Linux - DistributionsThis forum is for Distribution specific questions.
Red Hat, Slackware, Debian, Novell, LFS, Mandriva, Ubuntu, Fedora - the list goes on and on...
Note: An (*) indicates there is no official participation from that distribution here at LQ.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Most all of them I think would be almost equivalent, its really up to you and how you setup the OS, and your own actions that make it secure. Though you can check out the NSA's enhanced security version of Linux at their website, http://www.nsa.gov/selinux/index.html , pretty cool, a must check out.
Distribution: Debian, Red Hat, Slackware, Fedora, Ubuntu
Posts: 13,604
Rep:
trickykid is absolutely right. Linux is really only as secure as you make it. No distro is completely secure out of the box. If you want secure out of the box you may want to look into OpenBSD.
I've generally found slackware to be one of the more secure distros out there. It comes with tcp wrappers installed, and although it runs everything by default (just like all the others)it runs it in a bit more secure method. There's not much that needs to be done to "harden" it. After an install I just chmod -x sendmail, lpd, portmap, atd (maybe one or two others) and clear inetd. So far I haven't had problems with it (but it isn't my firewall).
Why not try smoothwall http://www.smoothwall.org for a distro which I don't think is very usable in terms of a desktop but is apparently a bloody good firewall.
I'm curious if jimbix can offer examples of how Slackware runs the same stuff 'in a more secure way' than any other distro. I'm running it on a server right now, and I fail to see the logic in that statement (no offense, I *could* be wrong).
Just keep one thing in mind when it comes to almost any software, particularly OS's and, specifically, Linux - that is: DEFAULTS ARE BAD!! Defaults offer only a balance of performance and stability. Security is pretty much COMPLETELY up to the admin in Linux, and us admins generally are appreciative of that, because we're all control freaks, I guess j/k
Anyway, a default install of any distro I've worked with (redhat, SuSE, slackware, Debian, TurboLinux and Stormix) offer no security or performance, really. Fortunately, there are a million REALLY easy ways to tweak it and make it purr like the machine it really wants to be.
As for security, comment out all the crap in /etc/services that you don't need, check your /etc/rc.d/rc*.d directories to make sure stuff you don't use doesn't start with a capital 'S', and check out http://www.linux-firewall-tools.com which has a tool to build a custom firewall script for your network.
This really is NOT the whole story. You'll need to learn to decipher your logs if you want to know if you're really secure and perform tons of other security related tests.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.