When ran against default OpenBSD servers that have Apache enabled, vulnerability assessment software (Nessus, Rapid7, etc.) complain about "browesable web directories". The concern is that someone may accidentally place inappropriate files in the web directories that will then be visible to others. Would it be a good idea to remove the Indexes option from httpd.conf? Admins may enable the option later if they like:
# cvs diff -Nup httpd.conf Index: httpd.conf =================================================================== RCS file: /cvs/src/usr.sbin/httpd/conf/httpd.conf,v retrieving revision 1.26 diff -N -u -p httpd.conf --- httpd.conf 3 Jun 2009 18:28:21 -0000 1.26 +++ httpd.conf 12 Mar 2010 17:39:06 -0000 @@ -396,7 +396,7 @@ DocumentRoot "/var/www/htdocs" # Note that "MultiViews" must be named *explicitly* --- "Options All" # doesn't give it to you. # - Options Indexes FollowSymLinks + Options FollowSymLinks # # This controls which options the .htaccess files in directories can @@ -601,7 +601,7 @@ CustomLog logs/access_log common Alias /icons/ "/var/www/icons/" <Directory "/var/www/icons"> - Options Indexes MultiViews + Options MultiViews AllowOverride None Order allow,deny Allow from all