Date: Thu, 20 Jan 2005 06:57:43 -0800 (PST) From: Dave McCammon <davemac11@yahoo.com> To: questions@freebsd.org Subject: Re: Security for webserver behind router? Message-ID: <20050120145743.30672.qmail@web41415.mail.yahoo.com> In-Reply-To: <20050120110725.GA99151@webmail.home.brasapen.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--- Eilko Bos <tafkam@brasapen.org> wrote: > >From the keyboard of Ted Mittelstaedt, written on > Wed, Jan 19, 2005 at 11:25:00PM -0800: > > > I am running Apache 1.3.33, as you suggest I > should. You say > > > "as long as > > > Apache is secure"; what should I do to be sure > that Apache is secure? > > > > > > > Nothing, you nor nobody can do this. All you can > do is subscribe to > > the Apache mailing list and if someone discovers a > hole in Apache > > at some point in the future, then you can > immediately patch your > > installation with the inevitable patch that will > shortly follow. > > Don't forget that Apache's nature is offering > content. What about unsafe > PHP/CGI-scripts? You can secure Apache, but that > doesn't help when your > webapplication is a big hole to your system. > > Just my 0.2$c > > Grtz, You can also use usr/ports/www/mod_security to help secure Apache. __________________________________ Do you Yahoo!? Yahoo! Mail - 250MB free storage. Do more. Manage less. http://info.mail.yahoo.com/mail_250
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050120145743.30672.qmail>