In security terms, one size fits all is a poor security policy.

Mike MacCana wrote:

Jeff Waugh wrote:

<quote who="O Plameras">



He once said, if you have a point, Hammer on that point;


Oscar, you claimed that "building kernels is required for securing servers".
You have not backed that up. You have not provided any substantial evidence
to suggest - particularly to the disbelieving eyes of experienced admins on
this list - that your claim has any basis in fact.


I suggested a number of reasons why building kernels is *not* required for
securing servers, and a number of reasons why building kernels may actually
adversely affect your server's security.


A belief in what you've claimed is not shared by experienced sysadmins here,
and it flies in the face of security theory, let alone practice. I'd be
interested to find out how you came to believe this - it's a dangerous idea
that I hope is not widespread.


It is indeed a bad idea, but in my own experience the perception that 'it is better to compile your own kernel on a production server' is widespread.

One amusing thing I note is that more people are under the impression that compiling an entire kernel is necessary for adding a single driver module to their systems. That's mainly the fault of Shit Documentation (TM) than the users though.

The other thing that's worh mentioning (and more to do with security than the point above) is that if there's a few hundred thousand people using the exact same kernel build as you, you have the advantage on being able to pool resources with them via your distributions bug mechanism. Ie, more people notice more stuff more often.

Mike


--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to