> I'm just curious (since this thread is still active), is a 
> product like Apache or other non-IIS products *proven* to 
> be more secure, assuming you disable the IIS features you 
> don't need and apply the appropriate patches? That's not a 
> rhetorical question, I'm really asking for people's opinions.

I'm not aware of any code audits performed on both the Apache and IIS source
code, and I think that's the only way to prove that one is more secure than
the other.

However, the core functionality of the web server itself is well-tested with
both Apache and IIS - if someone found a security flaw with that core
functionality, that would be a big issue, but I don't think that's ever
happened.

> See, I've been of the school of thought lately that, while 
> IIS does have its security flaws, I think that they get 
> magnified 1000% because it's a Microsoft product, and 
> hackers and the press will do anything they can to rip 
> Microsoft.

There's certainly some weighting in favor of finding problems with MS
products. I don't think it's just about "ripping" MS, either. Just like
Willie Sutton said when asked why he robbed banks, "that's where the money
is". (Actually, that's an apocryphal quote, I think, but who cares.) If you
find an IIS vulnerability, you'll have a vast audience of potential "users".
In addition, you might assume that most don't know how to configure their
web servers anyway - and you'd probably be right.

> But anyway, we use Apache here at my job. While I have no 
> complaints about it, I would argue that it's "more secure" 
> (inherently, not after re-programming modules and such) 
> because you have to be a true programmer to really get into 
> the meat of the product and mess around. You can't just go 
> into a GUI interface and click a few buttons to disable it.

The thing that makes a default Apache install more secure than a default IIS
install is that Apache doesn't actually do anything other than serve web
pages. If you want it to do something else, you have to set that up
yourself. There's a very good argument to be made that this is how server
products should work - a "deny, then allow" approach to providing
functionality. IIS, of course, currently follows the opposite approach - it
has features that you have to turn off. Fortunately, it's easy and quick to
disable those features, so there's really no excuse for not doing it.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
voice: (202) 797-5496
fax: (202) 797-5444
______________________________________________________________________
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to