[ale] [OT]FreeBSD Resources
Bob Toxen
bob at verysecurelinux.com
Tue Feb 24 21:17:54 EST 2004
On Tue, Feb 24, 2004 at 08:46:37PM -0500, John Wells wrote:
> On Tue, 24 Feb 2004 20:06:24 -0500
> Bob Toxen <bob at verysecurelinux.com> wrote:
> > Why?
> > For 99% of applications BSD has no advantages over Linux.
> So, out of curiosity and for the sake of discussion, what exactly
> comprises that 1%?
1. The boss says it's gotta be BSD.
2. Most/all of the other systems are BSD and so "that non-standard
Linux system" becomes a liability.
3. The person doing the firewall rules is more experienced with the
BSD firewall software than the Linux firewall software.
4. Extremely high performance is required. The last I checked
BSD has higher network performance. Unless one needs sustained
gigabit speeds this does not matter. This may not be true
as of the 2.6 Linux kernel. This assumes that the SysAdmin
understands performance so well that he won't introduce
inefficiencies.
I have tuned existing rule sets and obtained 10-30 fold
(3000%) improvement in performance. This rarely is needed.
5. Extremely high security is required. There's been some Linux kernel
security problems in the past few months. This assumes that the
person configuring the system is such an expert that the minor
security differences between Linux and Unix are more likely to be
a problem than a configuration error on the part of the SysAdmin.
I don't think that these reasons are valid for the other 99% of the time.
Computers are cheap. People's time is expensive.
> Thanks,
> John
You're welcome.
Best regards,
Bob Toxen, CTO
Fly-By-Day Consulting, Inc.
"Your expert in Firewalls, Virus and Spam Filters, VPNs,
Network Monitoring, and Network Security consulting"
bob at verysecurelinux.com (e-mail)
+1 770-662-8321 (Office: 10am-6pm US Eastern Time)
+1 404-216-5100 (Cell away from office)
My recent talks on Linux security include:
at IBM's Linux Competency Center in New York City on Mar. 06 last year
at the Atlanta SecureWorld Expo in Atlanta on May 22 last year
at the Enterprise Linux Forum in Silicon Valley on June 04 last year
at Computer Associates' Atlanta Linux Security Summit on Sep. 16 last year
at Southeast Cybercrime Summit in Atlanta on Mar. 2-5 2004
at the FBI's Atlanta headquarters on Mar. 10 2004
Author,
"Real World Linux Security: Intrusion Detection, Prevention, and Recovery"
2nd Ed., Prentice Hall, (C) 2003, 848 pages, ISBN: 0130464562
Also available in Japanese, Chinese, and Czech.
If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke
http://www.verysecurelinux.com [Network & Linux/Unix Security Consulting]
http://www.realworldlinuxsecurity.com [My 5* book: "Real World Linux Security"]
http://www.verysecurelinux.com/sunset.html [Sunset Computer]
Quality Linux, UNIX and network security and software consulting since 1990.
Public key available at http://www.verysecurelinux.com/pubkey.txt, keyservers,
and on the CD-ROM that comes sealed and attached to Real World Linux Security
pub 1024D/E3A1C540 2000-06-21 Bob Toxen <book at realworldlinuxsecurity.com>
Key fingerprint = 30BA AA0A 31DD B68B 47C9 601E 96D3 533D E3A1 C540
sub 2048g/03FFCCB9 2000-06-21
More information about the Ale
mailing list