From: Woody on
James Taylor <usenet(a)oakseed.demon.co.uk.invalid> wrote:

> Woody wrote:

> > I never trusted software firewalls, I mean if you allow the network you
> > allow the network so you can fool the thing behind it
>
> Agreed. The firewall itself is a potential point of vulnerability, but
> at least it should have been engineered very carefully to be small and
> robust as possible, and it should be better than leaving several
> different system daemons accessible.

Hmm.. don't know. The system daemons are older than the firewall and
have had greater testing. You would certainly like to think it had been
written differently, but it is adding more software.


--
Woody
From: David Sankey on
In article <1jco4db.piro281c7hri6N%usenet(a)alienrat.co.uk>,
usenet(a)alienrat.co.uk (Woody) wrote:

> James Taylor <usenet(a)oakseed.demon.co.uk.invalid> wrote:
>
> > Woody wrote:
>
> > > I never trusted software firewalls, I mean if you allow the network you
> > > allow the network so you can fool the thing behind it
> >
> > Agreed. The firewall itself is a potential point of vulnerability, but
> > at least it should have been engineered very carefully to be small and
> > robust as possible, and it should be better than leaving several
> > different system daemons accessible.
>
> Hmm.. don't know. The system daemons are older than the firewall and
> have had greater testing. You would certainly like to think it had been
> written differently, but it is adding more software.

My previous post suggested ways of configuring the firewall to do what
you want. But turning off the unwanted daemons is also no bad thing.

The NSA hardening guide describes what you need to do:
<http://www.nsa.gov/ia/_files/factsheets/macosx_hardening_tips.pdf>

Kind regards,

Dave
From: D.M. Procida on
Ben Shimmin <bas(a)llamaselector.com> wrote:

> > There is an increasing
> > shortage of time pressing upon me with the work I'm doing,
>
> It's amazing how much time you can save by the simple expedient of
> posting to usenet less often.

That's all very well, but what if the other person in your discussion is
just *wrong*?

Daniele
From: James Taylor on
Graham J wrote:

> Why not put the Mac on its own LAN segment? Set up an ethernet
> router between it and the rest of the LAN, then none of its
> broadcasts will get out.

Yes, that's what I will do as a stopgap solution for now, because I
really must make progress with my work on it. But ultimately I want to
be able travel to client premises with it, and not have to worrying that
the hypervisor OS is exposed.

--
James Taylor
From: Jaimie Vandenbergh on
On Thu, 21 Jan 2010 12:24:47 +0000, David Sankey
<David.Sankey(a)stfc.ac.uk> wrote:

>My previous post suggested ways of configuring the firewall to do what
>you want. But turning off the unwanted daemons is also no bad thing.
>
>The NSA hardening guide describes what you need to do:
><http://www.nsa.gov/ia/_files/factsheets/macosx_hardening_tips.pdf>

There's a lot of good stuff over there. Browsing from
http://www.nsa.gov/ia/guidance/security_configuration_guides/index.shtml
is interesting.

No mentions of Flash that I can find!

Cheers - Jaimie
--
"Usenet is like a herd of performing elephants with diarrhea -
massive, difficult to redirect, awe-inspiring, entertaining,
and a source of mind-boggling amounts of excrement when you
least expect it." -- Gene Spafford
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13
Prev: HyperCard, or something else
Next: HTML5 video on YouTube