Thank You for Your time and answer, Eric:

> This works in the simple case, the only thing to be aware of is that
> if someone has the ability to change you /usr/bin/sudo, then they can
> probably update the debsum as well (unless debsums are signed... are
> they?)

Is there key point on investigation from whence the danger came
(through which service they got in) - as it was a secure machine - IMHO?

Are there a port list the packages my debian distro work with (to send
and to get the info) - so that I can be able to close all others (I did
so for the INPUT chain, but not for OUTPUT).

How complicated is setting up of a SELinux for isolating a service like
postfix, clamav, amavis, apache, etc? - All I want is just to specify -
if the security issue in the services - let it breakout not - that is to
prevent access to the system (root environment/privileges). Or is it
much easier to use a VM like qemu and put each service in every VM?

Thank You for Your precious to me advices.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to