuleItem.php ( 9.78 KB )
  99. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/route/app.php ( 1.72 KB )
  100. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/facade/Route.php ( 4.70 KB )
  101. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/route/dispatch/Controller.php ( 4.74 KB )
  102. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/route/Dispatch.php ( 10.44 KB )
  103. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/controller/Index.php ( 4.81 KB )
  104. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/app/BaseController.php ( 2.05 KB )
  105. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/facade/Db.php ( 0.93 KB )
  106. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/connector/Mysql.php ( 5.44 KB )
  107. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/PDOConnection.php ( 52.47 KB )
  108. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/Connection.php ( 8.39 KB )
  109. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/ConnectionInterface.php ( 4.57 KB )
  110. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/builder/Mysql.php ( 16.58 KB )
  111. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/Builder.php ( 24.06 KB )
  112. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/BaseBuilder.php ( 27.50 KB )
  113. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/Query.php ( 15.71 KB )
  114. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/BaseQuery.php ( 45.13 KB )
  115. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/TimeFieldQuery.php ( 7.43 KB )
  116. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/AggregateQuery.php ( 3.26 KB )
  117. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/ModelRelationQuery.php ( 20.07 KB )
  118. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/ParamsBind.php ( 3.66 KB )
  119. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/ResultOperation.php ( 7.01 KB )
  120. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/WhereQuery.php ( 19.37 KB )
  121. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/JoinAndViewQuery.php ( 7.11 KB )
  122. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/TableFieldInfo.php ( 2.63 KB )
  123. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-orm/src/db/concern/Transaction.php ( 2.77 KB )
  124. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/log/driver/File.php ( 5.96 KB )
  125. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/contract/LogHandlerInterface.php ( 0.86 KB )
  126. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/log/Channel.php ( 3.89 KB )
  127. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/event/LogRecord.php ( 1.02 KB )
  128. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-helper/src/Collection.php ( 16.47 KB )
  129. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/facade/View.php ( 1.70 KB )
  130. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/View.php ( 4.39 KB )
  131. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Response.php ( 8.81 KB )
  132. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/response/View.php ( 3.29 KB )
  133. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/Cookie.php ( 6.06 KB )
  134. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-view/src/Think.php ( 8.38 KB )
  135. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/framework/src/think/contract/TemplateHandlerInterface.php ( 1.60 KB )
  136. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-template/src/Template.php ( 46.61 KB )
  137. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-template/src/template/driver/File.php ( 2.41 KB )
  138. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-template/src/template/contract/DriverInterface.php ( 0.86 KB )
  139. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/runtime/temp/067d451b9a0c665040f3f1bdd3293d68.php ( 11.98 KB )
  140. /yingpanguazai/ssd/ssd1/www/f.mffb.com.cn/vendor/topthink/think-trace/src/Html.php ( 4.42 KB )
  1. CONNECT:[ UseTime:0.000631s ] mysql:host=127.0.0.1;port=3306;dbname=f_mffb;charset=utf8mb4
  2. SHOW FULL COLUMNS FROM `fenlei` [ RunTime:0.000922s ]
  3. SELECT * FROM `fenlei` WHERE `fid` = 0 [ RunTime:0.000296s ]
  4. SELECT * FROM `fenlei` WHERE `fid` = 63 [ RunTime:0.000271s ]
  5. SHOW FULL COLUMNS FROM `set` [ RunTime:0.000522s ]
  6. SELECT * FROM `set` [ RunTime:0.000228s ]
  7. SHOW FULL COLUMNS FROM `article` [ RunTime:0.000550s ]
  8. SELECT * FROM `article` WHERE `id` = 480813 LIMIT 1 [ RunTime:0.000512s ]
  9. UPDATE `article` SET `lasttime` = 1774582105 WHERE `id` = 480813 [ RunTime:0.010301s ]
  10. SELECT * FROM `fenlei` WHERE `id` = 67 LIMIT 1 [ RunTime:0.000545s ]
  11. SELECT * FROM `article` WHERE `id` < 480813 ORDER BY `id` DESC LIMIT 1 [ RunTime:0.002299s ]
  12. SELECT * FROM `article` WHERE `id` > 480813 ORDER BY `id` ASC LIMIT 1 [ RunTime:0.000437s ]
  13. SELECT * FROM `article` WHERE `id` < 480813 ORDER BY `id` DESC LIMIT 10 [ RunTime:0.001552s ]
  14. SELECT * FROM `article` WHERE `id` < 480813 ORDER BY `id` DESC LIMIT 10,10 [ RunTime:0.025876s ]
  15. SELECT * FROM `article` WHERE `id` < 480813 ORDER BY `id` DESC LIMIT 20,10 [ RunTime:0.018802s ]
0.133363s