Hiding the version information is but a piece of the puzzle. It won’t save a server from a persistent attacker. However, hiding the server software, and the software version, makes it harder for “drive-by” attackers to discover that your server is vulnerable. They don’t generally want to spend the time to test the universe of known compromises to server software, but if they know they only need to test for vulnerabilities to Subversion 1.7.X, then you’ve got their attention.
Hiding that information slows the drive-by attackers down, much like having a safe will do the same. In some cases the extra time nudges attackers towards looking for easier targets.
On 15.12.2017 20:10, Matt Simmons wrote:
Many documents relating to information security compliance require
blocking visible software version information.Interesting documents. I'd have expected them to require all software tobe patched to fix all known security bugs. I thought the "security byobscurity" mantra had been debunked, but apparently not ...-- Brane
On Fri, Dec 15, 2017 at 10:46 AM Nico Kadel-Garcia <firstname.lastname@example.org
Why would you want to hide this?
On Fri, Dec 15, 2017 at 10:54 AM, Dave Huang <email@example.com
On Dec 15, 2017, at 9:15, Dhanushka Parakrama
Is there any configuration where i can hide the subversion
.Please see copied image <image.png>
"Today, vegetables... Tomorrow, the world!"