Incoming from Dave Wilson:
> 
> I don't follow the security domain that closely, but I don't think linux
> has had many recent remote OS access exploits, if any.  I know that user

No there haven't been many, and they were fixed as fast as they were
found.  That still took some Debian servers down (remote kernel
exploit), and Gentoo's servers were compromised (through not too close
checking of the parentage of some packages, I understand).  Gnu's
servers took a very hard hit last year too.  No backups, either.  Oops.

You can run a firewall on an old '386 headless box from a floppy, no
hard drive.  Don't run anything else on it.  Open up only the ports
you absolutely need to open up, log to another machine, and subscribe
to one or the other security related mailing lists that all the
distributions have.  The SuSE security list was very good.  So is
Debian's.

There are lots of good programs out there that will build your
iptables rules for you interactively; fwbuilder, shorewall, etc.

Don't ignore the inside.  In a typical commercial setting, the users
in your LAN can be just as much (or more) of a danger to your LAN than
the big bad internet is.  Replace telnet, remote shell, and ftp with
ssh & putty.

See distrowatch.com (?) and search for floppy based firewalls.


-- 
Any technology distinguishable from magic is insufficiently advanced.
(*)               http://www.spots.ab.ca/~keeling 
- -

_______________________________________________
clug-talk mailing list
[EMAIL PROTECTED]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca

Reply via email to