Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 May 2006 13:55:11 -0400
From:      "fbsd" <fbsd@a1poweruser.com>
To:        "Jim Stapleton" <stapleton.41@gmail.com>, <freebsd-questions@freebsd.org>
Subject:   RE: securing beyond the handbook
Message-ID:  <MIEPLLIBMLEEABPDBIEGGEKCHGAA.fbsd@a1poweruser.com>
In-Reply-To: <80f4f2b20605100617t3adfc57brc213c8571288727f@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
There is no difference between a dynamic and static ip
address from the point of the firewall.

If you felt secure before, then getting a static ip
address will have no effect on that.

-----Original Message-----
From: owner-freebsd-questions@freebsd.org
[mailto:owner-freebsd-questions@freebsd.org]On Behalf Of Jim
Stapleton
Sent: Wednesday, May 10, 2006 9:18 AM
To: freebsd-questions@freebsd.org
Subject: securing beyond the handbook


I'm about to get a static IP and direct outside access for my BSD
box
(before it was hidden behind a firewall/NAT). I was comfortable with
the level of security I've had, but with the whole "open to the
outside world" setup I'll have, what would you suggest for securing
it?

I'll be running:
Apache
PHP
MySQL
SSH/SFTP
OpenRPG (only occasionally, from a special nonpriv account)

Any suggestions, any of these that you know are such huge security
holes that you would absolutely demand something else be run?

Any other security suggestions?

Thanks,
-Jim
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"freebsd-questions-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?MIEPLLIBMLEEABPDBIEGGEKCHGAA.fbsd>