Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Sorry for fueling the flames, but: they're all mostly useless. That is, non-broken software doesn't need them, and it's very hard to write a profile that doesn't allow hacked broken software to take over the machine anyway. Especially with Linux' large number of local exploits. There are almost always better ways to spend your sysadmin time.

Also, no grsecurity?




> non-broken software doesn't need them

In my experience, there's no such thing as non-broken software.


qmail. Postfix. vsftpd. dovecot. OpenSSH (almost). Etcetera.


Bugs have been found in all of these packages. How much are you willing to gamble that there are no more bugs in them?


It's another layer of protection, agreed. But the general consensus amongst people who use these systems is to turn them off. They'e not user friendly (see my post below), pretty much always badly documented, and most people don't have the time required to understand them.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: