On Mon, May 18, 2009 at 11:51:02AM +0500, Yuriy Grishin wrote:
> Hi, Joachim
>
> I've got that you wanted to say.
> There are some tools for that are available.
> The main problem is that they detect an intrusion *after* the server is  
> compromised.
> Intrusion detection systems are good but intrusion prevention systems  
> are better.

It is true that a properly updated database might reduce the window of
opportunity for an attacker (then again, so does regularly running
pkg_add -ui, or if you are willing to put in a little more work, reading
a list like Full-Disclosure and reacting to new vulnerabilities
immediately). However, if you cannot afford to be compromised, "patch
management" isn't going to help you: you'll have to run programs that
don't have holes in the first place.

This really isn't impossible, especially not for server-side software.

In other words, I personally don't really see the value of your proposed
database. As far as possible, I run secure software; and as far as
possible, I keep up to date on the latest known exploits for software
that I run.

                Joachim

Reply via email to