LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 12-30-2010, 07:30 PM   #1
molossus
Member
 
Registered: Nov 2010
Location: US
Distribution: Ubuntu 12.04
Posts: 49

Rep: Reputation: 0
Question slackware security


just being curious,
is security in slackware better than fedora?
i mean in a fresh install of both distros. or do they have equal security.

correct me if iam wrong, but since in slackware everything is manual, doesn't that make it more difficult to hack than fedora?
 
Old 12-30-2010, 08:01 PM   #2
tallship
Member
 
Registered: Jul 2003
Location: On the Beaches of Super Sunny Southern San Clemente, California USA
Distribution: Slackware - duh!
Posts: 534
Blog Entries: 3

Rep: Reputation: 118Reputation: 118
Exclamation

Quote:
Originally Posted by molossus View Post
just being curious,
is security in slackware better than fedora?
OMG! Yes!!!

Quote:
Originally Posted by molossus View Post
i mean in a fresh install of both distros. or do they have equal security.
NO!

Quote:
Originally Posted by molossus View Post
correct me if iam wrong, but since in slackware everything is manual, doesn't that make it more difficult to hack than fedora?
um... No.

Basically, had your question been, 'since Slackware requires that you *enable* most things that open ports...', then the answer would have been Yes.

There's a lot of time spent disabling and hardening an RH box, while there is an inverse (but slightly less) amount of time spent on enabling things such as daemons that expose your freshly installed Slackware boxes to the world - providing you ample *security* in knowing that you "really want to start up portmapper and expose your exported filesystems without firewalling those ports or configuring /etc/hosts.deny first".

In a nutshell, on any given Sunday, it is most often the software that has exploits exposed. The Slackware Team, as well as the RH folks both do a good job of staying on top of things like [the recent] vulnerabilities in PHP and BIND, for example.

The difference is, that most things that will find a box vulnerable in a stock Slackware distribution in the first place require a conscious decision for you to fire up, following the understanding that this is what you want and the proactive measures being put in place to guard those services.

In RH, well.......
 
1 members found this post helpful.
Old 12-30-2010, 09:40 PM   #3
T3slider
Senior Member
 
Registered: Jul 2007
Distribution: Slackware64-14.1
Posts: 2,367

Rep: Reputation: 843Reputation: 843Reputation: 843Reputation: 843Reputation: 843Reputation: 843Reputation: 843
I don't think Slackware is inherently more secure than other distros, though I'm also not confident that you could label it as less secure. Certainly it is less secure in the sense that the kernel is very rarely patched after a stable release and only for very critical bugs -- there are *many* security vulnerabilities in the fully patched 2.6.33.4 kernel shipped with Slackware 13.1, for example (and likely even more in previous Slackware versions). Major security vulnerabilities in software are patched fairly adequately, though historically there has sometimes been a delay before it is released officially.

Slackware ships with no enabled firewall and /etc/hosts.deny and /etc/hosts.allow are, I believe, both blank. Certainly that isn't a very secure way to run your box, and upon installing Slackware some of my first tasks include properly setting up those two files and creating an iptables firewall. While this doesn't prevent software exploits it at least produces a simple improvement in security.

Slackware doesn't often add custom software patches, so as long as upstream fully discloses their vulnerabilities and patches them, most software included with Slackware will be patched or upgraded to seal any holes as they are found (as opposed to some other distros, which must watch upstream and review their own patched code to find any holes, thus placing more of the burden in two places instead of one). However, if upstream just releases upgrades in the form of stable versions, without disclosing security fixes or without anyone submitting the (now-fixed) vulnerability to CVE, the hole will likely remain unplugged since Slackware packages are *not* updated for simple bug fixes (only security vulnerabilities). Additionally, older code is likely audited less as time goes on, so running Slackware 8.x, even keeping up with official patched packages, is still probably less secure despite Pat doing all he can.

In the end, I don't believe Slackware to be any less secure than most other distros, but I would hesitate in saying that it is more secure.
 
1 members found this post helpful.
Old 12-30-2010, 11:34 PM   #4
molhar
Member
 
Registered: Jul 2009
Location: Knoxville, Tennessee
Distribution: Slackware64-current
Posts: 36

Rep: Reputation: 1
Good answers, guys. Perhaps one of the best things that sets Slackware apart from almost everybody else is that simply by going to a Slack mirror site, you have reams of information at your fingertips: everything from the filelist (for a quick overview) to the packages list where every single package has a detailed description of what it is (...well, except for some of the X packages...) so that you, as a user and administrator, can decide if you really want to include packages you'll never use. And if something doesn't work because you haven't included a package that you didn't know you did need, a simple "installpkg foo" solves that issue (and you've learned something new besides).

Changelog, checksums...it's all there in one directory and completely transparent to anyone, anywhere. Try that with anybody else other than Debian. Notice how it's those two long-time workhorse distros that don't bury this information in hard-to-find places.

I have a standard-sized 3-ring binder with every step of a Slackware install, including a list of which packages I omit on both my x86 and x86_64 machines (and it's not always the same packages since each lappy has different hardware), a list of the SlackBuilds I always add on top of a fresh install, my iptables, etc. After no more than a couple of installs using my notes, Slackware actually takes me less time to install (and upgrade any packages that need it) than any other distro, including Fedora, the *buntus, PCLinuxOS, Debian or anything else I can name.

Armed with nothing more than Slackware, this forum, the wiki, Eric & Bob's pages and Robert Love's Linux kernel book, a curious person can learn a lot in their spare time and have fun doing it.

Slackware...gotta love it.
 
Old 12-31-2010, 02:22 AM   #5
brixtoncalling
Member
 
Registered: Jul 2008
Location: British Columbia
Distribution: Slackware current
Posts: 403

Rep: Reputation: 67
Go ask on the Fedora forums and tell us what they say!
 
Old 12-31-2010, 01:17 PM   #6
tallship
Member
 
Registered: Jul 2003
Location: On the Beaches of Super Sunny Southern San Clemente, California USA
Distribution: Slackware - duh!
Posts: 534
Blog Entries: 3

Rep: Reputation: 118Reputation: 118
Talking

Quote:
Originally Posted by brixtoncalling View Post
Go ask on the Fedora forums and tell us what they say!
heh.

They *might* say:

Or perhaps...

Code:
# rpm -ivh slackware-13.1.x86_64.rpm --nodeps
Kindest regards,
 
Old 12-31-2010, 01:20 PM   #7
molossus
Member
 
Registered: Nov 2010
Location: US
Distribution: Ubuntu 12.04
Posts: 49

Original Poster
Rep: Reputation: 0
Cool

Quote:
Originally Posted by tallship View Post
heh.

They *might* say:

Or perhaps...

Code:
# rpm -ivh slackware-13.1.x86_64.rpm --nodeps
Kindest regards,
haha
i like your jokes.
 
Old 12-31-2010, 01:27 PM   #8
gargamel
Senior Member
 
Registered: May 2003
Distribution: Slackware, OpenSuSE
Posts: 1,839

Rep: Reputation: 242Reputation: 242Reputation: 242
I agree, but I wonder, if it is really a good idea, that inetd is started by default on Slackware...
If you want to expose your machine to the internet, then yes, but probably most users run Slackware on machines behind a firewall/router, and I guess, most installations are on desktop systems. And on these, as well as on many servers, inetd is not needed.

Apart from that: Slackware doesn't include quite a few things, that cause security issues on other systems. On the other hand, there's no firewall by default etc. But this perfectly the scenario described above. You don't need two firewalls enabled (in fact, it could cause even more trouble than none). But if you plan to make a Slackware system your gateway, there are excellent 3rd party solutions available from various repositories, from easy to handle up to very powerful and flexible.

gargamel
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Slackware security? avalanch Linux - Security 2 05-25-2009 03:09 PM
Security update and hardware: To Slackware or not to Slackware... Vrajgh Slackware 29 12-04-2007 04:35 PM
slackware security... marsques Slackware 5 02-26-2005 10:57 PM
slackware security e1000 Slackware 3 11-15-2003 02:33 PM
Slackware Security Update: GDM security update phoeniXflame Slackware 2 08-26-2003 04:21 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 03:03 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration