User: Password:
|
|
Subscribe / Log in / New account

Kernel.org's road to recovery

Kernel.org's road to recovery

Posted Oct 6, 2011 2:49 UTC (Thu) by dlang (subscriber, #313)
In reply to: Kernel.org's road to recovery by malor
Parent article: Kernel.org's road to recovery

as a security professional I will state that there is a HUGE amount of "Security Theater" going on. it's not possible to defend against absolutely everything, and it is not always desirable to do so.

Everything is a risk, the only way to really secure your computer is to turn it off, unplug it, wrap it in a faraday cage, and then start working on physical security. Since such a machine provides very little value to people, everything is a matter of what level of risk you are willing to take.

running a 'allyes' kernel publicly exposed to attackers (i.e. on the Internet) is a very bad ideal. You want your Internet exposed devices to have as small of an attack surface as possible, and this means disabling features that you don't need. The distro kernels tend to marginal in this area, they enable just about everything, but do so as a module. so it's not always loaded, but some action can cause the kernel to think it's needed and then the module will be auto-loaded.

you need to understand the risks, and then evaluate the risks, not just think "risk == BAD"


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds