Date: Wed, 10 May 2006 13:55:11 -0400 From: "fbsd" <fbsd@a1poweruser.com> To: "Jim Stapleton" <stapleton.41@gmail.com>, <freebsd-questions@freebsd.org> Subject: RE: securing beyond the handbook Message-ID: <MIEPLLIBMLEEABPDBIEGGEKCHGAA.fbsd@a1poweruser.com> In-Reply-To: <80f4f2b20605100617t3adfc57brc213c8571288727f@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
There is no difference between a dynamic and static ip address from the point of the firewall. If you felt secure before, then getting a static ip address will have no effect on that. -----Original Message----- From: owner-freebsd-questions@freebsd.org [mailto:owner-freebsd-questions@freebsd.org]On Behalf Of Jim Stapleton Sent: Wednesday, May 10, 2006 9:18 AM To: freebsd-questions@freebsd.org Subject: securing beyond the handbook I'm about to get a static IP and direct outside access for my BSD box (before it was hidden behind a firewall/NAT). I was comfortable with the level of security I've had, but with the whole "open to the outside world" setup I'll have, what would you suggest for securing it? I'll be running: Apache PHP MySQL SSH/SFTP OpenRPG (only occasionally, from a special nonpriv account) Any suggestions, any of these that you know are such huge security holes that you would absolutely demand something else be run? Any other security suggestions? Thanks, -Jim _______________________________________________ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?MIEPLLIBMLEEABPDBIEGGEKCHGAA.fbsd>