Linked by Thom Holwerda on Wed 20th Jun 2007 20:07 UTC, submitted by Valour
OpenBSD "If you're a software enthusiast who has never used OpenBSD before, you might enjoy installing it by yourself and figuring it out as you go. If, however, you're looking for a more practical approach to using OpenBSD 4.1 on a desktop or server machine, here's a quick guide to get you started in this spectacular operating system."
Permalink for comment 249432
To read all comments associated with this story, please click here.
Robert Escue
Member since:
2005-07-08

I really don't know why people are modding you down because what you are saying is correct. When the Linux Slapper worm was going around it depended on two things in order to exploit a system, a default installation of apache with mod-ssl enabled and gcc on the same machine. As someone who had to answer the questions as to whether or not we were vulnerable to this, it only took me a few seconds after reading how the exploit worked I could answer definitely that we were not vulnerable because I removed gcc and apache from the machines.

If you are going to build a system that is Internet facing, you can either strip the OS to "parade rest" so that you minimize possible attack vectors or do a default install, lock it down and take your chances. SANS, SecurityFocus and other security sites have tons of documents on doing exactly what you recommend. I don't see the problem here unless fretinator is right and you are being modded down for the wrong reasons.

Reply Parent Score: 5