|Re: Post from DSL lead dev on forum|
[ Thread Index |
| More lists.tuxfamily.org/slitaz Archives
- To: slitaz@xxxxxxxxxxxxxxxxxxx
- Subject: Re: Post from DSL lead dev on forum
- From: "Mitch Porter" <portershouse@xxxxxxxxx>
- Date: Tue, 1 Apr 2008 16:36:54 -0600
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; bh=ye9p437vb6ZXXBNru4OVQtxQTsdgQZZVU0fxRDN5+0A=; b=CpIdLOxEPsGC5kmbtyy7QlfaqOl3a+7Vdq4cMzcDMYiUlDwdpt+ZqBTpgnlAEb310fnE/0wn9z7i6QkUqkYesRIE9BakBFZlnPz94sksc+GRYNihV2849wDrvNcULv9ewFIth9yQWPA1j0A9t1XEcm2fD+PQUcQmp9xTi4xza8Y=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; b=JM0phYZGECwYYFXDre2Gq399IHYsvJ/ZIgkkb24U8zlYvsX3Nbdq0sMxin+jInq/WUNj1u/93xVN5riMwhtCbnpQkylo9V83NGVtgy6udA0wlji7LSK2eWaqTrgsHWt4PXs9yWTdZZnGhgWmOAGu3zG++TSMWnOvz6kT8nMh0tc=
Great explanation on the "questionable security" of Slitaz...
Informative and straight to the point. This info on the site would help
us linux starters to qualm any "fears". And to assist in further user
By the way doesn't every distro use some compression any way? I mean 600 - 700 mb expanded to 1 - 1.5 gig or so...
How about bravo, good job, and may we use that?
How do we forget what linux is all about?
Isn't it really "leen' nux" anyway?
On Tue, Apr 1, 2008 at 3:29 PM, Christophe Lincoln <pankso@xxxxxxxxxx
It's a nice post, I love it.
Mybe a few more information from the SliTaz devs, about security, ports
your IP's, and compression.
SliTaz boot with only one open port: 80. This port is used by the
web server with HTTP protocol. Port 80 and HTTP is the port and
protocol everyone use, in most case to access the web (Port 443 is
generaly used for https).
SliTaz dont start Dropbear SSH server by default, so attack on port 22
to try gain access the host system is impossible.
SliTaz also disable by default root login by SSH, so you can't direct
attack root account if you start manually or at boot Dropbear server.
Crackers have to crack a user password and then root password to be
able to use 'su'. Almost very difficult.
For the IP and default page on the website... Funny, me and Eric wanted
to provide a nice home page installed on the CD with searchbox for
wikipedia, Google, etc... and with a great big Spider!
And.. how www.slitaz.org might gain the upper hand via firefox? Is there
any known bug? In this case all distributions on live CD are
vulnerables (Via sudo su)
> Lots of commpression is used here gzip and lzma to achieve small
> size. We have often discussed using more compression but didn't
> because the older cpus would spend too much time decompressing
> things. Small distro does not mean run extremely fast on very old
> hardware due to overhead of uncompressing.
This is true only for boot time. When booted (Boot baby.. boot!) SliTaz
use compressed files located all in RAM, so much more fast than files
compressed with cloop on a cdrom!
For the SliTaz devs,