<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Your Distro is Insecure: Ubuntu</title>
	<atom:link href="http://www.linux-mag.com/id/7297/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.linux-mag.com/id/7297/</link>
	<description>Open Source, Open Standards</description>
	<lastBuildDate>Sat, 05 Oct 2013 13:48:18 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: hip flexor strain running</title>
		<link>http://www.linux-mag.com/id/7297/#comment-981039</link>
		<dc:creator>hip flexor strain running</dc:creator>
		<pubDate>Tue, 04 Jun 2013 09:02:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-981039</guid>
		<description>These De - Puy products were proven to be defective and harmful to the patients 
who used them. We are able to bend at the hips and perform other 
activities concerning the hip thanks to this bone.
(2) compression of abdominal contents results, impeding circulation,.</description>
		<content:encoded><![CDATA[<p>These De &#8211; Puy products were proven to be defective and harmful to the patients<br />
who used them. We are able to bend at the hips and perform other<br />
activities concerning the hip thanks to this bone.<br />
(2) compression of abdominal contents results, impeding circulation,.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: develop iphone apps on windows</title>
		<link>http://www.linux-mag.com/id/7297/#comment-972995</link>
		<dc:creator>develop iphone apps on windows</dc:creator>
		<pubDate>Thu, 30 May 2013 20:47:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-972995</guid>
		<description>Hello there! I know this is kinda off topic nevertheless I&#039;d figured I&#039;d ask.

Would you be interested in trading links or maybe guest authoring a blog article or vice-versa?
My site addresses a lot of the same topics 
as yours and I feel we could greatly benefit from each other.

If you&#039;re interested feel free to send me an email. I look forward to hearing from you! Wonderful blog by the way!

my blog post &lt;a href=&quot;http://miesha34spillers.blinkweb.com/&quot; rel=&quot;nofollow&quot;&gt;develop iphone apps on windows&lt;/a&gt;</description>
		<content:encoded><![CDATA[<p>Hello there! I know this is kinda off topic nevertheless I&#8217;d figured I&#8217;d ask.</p>
<p>Would you be interested in trading links or maybe guest authoring a blog article or vice-versa?<br />
My site addresses a lot of the same topics<br />
as yours and I feel we could greatly benefit from each other.</p>
<p>If you&#8217;re interested feel free to send me an email. I look forward to hearing from you! Wonderful blog by the way!</p>
<p>my blog post <a href="http://miesha34spillers.blinkweb.com/" rel="nofollow">develop iphone apps on windows</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cheap Webhost</title>
		<link>http://www.linux-mag.com/id/7297/#comment-53725</link>
		<dc:creator>Cheap Webhost</dc:creator>
		<pubDate>Wed, 23 Nov 2011 23:50:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-53725</guid>
		<description>Thanks  for every other informative web site. Where else may just I am getting that kind of info written in such an ideal method? I&#039;ve a project that I&#039;m just now working on, and I have been at the glance out for such info.</description>
		<content:encoded><![CDATA[<p>Thanks  for every other informative web site. Where else may just I am getting that kind of info written in such an ideal method? I&#8217;ve a project that I&#8217;m just now working on, and I have been at the glance out for such info.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: jrichter</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6334</link>
		<dc:creator>jrichter</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6334</guid>
		<description>This is good in that I&#039;ve noticed many of these in servers I use in the past and thought they were superfluous, but Linux admin is not something I do other than when I get forced into it--just not my real job.  However, I&#039;m not sure from the article&#039;s close that this was a complete list or simply where the author ended.  That would be good to know.  I&#039;m also in a bit of mystery about some of those extra users--when and under what circumstance are they needed?  It also might have been helpful to illustrate a sample of the fixes to remove any lingering questions--I realize that is probably very basic for most readers, but it is critical for the reader missing that last bit of &quot;how to&quot; knowlege.</description>
		<content:encoded><![CDATA[<p>This is good in that I&#8217;ve noticed many of these in servers I use in the past and thought they were superfluous, but Linux admin is not something I do other than when I get forced into it&#8211;just not my real job.  However, I&#8217;m not sure from the article&#8217;s close that this was a complete list or simply where the author ended.  That would be good to know.  I&#8217;m also in a bit of mystery about some of those extra users&#8211;when and under what circumstance are they needed?  It also might have been helpful to illustrate a sample of the fixes to remove any lingering questions&#8211;I realize that is probably very basic for most readers, but it is critical for the reader missing that last bit of &#8220;how to&#8221; knowlege.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: actaea</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6335</link>
		<dc:creator>actaea</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6335</guid>
		<description>I took the time to read this article because I was worried about my computer.  Instead, I find a bunch of anal retentive drivel that would seriously inconvenience many desktop users.  Admittedly, the article talks about Ubuntu server, and may have valid points for people installing a server.  Perhaps, it should have been titled &quot;Your Linux Server Installs Insecurely&quot; so that it would only reach the audience interested in it.</description>
		<content:encoded><![CDATA[<p>I took the time to read this article because I was worried about my computer.  Instead, I find a bunch of anal retentive drivel that would seriously inconvenience many desktop users.  Admittedly, the article talks about Ubuntu server, and may have valid points for people installing a server.  Perhaps, it should have been titled &#8220;Your Linux Server Installs Insecurely&#8221; so that it would only reach the audience interested in it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: edantes</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6336</link>
		<dc:creator>edantes</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6336</guid>
		<description>I doubt this article was meant for typical standalone workstations. &lt;br /&gt;
&lt;br /&gt;
I agree there is a concern with the open user directories, but outside educational installations, true multi-user machines are becoming rare. For instance, with my provider, I am the  sole user of a virtual machine.  Isn&#039;t that the rule nowadays?</description>
		<content:encoded><![CDATA[<p>I doubt this article was meant for typical standalone workstations. </p>
<p>I agree there is a concern with the open user directories, but outside educational installations, true multi-user machines are becoming rare. For instance, with my provider, I am the  sole user of a virtual machine.  Isn&#8217;t that the rule nowadays?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: linmag@perd.org</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6337</link>
		<dc:creator>linmag@perd.org</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6337</guid>
		<description>This article probably shouldn&#039;t have singled out Ubuntu. Although the brief information presented is true, it is also true of other Linux Distros and other varients of UNIX. The &quot;Open by default&quot; approach is often taken. I&#039;ve worked on Solaris, HP-UX, Linux, etc for many years and if you want to secure them you have to clean it up after it&#039;s installed. (Unless you get a pre-secured version...) This is only a couple of specific open issues - there are many many more areas. If you want to secure a system you have to start by ONLY installing and running the services you really need. Then remove/close off accounts, ports, SUID programs, etc. You will never secure a system when you just load and go.</description>
		<content:encoded><![CDATA[<p>This article probably shouldn&#8217;t have singled out Ubuntu. Although the brief information presented is true, it is also true of other Linux Distros and other varients of UNIX. The &#8220;Open by default&#8221; approach is often taken. I&#8217;ve worked on Solaris, HP-UX, Linux, etc for many years and if you want to secure them you have to clean it up after it&#8217;s installed. (Unless you get a pre-secured version&#8230;) This is only a couple of specific open issues &#8211; there are many many more areas. If you want to secure a system you have to start by ONLY installing and running the services you really need. Then remove/close off accounts, ports, SUID programs, etc. You will never secure a system when you just load and go.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: matador</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6338</link>
		<dc:creator>matador</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6338</guid>
		<description>OMG. This article is crap. FYI, Ubuntu uses dovecot for imap/pop. Dovecot supports only POP3 and IMAP4rev1. netstat can&#039;t tell you what version of protocol is in use (telnet to the port and check it for your self!). bootpc/UDP - your system is runing dhclient (I guess you haven&#039;t configured network in /etc/network/interfaces). bootps/UDP - you are even funnier; you are running DHCP server on you machine. Mind you, Ubuntu server won&#039;t install dhcp server by default - it doesn&#039;t even have a task for dhcp server. Are you trying to spread FUD?&lt;br /&gt;
&lt;br /&gt;
&#039;So when any of these accounts are compromised interactive remote access is most likely the results.&#039;&lt;br /&gt;
&lt;br /&gt;
LOL! /bin/false would prevent that? How? What would stop attacker of running chsh?&lt;br /&gt;
&lt;br /&gt;
You are totally clueless.</description>
		<content:encoded><![CDATA[<p>OMG. This article is crap. FYI, Ubuntu uses dovecot for imap/pop. Dovecot supports only POP3 and IMAP4rev1. netstat can&#8217;t tell you what version of protocol is in use (telnet to the port and check it for your self!). bootpc/UDP &#8211; your system is runing dhclient (I guess you haven&#8217;t configured network in /etc/network/interfaces). bootps/UDP &#8211; you are even funnier; you are running DHCP server on you machine. Mind you, Ubuntu server won&#8217;t install dhcp server by default &#8211; it doesn&#8217;t even have a task for dhcp server. Are you trying to spread FUD?</p>
<p>&#8216;So when any of these accounts are compromised interactive remote access is most likely the results.&#8217;</p>
<p>LOL! /bin/false would prevent that? How? What would stop attacker of running chsh?</p>
<p>You are totally clueless.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kmdennis</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6339</link>
		<dc:creator>kmdennis</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6339</guid>
		<description>actaea- I agree with you 100%. In fact I was looking for something mature,instead what we get is rather disingenious in the least. This is supposed to be a server. To share files and serve sevices to users. This would normally be installed by an Administrator, unless it is for home use. Since it allows you to chose you password or leave it blank, that is your choice. And I agree. Because in a test environment, where the system does not have internet access, that can work wonders easily. I happen to have set up some servers on a test network and I know that in a real network I use secure pass phrase wherever possible. But I DO NOT want the hassel of entering a password everytime. Because I have no need for security at that level. And the services that are installed by default more than likely are a result of user response to beta testing etc. For your security purposes you would hae turned off these services. But for the general use, they may be required by others. These are suposed to be multi use systems and are a cheaper alternative to vmware. On the upside you can create a secure distro and post it. And it seems with most systems, that you will definitely need to make them secure before deploying them. Right?</description>
		<content:encoded><![CDATA[<p>actaea- I agree with you 100%. In fact I was looking for something mature,instead what we get is rather disingenious in the least. This is supposed to be a server. To share files and serve sevices to users. This would normally be installed by an Administrator, unless it is for home use. Since it allows you to chose you password or leave it blank, that is your choice. And I agree. Because in a test environment, where the system does not have internet access, that can work wonders easily. I happen to have set up some servers on a test network and I know that in a real network I use secure pass phrase wherever possible. But I DO NOT want the hassel of entering a password everytime. Because I have no need for security at that level. And the services that are installed by default more than likely are a result of user response to beta testing etc. For your security purposes you would hae turned off these services. But for the general use, they may be required by others. These are suposed to be multi use systems and are a cheaper alternative to vmware. On the upside you can create a secure distro and post it. And it seems with most systems, that you will definitely need to make them secure before deploying them. Right?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: rawler</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6340</link>
		<dc:creator>rawler</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6340</guid>
		<description>I basically agree that all of these points have some validity. &lt;br /&gt;
&lt;br /&gt;
But most of this are really _very_ shallow/ambiguous problems. I.E:&lt;br /&gt;
 * is Non-TLS:ed pop3 really allowed? As matador mentioned, you can&#039;t know that it allows plaintext, just because it&#039;s port 110. Modern TLS handshakes often run on the same port as the older versions.&lt;br /&gt;
 * While the shared-home-dir would be a problem on a company server, I would probably consider it a feature on a family-desktop or a home-server. Ubuntu is a Desktop for many uses you know. However, I agree that it should be an informed choice during installation. Cookie-stealing and whatnot. And who have never accidentally managed to write some sensitive info to the wrong files? An Inotify on the relvant files of your friends, and you could propably harvest for some mischief.&lt;br /&gt;
 * As matador says. Buffer overflow in any service would not in any way be rescued by whatever etc/passwd says. The only added security would be in combination with a bad admin, setting a weak password when password on services that shouldn&#039;t have password. Only in this particular instance would passwd even matter.&lt;br /&gt;
 * Also, I wonder how you managed to install the dhcpd? If that was unclear during install, that&#039;s a general usability-issue, not only a security-issue (also may cause problems on network, consume needless resources and all kinds of bad). Same mostly goes for dhclient, should not be running if you&#039;ve really configured statically, for many more reasons than just security.&lt;br /&gt;
&lt;br /&gt;
But what about the _really_ interesting stuff? Things I&#039;d REALLY find interesting for security in a server (and I have no idea of Ubuntu Server, never tried it):&lt;br /&gt;
 * Is stack and heap-randomization enabled in the -server kernel?&lt;br /&gt;
 * Is iptables configured with careful defaults?&lt;br /&gt;
 * Is apparmor/selinux configured at all? (Sadly, this is one of the things I&#039;m often forced by time to remove from CentOS-installs just because it breaks some apps and I don&#039;t have the time to dig enough to learn and fix it properly.)&lt;br /&gt;
 * What binaries are installed setuid?&lt;br /&gt;
 * Is there any IDS pre-configured?&lt;br /&gt;
   * Even simple things like denyhosts?&lt;br /&gt;
&lt;br /&gt;
So, all in all, while all your points hold some validity, they wouldn&#039;t exactly turn me away from Ubuntu Server by themselves.</description>
		<content:encoded><![CDATA[<p>I basically agree that all of these points have some validity. </p>
<p>But most of this are really _very_ shallow/ambiguous problems. I.E:<br />
 * is Non-TLS:ed pop3 really allowed? As matador mentioned, you can&#8217;t know that it allows plaintext, just because it&#8217;s port 110. Modern TLS handshakes often run on the same port as the older versions.<br />
 * While the shared-home-dir would be a problem on a company server, I would probably consider it a feature on a family-desktop or a home-server. Ubuntu is a Desktop for many uses you know. However, I agree that it should be an informed choice during installation. Cookie-stealing and whatnot. And who have never accidentally managed to write some sensitive info to the wrong files? An Inotify on the relvant files of your friends, and you could propably harvest for some mischief.<br />
 * As matador says. Buffer overflow in any service would not in any way be rescued by whatever etc/passwd says. The only added security would be in combination with a bad admin, setting a weak password when password on services that shouldn&#8217;t have password. Only in this particular instance would passwd even matter.<br />
 * Also, I wonder how you managed to install the dhcpd? If that was unclear during install, that&#8217;s a general usability-issue, not only a security-issue (also may cause problems on network, consume needless resources and all kinds of bad). Same mostly goes for dhclient, should not be running if you&#8217;ve really configured statically, for many more reasons than just security.</p>
<p>But what about the _really_ interesting stuff? Things I&#8217;d REALLY find interesting for security in a server (and I have no idea of Ubuntu Server, never tried it):<br />
 * Is stack and heap-randomization enabled in the -server kernel?<br />
 * Is iptables configured with careful defaults?<br />
 * Is apparmor/selinux configured at all? (Sadly, this is one of the things I&#8217;m often forced by time to remove from CentOS-installs just because it breaks some apps and I don&#8217;t have the time to dig enough to learn and fix it properly.)<br />
 * What binaries are installed setuid?<br />
 * Is there any IDS pre-configured?<br />
   * Even simple things like denyhosts?</p>
<p>So, all in all, while all your points hold some validity, they wouldn&#8217;t exactly turn me away from Ubuntu Server by themselves.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: mikemtnbikes</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6341</link>
		<dc:creator>mikemtnbikes</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6341</guid>
		<description>Given the issues, it seems like there&#039;s a bit o&#039; grade inflation going on.  I&#039;d say that B or B- are more appropriate grades.</description>
		<content:encoded><![CDATA[<p>Given the issues, it seems like there&#8217;s a bit o&#8217; grade inflation going on.  I&#8217;d say that B or B- are more appropriate grades.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: haroldmodesto</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6342</link>
		<dc:creator>haroldmodesto</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6342</guid>
		<description>I am missing the point of this article. Isn&#039;t it a given that a fresh install will have little to no security? Even distros like EnGarde need post-install configuration. If you want a secure system and doesn&#039;t have the know-how find someone else who does. If it&#039;s your job to secure the system you may be better off looking for another line of work.</description>
		<content:encoded><![CDATA[<p>I am missing the point of this article. Isn&#8217;t it a given that a fresh install will have little to no security? Even distros like EnGarde need post-install configuration. If you want a secure system and doesn&#8217;t have the know-how find someone else who does. If it&#8217;s your job to secure the system you may be better off looking for another line of work.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: matador</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6343</link>
		<dc:creator>matador</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6343</guid>
		<description>1) There are numerous protections in kernel and during compilation of programs - http://wiki.ubuntu.com/CompilerFlags&lt;br /&gt;
2) There are no iptables rules by default. If you enable ufw, you get some&lt;br /&gt;
3) apparmor is configured (mysql, bind9, slapd...)&lt;br /&gt;
&lt;br /&gt;
denyhosts is available in repository, but enabled by default. Same goes to fail2ban (which might be better option than denyhosts)</description>
		<content:encoded><![CDATA[<p>1) There are numerous protections in kernel and during compilation of programs &#8211; <a href="http://wiki.ubuntu.com/CompilerFlags" rel="nofollow">http://wiki.ubuntu.com/CompilerFlags</a><br />
2) There are no iptables rules by default. If you enable ufw, you get some<br />
3) apparmor is configured (mysql, bind9, slapd&#8230;)</p>
<p>denyhosts is available in repository, but enabled by default. Same goes to fail2ban (which might be better option than denyhosts)</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: matador</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6344</link>
		<dc:creator>matador</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6344</guid>
		<description>&#039;but not enabled by default&#039;</description>
		<content:encoded><![CDATA[<p>&#8216;but not enabled by default&#8217;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: okhayat</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6345</link>
		<dc:creator>okhayat</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6345</guid>
		<description>That&#039;s why I use Debian, especially for servers. It&#039;s more stable, and secure.</description>
		<content:encoded><![CDATA[<p>That&#8217;s why I use Debian, especially for servers. It&#8217;s more stable, and secure.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: matador</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6346</link>
		<dc:creator>matador</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6346</guid>
		<description>Bahahahaha! Linux really isn&#039;t for everybody.</description>
		<content:encoded><![CDATA[<p>Bahahahaha! Linux really isn&#8217;t for everybody.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ric</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6347</link>
		<dc:creator>ric</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6347</guid>
		<description>Those extra users are merely a placeholder and are disabled by default. It is not possible to log into these accounts without using root.</description>
		<content:encoded><![CDATA[<p>Those extra users are merely a placeholder and are disabled by default. It is not possible to log into these accounts without using root.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: boban</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6348</link>
		<dc:creator>boban</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6348</guid>
		<description>What about 8.04 LTS</description>
		<content:encoded><![CDATA[<p>What about 8.04 LTS</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: alalcoolj</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6349</link>
		<dc:creator>alalcoolj</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6349</guid>
		<description>Yeah, what boban said.  I&#039;d be more interested in hearing about an LTS version, as those are the only ones I would ever put on a production server.</description>
		<content:encoded><![CDATA[<p>Yeah, what boban said.  I&#8217;d be more interested in hearing about an LTS version, as those are the only ones I would ever put on a production server.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: boban</title>
		<link>http://www.linux-mag.com/id/7297/#comment-6350</link>
		<dc:creator>boban</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7297/#comment-6350</guid>
		<description>&lt;p&gt;I have this developed over time I have not updated for 8.0.4 other than DJBDNS everything will work as described&lt;/p&gt;
&lt;p&gt;http://slobodankrajinovic.blogspot.com/2008/02/linux-generic-server-based-on-ubuntu.html
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I have this developed over time I have not updated for 8.0.4 other than DJBDNS everything will work as described</p>
<p><a href="http://slobodankrajinovic.blogspot.com/2008/02/linux-generic-server-based-on-ubuntu.html" rel="nofollow">http://slobodankrajinovic.blogspot.com/2008/02/linux-generic-server-based-on-ubuntu.html</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>