linvir wrote:
Is a distro like Slackware a poor choice in terms of security? I'm assuming that I wouldn't be able to simply leave it alone like I do with my home machines. Is the constant manual updating a pain? Do you have to use things like slapt-get?
I use Slackware at home and on my Linode. When I started with Linode.com, the only option was Slackware v9, so that's what I'm currently running. I try to update things manually, which means I'm usually perusing the stable changelog. I'm definitely not a big supporter of Swaret, Slapt-get or any similar package managers, as they have the potential to break installations if your attention wavers, plus I'm an old-school Slacker and like the hands-on approach of Slackware.
Slackware is pretty solid in a default install. Keep in mind that when, during the install process, if you opt to have certain services installed, your choices impact the security posture of the install. Applications themselves are far less secure than kernelspace software (and the GNU toolset), so you need to be acutely aware of what you're installing (this goes for ALL distros), as Apache, for example, opens up a whole new world when dealing with security. I don't run any PHP-based software at all, because of the possible security implications. While Pat Volkerding has security in mind when compiling software packages, he's not the actual person developing the software...if the software code is loosely thrown together, it's certainly not his fault, although I'm pretty sure he evaluates each package that he includes in Slackware. He certainly updates each package if bugs or vulnerabilities are found by the software creator.
I've multiple layers of security applied to my Linode (layered security is the best approach). I've Snort running in daemon (IDS) mode (which reports all logged traffic to a machine on my home network), I've mod-security running and functioning as an application firewall for my web server. I've most services not running and those that do run are running on non-standard ports. I've IPTables implemented. I also have Denyhost blocking brute-force attempts. I've SSH configured to only accept key-based authentication. I've scripts running that logs certain stats to help me determine if my node has been compromised. All of this was done over the last 3 or so years.
While Slackware is a good candidate as a light yet secure distro, the admin who is installing and using plays a huge part of the overall security posture.