SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I want to know what security (firewall, antivirus, logging not with "root") to use, to be safe.
Slackware i am using for home PC without other computers (one PC).
Edit /etc/inetd.conf and comment out lines representing services you don't need. If I remember right (a long-shot, granted), ports 37 (time) and 113 (auth) are unnecessarily listening. Restart inetd with "/etc/rc.d/rc.inetd restart"
Also, any services you're only using locally (CUPS, Sendmail, X etc. etc.) should be set up to only listen on localhost.
Project Files has a nice rc.firewall script that can be dropped into /etc/rc.d/ (and chmod +x) that blocks all incoming connections by default. It's easy to edit (very well commented). http://projectfiles.com/firewall/ (get the latest 2.0 version).
You can subscribe to the "security" mailing list over at slackware.com for notifications of any necessary updates. Security patches can be found at:
Edit /etc/inetd.conf and comment out lines representing services you don't need. If I remember right (a long-shot, granted), ports 37 (time) and 113 (auth) are unnecessarily listening. Restart inetd with "/etc/rc.d/rc.inetd restart"
If I remember right (a long-shot, granted), ports 37 (time) and 113 (auth) are unnecessarily listening.
Auth is used for identification, for example, when you are logging to IRC server. So if you are planning to chat on IRC, don't disable it. Otherwise you will have to wait for server's response.
Sadly, don't know about time purpose.
well, another thing you could do to harden your box is to recompile your kernel using a stripped-down config (only the options you need) and also you could patch it with the grsecurity patch: http://www.grsecurity.net/
if you need a kernel compile guide here's a neat one:
Edit /etc/inetd.conf and comment out lines representing services you don't need. If I remember right (a long-shot, granted), ports 37 (time) and 113 (auth) are unnecessarily listening...
good to know those ports are good-for-nothing .... closing ... done. Fine
now, why do those 2 ports come open by default if are not used?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.