At 02:44 PM 5/24/2000 -0400, Kenneth E. Lussier wrote:

hrm..looking for a HARD OS?  i like openBSD - so far is the most secure by 
far...not one root exploit found in it for 3 years.  much like most other 
'nix's it worth look into if you want something secure.

www.openbsd.org

~kurth

>As far as "Total System Security" goes, I like trinityOS. It has a lot of
>great uses. As far as securing an existing Linux box, I am partial to
>Bastille-Linux (http://www.bastille-linux.org). It's a series of hardening
>scripts that secure a system based on your responces to a series of questions.
>Among other things, it will also create a packet filter script for you ( with
>some decent comments).
>FYI,
>Kenny
>
>[EMAIL PROTECTED] wrote:
> >
> > My Favorite ipchains script is the one located within the Trinity OS
> > Document. It is fairly secure, and heavily commented so that it is easy
> > to see how each rule contributes to the operation of the firewall.
> >
> > http://www.ecst.csuchico.edu/~dranch/LINUX/index-linux.html
> >
> > >"Kenneth E. Lussier" wrote:
> > >
> > > Greg Kettmann wrote:
> > > [...snip...}
> > > >  Another truly excellent site is
> > > > http://linux-firewall-tools.com/ by Bob Ziegler.  He literally 
> wrote the book on
> > > > Linux Firewalls.  His site has links to the relevant HOW-TO's plus 
> his own
> > > > instructions.  It also contains a tool to generate the IPCHAINS or 
> IPFWADM scripts
> > > > needed to start the firewall.  There are other excellent sites and 
> resources, as
> > > > well, but I like this one.  GGK
> > > >
> > >
> > > I could not disagree with this more. Rob Ziegler *DID* write a book, 
> and you
> > > may in fact like his utility. Other than that, I take issue with 
> everything
> > > else that you said. His book is BAD. It is 100% RedHat-scentric, which is
> > > problem #1. Given that I was totally annoyed with what I DID read of 
> the book
> > > and never finished it, I won't comment any further on it. OK, I 
> lied.... It
> > > also doesn't deal with anything related to encryption. How can you 
> talk about
> > > firewalls and security and neglect to
> > > mention encryption?!?
> > >
> > >         Now, on to his tool..... Sure, it works...Sort of. What it 
> creates is a
> > > completely bloated script with about 1000 rules that you don't need. 
> Also,
> > > when you have a default policy of DENY, you do not have to then go 
> ahead and
> > > specifically deny everything (including subnets that cannot be routed 
> to begin
> > > with). By putting this much garbage into an ipchains script, you 
> increase the
> > > chances of making a hole where there shouldn't be. Also, his 
> instructions are
> > > horrable. You are better off reading the actual Firewall-HOWTO. Not 
> to mention
> > > the fact that he completely ignores the fact that you may have to 
> patch your
> > > kernel in order to do certain things.
> > >
> > >         All in all, I find his tools, his writing, and his claims of 
> expertise to be
> > > insufficient, inadequate, and detrimental to network security. The 
> argument
> > > that I hear the most in his defence is "Well, it's good for 
> beginners". My
> > > answer to that is "*NO IT CERTAINLY IS NOT!!!*. It is NEVER good for 
> a beginer
> > > to learn the wrong way to do things, and it is never good for a 
> beginner to
> > > think that the wrong, inadequate, and insecure ways of one person are the
> > > correct ways. That beginner then has a false sence of knowledge, and thay
> > > begin to rely on these things rather than ever learn the correct 
> ways. Not to
> > > mention, when they come to the realization that what they know isn't good
> > > enough, they have to start all over from the beginning. So, in 
> reality, it is
> > > *NOT* good for beginners.
> > >
> > > Just my NSHO,
> > > Kenny
> > >
> > > --
> > > Kenny Lussier
> > > Systems Administrator
> > > Mission Critical Linux
> > > ******************************
> > > If at first you don't succeed,
> > > destroy all evidence that you
> > > tried
> > > ******************************
> > >
> > > **********************************************************
> > > To unsubscribe from this list, send mail to
> > > [EMAIL PROTECTED] with the following text in the
> > > *body* (*not* the subject line) of the letter:
> > > unsubscribe gnhlug
> > > **********************************************************
> >
> > **********************************************************
> > To unsubscribe from this list, send mail to
> > [EMAIL PROTECTED] with the following text in the
> > *body* (*not* the subject line) of the letter:
> > unsubscribe gnhlug
> > **********************************************************
>
>--
>Kenny Lussier
>Systems Administrator
>Mission Critical Linux
>******************************
>If at first you don't succeed,
>destroy all evidence that you
>tried
>******************************
>
>**********************************************************
>To unsubscribe from this list, send mail to
>[EMAIL PROTECTED] with the following text in the
>*body* (*not* the subject line) of the letter:
>unsubscribe gnhlug
>**********************************************************

Kurth Bemis - Senior Linux Network/Systems Administrator, USAExpress.net

[EMAIL PROTECTED]
http://www.usaexpress.net/kurth
ICQ - 6624050
Call Sign - N1TYW
PGP key available - http://www.usaexpress.net/kurth/pgp

Fight Weak Encryption!  Donate your wasted CPU cycles to Distributed.net 
(http://www.distributed.net)


**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to