[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Debian secure by default?



On Sat, 17 May 2008 06:42:57 +0530
Raj Kiran Grandhi <grajkiran@gmail.com> wrote:

> Rico Secada wrote:
> > Hi.
> > 
> > Why is Debian not setup to be secure be default?
> > 
> > Not everyone is a security expert so imho the system should be fully
> > secured out-of-the-box.
> 
> Please elaborate on what you consider to be the insecure parts of a 
> default installation. Describe a process by which an etch system can
> be compromised remotely. Obviously, the ability to become root by
> tweaking the boot parameters from the grub screen does not count as a
> vulnerability.

I am not saying that Debian isn't secure per say, but things like
removing SUID and SGID from files where they generally aren't needed as
default imho is better. If someone needs SUID then he has to set it.

Locating what files that it is generally safe to remove SUID and SGID
from isn't that easy.

> 
> -- 
> Raj Kiran Grandhi
> --
> Politics is for the moment. An equation is for eternity.
>                                         -- Albert Einstein
> 
> 
> -- 
> To UNSUBSCRIBE, email to debian-user-REQUEST@lists.debian.org 
> with a subject of "unsubscribe". Trouble? Contact
> listmaster@lists.debian.org
> 
> 



Reply to: