Richard Adams <[EMAIL PROTECTED]> wrote:
__________
>
>
>I for one see NO reason to even think about reinstalling or installing
>another unix flavor.
>
>What you want to do is add firewall chains, ipchains is the program to use.
>
>If a certain service is not required or unnessacary stop it getting
>started in /etc/inetd.conf.
>Things like; netstat, finger, time, smtp, pop3, even telnet could be
>closed, use in its place ssh.
>
>
Richard, all,
what you propose is, as usual, all correct, and if you really know what you're doing 
you can even make a sysstem safe in this way _while_it's_running_. But Karthik said 
that he has little experience using Linux, and truth be told, you need a lot of 
experience to do that right. If you read down the thread, you'll see that I explicitly 
warned against a simple reinstall. Sure, Icould have been more verbose concerning the 
means to make his computer safer, but I hadn't the time for epic e-mails yesterday (I 
work for a living at that local time) and found it most important that he gets the 
machine off the net and examines the damage done. The attacker in his case seems to 
have used one of the many vulnerabilities of a FTP server (ProFTP and wuFTP have both 
been shown to present root exploits to the world during the last few days).
I proposed OpenBSD as an alternative because there, the ports you mentioned are 
_closed_ by default after a vanilla install. Not very user-friendly, but safer. 
Someone proposed reinstalling to wipe out all the damage the attacker has done 
(otherwise, would you ever be sure you got _every_ patched executable?) and hardening 
the new RedHat install with Bastille Linux. I think this is a good idea.
Bye, Christoph

 --
This is not here.

-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.linux-learn.org/faqs

Reply via email to