根据http://redis.io/topics/security,我可以在 Redis 配置文件中设置一个requirepass
值,例如, 。requirepass foobared
但是,我不希望在我的配置文件中使用它。
基本上,我想将此密码保留在.conf
文件之外,并使用redis-cli
.
################################## SECURITY ###################################
# Require clients to issue AUTH <PASSWORD> before processing any other
# commands. This might be useful in environments in which you do not trust
# others with access to the host running redis-server.
#
# This should stay commented out for backward compatibility and because most
# people do not need auth (e.g. they run their own servers).
#
# Warning: since Redis is pretty fast an outside user can try up to
# 150k passwords per second against a good box. This means that you should
# use a very strong password otherwise it will be very easy to break.
#
# 2015.12.14 nbasanes: Although I prefer enabling this, I'm not
# sure it buys us much, since a clear password in a config
# file is bad for security:
# requirepass foobared
# 2015.12.14 nbasanes: This could be interesting, although
# I don't put much weight in security-by-obscurity:
# Command renaming.
#
# It is possible to change the name of dangerous commands in a shared
# environment. For instance the CONFIG command may be renamed into something
# hard to guess so that it will still be available for internal-use tools
# but not available for general clients.
#
# Example:
#
# rename-command CONFIG b840fc02d524045429941cc15f59e41cb7be6c52
#
# It is also possible to completely kill a command by renaming it into
# an empty string:
#
# rename-command CONFIG ""
#
# Please note that changing the name of commands that are logged into the
# AOF file or transmitted to slaves may cause problems.
是的,可以在运行时更改身份验证。(请参阅 Nathan Basanese 的回答)。
此外,请确保触发 config rewrite 命令以保持身份验证。如果 Redis 实例重新启动,它可能会丢失
您可以通过对您的 Redis 实例运行 CONFIG GET * 来获取可以在运行时更改的所有参数的列表
是的,您确实可以
requirepass
在实时 Redis 实例上设置该值。此示例显示我在 Redis 从站上设置它: