On Thu, 16 Aug 2001, Rafael 'Dido' Sevilla wrote:

> Personally, I think this is impossible.  No system can be absolutely
> secure out of the box.  Remember that every server deployed has a
> purpose, and without taking this purpose into account, you have many
> potential insecurities.  Admittedly, Linux distro vendors could do a
> better job of making a more secure default install, but ultimately,
> there is no one-size-fits-all charm.  Any serious system administrator
> installing a Linux box should examine each and every package he or she
> installs, to see whether it actually does have some place there.  If
> not, remove it.  At best, it's dead weight.  At worst, it's a security
> risk.

Not every package, but every package that listens for connections on the
net..  Unless you want to open the possibility that one package may
actually be a trojan, which is quite praning already.

> I don't think it's an exaggeration to say that a lot of system
> security breaches occur because the administrator was ignorant of the
> aspect of the system that got exploited.  Case in point: looks like
> the vast majority of the people who run W2K boxes affected by the Code
> Red worm were unaware that they were even running IIS on their box at
> all, at least until well after the problem started!  You cannot secure
> what you do not understand.

What is that saying in CAT/CMT before?  "Ignorance is no excuse for
non-compliance"  A sysad is a sysad is a sysad, they must be aware of the
problems they face when administering NT.   If they want to seat in the
captain's chair, be ready for a ship full of problems, known and unknown.

At the start it may be a walk in the park, with all the bells and whistles
of the NT system, but then again...



_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to