[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

RE: DSA 131: Apache Vulnerability



I like both. The server gets "stable", but a firewall or at least firewall rules on the "public" interface.

Preferrably duel interface, one "inside" on private IP, one "public", and no packet forwarding.

And I couldn't agree more about the remarkable efforts of the Debian team members.

Curt-

> On Thu, Jun 20, 2002 at 07:49:08PM -0400, Arthur H. Johnson II wrote:
> > 
> > I have two relative policies:
> > 
> > 1. Always use a firewall to filter out everything but what 
> is absolutely
> > necessary, ie web, email, etc.
> > 
> > 2. Always build stuff filtered to the internet from source 
> that way when a
> > vulnerability is released, you can update it rather 
> quickly, no matter
> > what the distro you are running is.
> >
> 
> Or...you could just run stable.  I have always been impressed 
> by Wichert, Michael, and company's response time and I applaud them.
> 
> 
> Phil 


-- 
To UNSUBSCRIBE, email to debian-security-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org



Reply to: