Hi Bernie,

On Sunday 28 May 2006 04:39, Bernie Cosell Scribbled:
> On 27 May 2006 at 22:10, Gaffer wrote:
> > On Saturday 27 May 2006 21:44, Bernie Cosell Scribbled:
> > > On 27 May 2006 at 21:21, Gaffer wrote:
> > > > Weird I may be.  But I don't get virus,
> > >
> > > That's more luck than anything:
> >
> > I would beg to differ !
>
> Well, we have different opinions on that...

Well I was talking about virus !

> > > Unix systems are the MOST attacked

> You're wrong: it is the result of scans and probes, and when the
> system is discovered it is attacked.

Yes it is,  but only if it is exposed to be attacked.  Any sysadmin 
worth his/her salt wouldn't put an unprotected machine on the 
internet !  that is unless it was setup to be a Honey Pot !

> > I agree,  the addage of "getting to root" is the goal of a cracker!
> >  Get root and the system is yours !
>
> I know -- Unix's *biggest* security misfeature -- one bit security.
> Windows's biggest security misfeature is that almost all of its users
> *start* with admin privileges, so _every_ slip, error, vulnerability
> is a total system compromise.  It is a lot harder to "get at" most
> Unix systems because you need either to exploit server
> vulnerabilities or find a privilege-escalating vulnerability; on
> windows, the users [by running as admin] both do all the hard work
> [*giving* the attacker full system privileges to start with] *AND*
> are often naïve/duped into being the agent that infects their own
> system.  Windows's biggest security problem is its users!

Agreed !

> As a side note, it is possible [but surprisingly difficult] to
> configure a Unix system that'll withstand having root compromised.

There are a number of techniques to specifically protect root !  But its 
easier to start with multilayered security and go on from there.

> > > > ..  and nothing goes out unless I
> > > > let it (port 80 excluded).
> > >
> > > How do you manage that?  iptables or some such?  Because of the
> > > utterly broken way Berkeley kludged sockets into Unix, AFAIK it
> > > is nearly impossible to prevent a process from opening a network
> > > connection [either outgoing or listening].

A lot of things have changed dramatically in recent years !

> > As far as port opening is concerned all ports are closed by default
> > in and out.

Iptables helps as does choosing "Paranoia" settings for your system.  
That way you have to explicitly configure a path for entry or exit from 
your machine!

> Would you elaborate how you "closed" the ports?  As far as I know [in
> having used and installed scores of Unix systems over the years] *NO*
> port is "closed" by default on a unix system.  I know you can do that
> kind of thing with ipchains, but it ain't easy to get configured
> properly [if you want to the system both to be secure AND to be
> useful] and AFAIK no distro comes with that set up active and DENY
> ALL as a default [is SUSE doing that these days?]  Few sysadmins
> understand IPCHAINS and so if they did that, it'd be amusing how many
> sysadmins would have a hard time getting IRC or SSH or sendmail or
> ... to work.  Does your system, in fact, close all those ports with
> ipchains or the like?  Or if not, how *do* the ports get to be
> "closed by default"?
>
>   /Bernie\

IPcop is a good example of a Linux distribution configured to be 
secure ! 

-- 
Best Regards:
     Derrick.
     Pontefract Linux Users Group.
     plug at play-net.co.uk

--
                ----------------------------------------
WIN-HOME Archives:  http://PEACH.EASE.LSOFT.COM/archives/WIN-HOME.html
Contact the List Owner about anything:  [EMAIL PROTECTED]
Official Win-Home List Members Profiles Page
 http://www.besteffort.com/winhome/Profiles.html

Reply via email to