On Sat, 17 May 2008 06:42:57 +0530
Raj Kiran Grandhi <[EMAIL PROTECTED]> wrote:

> Rico Secada wrote:
> > Hi.
> > 
> > Why is Debian not setup to be secure be default?
> > 
> > Not everyone is a security expert so imho the system should be fully
> > secured out-of-the-box.
> 
> Please elaborate on what you consider to be the insecure parts of a 
> default installation. Describe a process by which an etch system can
> be compromised remotely. Obviously, the ability to become root by
> tweaking the boot parameters from the grub screen does not count as a
> vulnerability.

I am not saying that Debian isn't secure per say, but things like
removing SUID and SGID from files where they generally aren't needed as
default imho is better. If someone needs SUID then he has to set it.

Locating what files that it is generally safe to remove SUID and SGID
from isn't that easy.

> 
> -- 
> Raj Kiran Grandhi
> --
> Politics is for the moment. An equation is for eternity.
>                                         -- Albert Einstein
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
> 
> 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to