Re: I love IP Tables....

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



jdow wrote:

Are you saying vulnerability to viruses is acceptable and end users are supposed to be smarter then the OS vendors in working around it?

Good anti-virus protection, regular updates, and good malware protection
for malicious scripts are all important for all operating systems.

Agreed on updates.

AV
for Linux is pretty much lacking.

There's no reason to expect a 3rd party to be able to improve it.

Do you understand how AV software functions? One mode checks file
signatures for known virus signatures and prevents them from running.

I know how it's supposed to function - and in the places it is really needed you can't afford the overhead.

The cycle from discovering a virus to developing a signature for
catching it is MUCH faster than the usual bug report or even security
bug report to update cycle. Your period of vulnerability is reduced.
That is "a good thing." (tm)

That hasn't been my experience. I've been through 2 zero-day Windows exploits where we were the first to report the offending file to two popular AV companies that we used plus clam. One wasn't that bad and I've forgotten the details. The other one was something that blasted the network to a point where a few infected PCs would overload 100M router interfaces making both the primary and failover routers try to become active. It wasn't fun and it was 3 days before either commercial vendor responded with a new signature from the file we sent them and 5 for clam. By contrast it is rare for a critical remote vulnerability to be known for more than 3 days in Linux distributions without having the update to fix it released.

Yes, you need to keep up with the updates. What's "too many" daemons? The point of having a computer is the services and often the remote access it provides.

If you do not need a web server on your desktop do not install it let
alone run it. If you need to run it (for documentation) limit its access
from off the machine. If you must access it remotely don't enable
scripting facilities. And so forth.

If you do not need to run smtpd on your machine, then don't. If you do
not need to run a POP3 tool on your machine, then don't.

But I do need all of those things (and imap and http too). Not all of them on all machines, but if it isn't vulnerable in the places I need it, then it won't be other places either. The great thing about free software is that when someone gets it right, it doesn't matter how many copies of it you run. And if it is vulnerable, I want it reported and fixed, not just avoided so the machine where I need it will be the first to be exploited.

Worse yet if you don't need to run a geewizzilator daemon on your
system, then don't. (That is to say a "gee I wonder what's that"
daemon.)

Same there - if there is a vulnerability, find it and fix it and it won't matter how many of them people run.

There may be undiscovered bugs in Linux distros, but as they are discovered there is no excuse for not fixing them in the product itself. What possible good can come from a third party product (just as likely to contain even more unknown vulnerabilities) being used as a band-aid solution instead of just fixing issues as they are discovered? And that applies to all services - someone needs to run them and they should not make their system any easier to crack beyond adding passwords that might be guessed.

How many different "products" exist in the Red Hat and Fedora Core Linux
distributions?

A lot - but I'm not sure that's a relevant question. If they have bugs they need to be found and fixed.

--
   Les Mikesell
    lesmikesell@xxxxxxxxx


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux