2009/9/24 Joachim Schipper <joac...@joachimschipper.nl>:
> On Thu, Sep 24, 2009 at 11:00:35AM +0200, Paul de Weerd wrote:
>> On Thu, Sep 24, 2009 at 10:42:58AM +0200, Joachim Schipper wrote:
>> | On Wed, Sep 23, 2009 at 08:09:53PM -0500, Matthew Young wrote:
>> | > Hello,
>> | >
>> | > The website of gotroot.com states for their apache1 rules: "Retired Rules
>> | > (No longer updated) "
>> | >
>> | >
>> | > The initial question prevails: Is this the best appoach? How secure are
>> | > these "old" rules?
>> |
>> | Adding mod_security shouldn't decrease your security; it only increases
>> | it if you have otherwise-insecure software installed, and you can only
>> | hope that it plugs all holes in that case.
>>
>> Adding pieces of software means more code. More code generally means
>> more bugs. Maybe it's just me, but going by the name, "mod_security"
>> seems like a REALLY bad idea to me.
>
>> (a module that adds security ? why not have security in the first
>> place ?)
>
> There's a reason why I wrote "should".
>
> See
> http://osvdb.org/search?search[vuln_title]=mod_security&search[text_type]=alltext.
>
> But yes, mod_security is usually a bad idea. It can be helpful on a
> shared host where people are allowed to install (and not maintain) their
> own Wordpress installations and such. In that case, it doesn't provide
> security but is likely to reduce the frequency of compromise.
>
>                Joachim
>
>

Yes, that's the idea, in shared host its a lifeguard but always its
more safe a good code and configuration like chroot and disable
functions in PHP fastcgi mode.

Reply via email to