augenj Posted May 13, 2006 Posted May 13, 2006 I see security suggestions all over the place. How about IPS producing a list of things that we as customers can do to protect our systems. Obviously, number 1 would be to - * Upgrade to the latest version when it becomes available. * What about the permissions for IPS hosted customers? (which we seem to have lost control over) * What about permissions for non-IPS hosted customers? Recommendations from IPS would be nice. * What type of files do we restrict in the ACP from being uploaded/accessed in the uploads folder? * The largest group of hackers seem to be .ru based. Block (for now) all .ru email registrations? * What mods seem to make our systems more vulnerable? * What type of things should we be looking for as we "float along" out here? * .... add the numerous others that I haven't mentioned. How about treating this list as a "living document" and email your customers with it when the world changes, as it surely will? I'm not looking for answers in this topic. I'd like to see this as a permanent part of our IPS experience. Thanks.
ellawella Posted May 13, 2006 Posted May 13, 2006 * Upgrade to the latest version when it becomes available. That's obvious.* What about the permissions for IPS hosted customers? (which we seem to have lost control over) IPS probably take care of that one.* What about permissions for non-IPS hosted customers? Recommendations from IPS would be nice. Documentation tells you what to do in respect to this.* What type of files do we restrict in the ACP from being uploaded/accessed in the uploads folder? You can't compromise the security of IPB by uploading files using the standard method.* The largest group of hackers seem to be .ru based. Block (for now) all .ru email registrations? Those hackers might concoct a mischievous plan to circumvent this measure: use email addresses not ending in .ru.* What mods seem to make our systems more vulnerable? The ones with exploits?* What type of things should we be looking for as we "float along" out here? Are you on acid? Kidding, kidding :P All that is really needed is to check the updates forum occasionally and read in there.
Mark Posted May 14, 2006 Posted May 14, 2006 I think this is a good idea.Documentation tells you what to do in respect to this. Where would this be?
bfarber Posted May 15, 2006 Posted May 15, 2006 I see security suggestions all over the place. How about IPS producing a list of things that we as customers can do to protect our systems. Obviously, number 1 would be to - * Upgrade to the latest version when it becomes available. [color="red"]That is why there is an "Update Available" icon in the ACP, and why we try to email our customers after a patch is released. It is always important to upgrade.[/color] * What about the permissions for IPS hosted customers? (which we seem to have lost control over) [color="red"]If hosting customers don't have control of this, then it should be a moot issue - our technicians will take care of it.[/color] * What about permissions for non-IPS hosted customers? Recommendations from IPS would be nice. [color="red"]This is in the install guide already. From the zip, Documentation/Installation Guide/install_guide.html - click "Structure and CHMOD" at the top.[/color] * What type of files do we restrict in the ACP from being uploaded/accessed in the uploads folder? [color="red"]This is up to you - IPB renames "bad" files already, so this will never be a problem anyways. Though don't allow members to post HTML, as that can lead to bad stuff if they are intent on causing harm.[/color] * The largest group of hackers seem to be .ru based. Block (for now) all .ru email registrations? [color="red"]I consider this discrimination in all honesty. Just because *some* hackers are Russian, or in recent months more Russians seem to be leaving their mark, doesn't mean you should block all Russians from any given site. It's up to each admin, but I think this idea is ludicrous. As ellawalla pointed out - they could just use a gmail, msn, yahoo, etc. email address anyways.[/color] * What mods seem to make our systems more vulnerable? [color="red"] We don't support or monitor modifications to make this information available.[/color] * What type of things should we be looking for as we "float along" out here? [color="red"]This is not a question we could easily answer....[/color] * .... add the numerous others that I haven't mentioned. How about treating this list as a "living document" and email your customers with it when the world changes, as it surely will? I'm not looking for answers in this topic. I'd like to see this as a permanent part of our IPS experience. Thanks.
Recommended Posts
Archived
This topic is now archived and is closed to further replies.