On Thu, 10 Jan 2002, Gregory J. Feig wrote:

> No, Steve....we don't want this discussion to end here...

  I didn't mean it like that.
I meant that when Glenn said,

Q.  What do I lose...
A.  Nothing.

that I couldn't add anything at that point.  To me,
that pretty much says "point, set, match."  It doesn't
mean there won't be future matches.  ;-)

> I do NOT ever intend to run those extra services, either...at least
> not until I am WAY more experienced...but this apparently does not
> definitely protect me from crackers...so...

  If you have no services running... i.e., nothing
listening on any ports, then you're pretty secure.

> 1.  Let us try to generally identify the main problem areas

  I think the biggest problem is that Joe User doesn't
realize the ramifications of running a default install.
He doesn't realize that there are probably daemons 
listening on ports he's not aware of.

> 3.  These should include those ISTAT checks....one question I have is
> how do I automagically enable these checks on every boot, so I can be
> SURE everything is shut down, etc.

  If you know what daemons are started in your boot
process, you shouldn't have to check each time you boot.

> 4.  How do we identify just WHAT threats we are likely to be opened
> to.

  It depends entirely on what distribution you installed
and what options you chose when you installed it.  There
isn't really any standard template for all distributions
except that you should know what daemons you're running,
and that you should pay particular attention to security 
sites for any late breaking security holes in those 
daemons.
  
  If you 'netstat -tupan' returns nothing at all, then 
you're probably about as secure as you are with DOS.

 - Steve


Reply via email to