[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Debian secure by default?



On Saturday 17 May 2008 01:40:05 am Rico Secada wrote:
> On Sat, 17 May 2008 06:42:57 +0530
>
> Raj Kiran Grandhi <grajkiran@gmail.com> wrote:
> > Rico Secada wrote:
> > > Hi.
> > >
> > > Why is Debian not setup to be secure be default?
> > >
> > > Not everyone is a security expert so imho the system should be fully
> > > secured out-of-the-box.
> >
> > Please elaborate on what you consider to be the insecure parts of a
> > default installation. Describe a process by which an etch system can
> > be compromised remotely. Obviously, the ability to become root by
> > tweaking the boot parameters from the grub screen does not count as a
> > vulnerability.
>
> All I am saying is that it shouldn't be needed to harden anything.
>
> http://www.debian.org/doc/manuals/securing-debian-howto/

It is hardened by default.  Go with the minimal base install and install what 
you need afterwards instead of picking a task and installing a whole bundle.

-- 
Paul Johnson
baloo@ursine.ca

Explaination of .pgp part: http://linuxmafia.com/faq/Mail/rant-gpg.html

Attachment: signature.asc
Description: This is a digitally signed message part.


Reply to: