Securing your system
It's imperative that you secure your installation. As Jon Griffin repeatedly warns us, "No distribution is secure out of the box."
A Reference Platform implements some basic precautions, but security is a process, not a condition. If you are responsible for a computer hooked to the internet, you are responsible for learning some rudiments of security, such as monitoring the state of a computer, maintaining patch levels, and keeping backups.
We recommend these resources:
-
Securing and Optimizing Linux - version 3 (Free PDF Guide)
-
Jon Griffin's notes on RedHat security (from archive.org 22 June 2006)
-
Bruce Schneier's Crypto-Gram, especially The security patch treadmill and Monitoring First.
Content Security Policies (CSP)
OpenACS supports CSP starting with version 5.9.1.