Eric Covener wrote:
On Mon, Dec 6, 2010 at 1:42 PM, Dave Stevens <g...@uniserve.com> wrote:
> ....
Well, I hadn't, but it seems as if from a security point of view it might not
be a bad idea. Is there any history or discussion on that? or perhaps a
reference I can read up on?
http://httpd.apache.org/docs/current/mod/core.html#servertokens
There hasn't been much discussion that the info should be hidden by default.
Well, under the theory that letting a "hacker" know anything about the
platform they may be trying to infiltrate gives them useful information
they could abuse, I usually run my servers with ServerTokens Prod. I
really wish there was a ServerTokens Custom (let me specify the string
I want to return in the ServerSignature) or ServerTokens Stealth (don't
supply any information in the ServerSignature).
Personally, I run my Firefox browsers with the ServerSpy addon -- so I
always can see what the ServerSignature reads coming from the server.
Usually I use that as a clue when the server I'm visiting does
something I consider to be lame -- "Oh, that's the stupid XXXX server
they're running, no wonder they have problems." But somebody with
more malicious intent could interpret and abuse based on what they see.
--
J.Lance Wilkinson ("Lance") InterNet: lance.wilkin...@psu.edu
Systems Design Specialist - Lead Phone: (814) 865-4870
Digital Library Technologies FAX: (814) 863-3560
E3 Paterno Library
Penn State University
University Park, PA 16802
---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
" from the digest: users-digest-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org