Quote:
Originally Posted by Ronayn
I have unsuccessfully argued
|
What were the arguments you used?
What were the reasons that were given you in return?
Quote:
Originally Posted by Ronayn
archaic security protocol
|
What's the URI? What's it based on? Where's the documentation?
Quote:
Originally Posted by Ronayn
Will using a security protocol designed for Red Hat 5 (no, not Enterprise, RH5 circa 1998) on a Fedora 14 system secure it?
|
While RHL is a far cry from recent Fedora security best practices tend to evolve and adapt. The question is finding out 0) what the protocol was based on and what it offers, 1) what the system needs to be protected against and 2) the reason for wanting to implement an old version of a security protocol. Knowing #0 means knowing if you have a solid foundation to build on, knowing if #0 and #1 match means knowing if putting in any effort will be efficient and produce an end result that adheres to which rules and regulations, mindset or whatever else is used as a yardstick and knowing #2 means knowing what ammo or which strategy to use for discussing changes.
So instead of slagging it off based on what little nfo you provided, IMHO solution-wise a better question would be "what additional measures are required to ensure the system is properly hardened?" .