----- "Brian Mathis" <brian.mat...@gmail.com> wrote:

> On Thu, Jan 14, 2010 at 2:01 AM,  <da...@lang.hm> wrote:
> [...]
> > Along the same lines. for large applications (like Apache), don't
> enable
> > features that you don't need. If possible compile your own so that
> the
> > features you don't need aren't even compiled. This makes it likely
> that
> > security patches for this application are not actually required for
> your
> > installation.
> [...]
> > David Lang
> 
> I have to disagree here.  If you are using an Enterprise Linux
> distro,
> you should not be compiling things yourself.  It destroys the whole
> point of using an Enterprise distro.  They go to great lengths to
> test
> all the dependencies and ensure that you have a valid system.
> Compiling your own blows this out of the water, especially if you
> "make install" on the target system.  It's only marginally better if
> you roll your own RPMs and then install those.

I could see David's approach as viable if he has the time to baby the service.  
If a web service is his bread and butter (i.e. server farm of just those 
apaches/nginx/lighthttpds) and he does adequate testing, a custom-compile could 
be more secure, or even required.  I have not been in such an environment.  
But, I imagine that some shops need custom-compiled applications for a 
particular functionality/performance threshold.  With proper care, I could see 
it being more secure than the stock distro.

Most folks should just stick with the enterprise release though.  It's a lot 
more efficient to simply disable all but necessary modules.
_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to