Hi Reuben,

I'd say this is less part of wisdom then of comfort or personal taste ;)
From my experience with deploying any type of server in a production environment I'm personally in favor of closing everything up and add extra documentation on how to enable wanted "security breaches" for development or operation where needed.

But again this is my personal feeling for it, and if disabling SSH is a regression we surely don't want to do it for the 2.2.x line
but should consider it for the 3.0 line.

Regards, Achim



Am 28.03.2012 22:37, schrieb Reuben Garrett:
with due respect for those more experienced than i am, i feel it's best to disable by default any remote access, along the lines of "security is mandatory" [1]. sure, the deployer of an instance is responsible for tuning security - but it's nice to help people avoid mistakes. if necessary, it could even be deferred to a major release if there's a real backwards-compatibility issue.

that being said, i am still a fledgling, and i defer to the committers' wisdom.

~ Reuben

[1]: http://www.apache.org/foundation/how-it-works.html#management (below "Philosophy")



--
- Apache Karaf<http://karaf.apache.org/>  Committer&  PMC
- OPS4J Pax Web<http://wiki.ops4j.org/display/paxweb/Pax+Web/>    Committer&  
Project Lead
- Blog<http://notizblog.nierbeck.de/>

Reply via email to