Re: FreeBSD Security Survey

2006-05-23 Thread Chris H.

Quoting Paul Allen [EMAIL PROTECTED]:


From Scott Long [EMAIL PROTECTED], Sun, May 21, 2006 at 11:44:27PM -0600:
I share this frustration with you.  I was once told that the pain in
upgrading is due largely to a somewhat invisible difference between
installing a pre-compiled package, and building+installing a port.  In
theory, if you stick to one method or the other, things will stay mostly
consistent.  But if you mix them, and particularly if you update the
ports tree in the process, the end result is a bit more undefined.  One
thing that I wish for is that the ports tree would branch for releases,
and that those branches would get security updates.  I know that this
would involve an exponentially larger amount of effort from the ports
team, and I don't fault them for not doing it.  Still, it would be nice
to have.


Huh? Really.  What you say makes a certain amount of sense when pkg_add
is used, but I haven't seen much evidence for problems with mixing ports
and packages via portupgrade -P.

The trouble comes not with packages but in the conflicting 
information between

/var/db/pkg/ and the ports themselves.  The former does not merely contain a
stale version of the port dependency and origin information; it contains
many snapshots of small slices of many different port dependency 
graphs (as the

port tree evolves).

Consistently using portupgade -rR, portinstall helps keep this under control
but each pkg_add or make install in a port directory causes drift.  Given
that portupgrade is an optional tool and the handbook suggests the 
other form...

well you see the trouble.

But the situation is worse than this because of the manual interventions
necessary to fixup the portsdb.  These fixups easily create dependency graphs
that never existed anywhere else before.  Most often this happens because of
ports being renamed, deleted, combined, etc--the trouble here is that 
the ports

tree reveals no history about these actions.

It is left to a program like portupgrade to heuristically guess!?! what has
taken place.  Now if you go through this process every week (every 
day?) usually

the risk is small and it is obvious what to do, but this is not always so.

Some speculation:  I've always thought portupgrade did the Wrong Thing(tm) by
consulting the dependency graph in /var/db.   Better to merely learn which
packages were installed and then exclusively use the port information...
Maybe someone knows why that would be the wrong thing to do?


May I insert a me too here? This (everything you've written here) has
been my *only* reason for choosing not to upgrade immediately. I find the
ease of using the ports system *glorious*, *_until_* it comes time to
upgrade (installed ports). This is especially true when you have imposed
subtle changes (inserted default options for the build/ install, created/
crafted ini/ conf files). Using make.conf *seemed* like the ultimate
solution. That is, until you've found that you were on the leading edge
of a major revision of a port, and those options are no longer supported,
or have been renamed. Still, make.conf is a wonderful tool. But even w/o
custom options/conf's inposed, upgrades through portupgrade (from my
experience) is a trip to hell. That I never look forward to 
re-living/visiting.

In short; there *must* be a better (less painful) way to handle upgrading
the _installed_ ports. I only wish I could figure one out. Please note;
this is a solicitation. ;) I am only adding (augmenting) to what Paul has
stated here.

(I build/manage some 50 FreeBSD boxes. So you can imagine the grief.)

--Chris H.



   Paul
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]





--
Shameless self-promotion follows...
... or does it?


-
FreeBSD 5.4-RELEASE-p12 (SMP - 900x2) Tue Mar 7 19:37:23 PST 2006
/



pgpRtA6dfllA3.pgp
Description: PGP Digital Signature


Re: FreeBSD Security Survey

2006-05-23 Thread Chris H.

Quoting Ion-Mihai IOnut Tetcu [EMAIL PROTECTED]:


On Mon, 22 May 2006 11:40:16 +0200
Marian Hettwer [EMAIL PROTECTED] wrote:


 ports tree in the process, the end result is a bit more undefined.  One
 thing that I wish for is that the ports tree would branch for releases,
 and that those branches would get security updates.  I know that this
 would involve an exponentially larger amount of effort from the ports
 team, and I don't fault them for not doing it.  Still, it would be nice
 to have.

I have to agree on that statement. I would love to see branched ports.
This can get very important on servers, were you don't want to have
major upgrades, but only security updates.
I guess it's a question of manpower, hm?


With the maintainers/commiters/physical_resources we have now this is
impossible.
Take a look at pav@'s PR stats page: http://www.oook.cz/bsd/prstats/
There are ~1000 new ports PRs per month. The PT Team has managed to
close about the same number per month (fewer during the freeze, of
course).
Currently there are 551 open PRs. 238 in feedback state, etc.


Would a survey help? As in ask the ports team and FreeBSD
administrators? Maybe some will start to become port maintainer too,
just to support the increased work on ports due to branching them...
I would :)


There are ~4300 unmaintained ports. Maybe you could start maintaining
some of them _now_ ?


This brings up a point I have been wanting to bring up for over a mos.;
I adopted an orphaned port (contacted the owner, whom then relenquished
ownership to me.). But found it _more_ than difficult to discover how
to inform the fBSD port(s) system of it's new, *un*orphaned status.
I read through the online doc's about it. But got dizzy with the
circularness of it. Searching led to no _difinative_ answer(s) either.
Is it still send pr just to update it's status? Couldn't there be an
online form to change ownership/ stewardship? I *can* comprehend the
send pr system. I simply can't understand how to change/ update
ownership/ stewardship. Perhaps this is why so many of the orphaned
ports remain in this state.

--Chris H.



--
IOnut - Un^d^dregistered ;) FreeBSD user
 Intellectual Property is   nowhere near as valuable   as Intellect

BOFH excuse #146:
Communications satellite used by the military for star wars







--
Shameless self-promotion follows...
... or does it?


-
FreeBSD 5.4-RELEASE-p12 (SMP - 900x2) Tue Mar 7 19:37:23 PST 2006
/



pgpSp33SjGs7X.pgp
Description: PGP Digital Signature


Re: FreeBSD Security Survey

2006-05-23 Thread Frank Steinborn
Chris H. wrote:
 This brings up a point I have been wanting to bring up for over a mos.;
 I adopted an orphaned port (contacted the owner, whom then relenquished
 ownership to me.). But found it _more_ than difficult to discover how
 to inform the fBSD port(s) system of it's new, *un*orphaned status.
 I read through the online doc's about it. But got dizzy with the
 circularness of it. Searching led to no _difinative_ answer(s) either.
 Is it still send pr just to update it's status? Couldn't there be an
 online form to change ownership/ stewardship? I *can* comprehend the
 send pr system. I simply can't understand how to change/ update
 ownership/ stewardship. Perhaps this is why so many of the orphaned
 ports remain in this state.

Open a PR and simply set MAINTAINER to your own address. Use category
'ports' and and class 'change-request'.

Frank 
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-23 Thread Chris H.

Quoting Frank Steinborn [EMAIL PROTECTED]:


Chris H. wrote:

This brings up a point I have been wanting to bring up for over a mos.;
I adopted an orphaned port (contacted the owner, whom then relenquished
ownership to me.). But found it _more_ than difficult to discover how
to inform the fBSD port(s) system of it's new, *un*orphaned status.
I read through the online doc's about it. But got dizzy with the
circularness of it. Searching led to no _difinative_ answer(s) either.
Is it still send pr just to update it's status? Couldn't there be an
online form to change ownership/ stewardship? I *can* comprehend the
send pr system. I simply can't understand how to change/ update
ownership/ stewardship. Perhaps this is why so many of the orphaned
ports remain in this state.


Open a PR and simply set MAINTAINER to your own address. Use category
'ports' and and class 'change-request'.


Will do. Thank you very much for taking the time to respond.

--Chris H.



Frank
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]





--


-
FreeBSD 5.4-RELEASE-p12 (SMP - 900x2) Tue Mar 7 19:37:23 PST 2006
/



pgpVmvm0UfPIK.pgp
Description: PGP Digital Signature


Re: FreeBSD Security Survey

2006-05-23 Thread Vivek Khera


On May 22, 2006, at 12:38 AM, Brent Casavant wrote:


So, in short, that's why *I* rarely update ports for security reasons.


Another valid reason is configuration management.  We run web  
services, and in order to ensure nothing breaks, we have to use a  
fixed set of code.  Upgrading any piece of that requires many steps,  
including verifying functionality and checking for regressions, etc.   
Basically we have to run our full regression tests on any changes,  
then roll them out in a controlled fashion minimizing down time.




Re: FreeBSD Security Survey

2006-05-23 Thread Vivek Khera


On May 22, 2006, at 6:45 AM, Steven Hartland wrote:


On good example of portupgrade going off on one is a simple
upgrade of mtr we dont install any X on our machines so mtr-nox11
is installed. Whenever I've tried portupgrade in the past its
always trolled of and started downloading and build the behemoth
that is X, CTRL+C hence always ensues and I forget about upgrading
until I really HAVE to.


Well, then you've misconfigured your portupgrade.  It never does so  
for me because I have WITHOUT_X11 and WITHOUT_GUI set in /etc/ 
make.conf  (why two knobs, I don't know, but many ports use  
WITHOUT_GUI instead of WITHOUT_X11).




Re: FreeBSD Security Survey

2006-05-22 Thread Paul Allen
From Scott Long [EMAIL PROTECTED], Sun, May 21, 2006 at 11:44:27PM -0600:
 I share this frustration with you.  I was once told that the pain in
 upgrading is due largely to a somewhat invisible difference between
 installing a pre-compiled package, and building+installing a port.  In
 theory, if you stick to one method or the other, things will stay mostly
 consistent.  But if you mix them, and particularly if you update the
 ports tree in the process, the end result is a bit more undefined.  One
 thing that I wish for is that the ports tree would branch for releases,
 and that those branches would get security updates.  I know that this
 would involve an exponentially larger amount of effort from the ports
 team, and I don't fault them for not doing it.  Still, it would be nice
 to have.

Huh? Really.  What you say makes a certain amount of sense when pkg_add 
is used, but I haven't seen much evidence for problems with mixing ports
and packages via portupgrade -P.

The trouble comes not with packages but in the conflicting information between
/var/db/pkg/ and the ports themselves.  The former does not merely contain a 
stale version of the port dependency and origin information; it contains
many snapshots of small slices of many different port dependency graphs (as the
port tree evolves).

Consistently using portupgade -rR, portinstall helps keep this under control
but each pkg_add or make install in a port directory causes drift.  Given
that portupgrade is an optional tool and the handbook suggests the other form...
well you see the trouble.

But the situation is worse than this because of the manual interventions 
necessary to fixup the portsdb.  These fixups easily create dependency graphs 
that never existed anywhere else before.  Most often this happens because of
ports being renamed, deleted, combined, etc--the trouble here is that the ports
tree reveals no history about these actions.

It is left to a program like portupgrade to heuristically guess!?! what has 
taken place.  Now if you go through this process every week (every day?) usually
the risk is small and it is obvious what to do, but this is not always so.

Some speculation:  I've always thought portupgrade did the Wrong Thing(tm) by
consulting the dependency graph in /var/db.   Better to merely learn which
packages were installed and then exclusively use the port information...
Maybe someone knows why that would be the wrong thing to do?

Paul
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Robert Backhaus

On 5/22/06, Colin Percival [EMAIL PROTECTED] wrote:


If you administrate system(s) running FreeBSD (in the broad sense of are
responsible for keeping system(s) secure and up to date), please visit
 http://people.freebsd.org/~cperciva/survey.html
and complete the survey below before May 31st, 2006.



One of those Missing Option messages: Whether valid or not, the
reason that I would avoid a binary update system is that I customise
CPUTYPE, and believe, rightly or wrongly, that this would make binary
updating impossible.

Of course, the main reason I would not use binary updating you/they
have made source updating so easy!
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Doug Hardie


On May 21, 2006, at 22:41, David Nugent wrote:


A good failover strategy comes into play here.

If you have one, then taking a single production machine off-line  
for a short period should be no big deal, even routine, and should  
not even be noticed by users if done correctly.  This should be  
planned for and part of the network/system design. Yes, it  
definitely requires more resources to support, but I'll rephrase  
the same problem: what happens when (and I mean *when* and not  
*if*) a motherboard or network card fries or you suffer a hard disk  
crash (even 2+ drives failing at the same time on a raid array is  
not particularly unusual considering that drives are quite often  
from the same manufactured batch)?


Lack of a failover on mission critical systems that *can't* be  
offline is like playing russian roulette.


Failover sounds good in theory but has significant issues in practice  
that make it sometimes worse than the alternative.  Take mail  
spools.  If you failover, mail the user saw before has disappeared.   
Then when you fail back it reappears and newer messages disappear.   
This is hardly unnoticable.  My users do not find that at all  
acceptable.  Putting the mail spools on a different machine just  
moves that problem to the different machine.  Trying to keep multiple  
spools consistent has problems also.  I have watched raid system lose  
their data too.  A nice power spike - 1.5Kv from a lightning strike  
in the local area will do it.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Anish Mistry
On Monday 22 May 2006 01:44, Scott Long wrote:
 Brent Casavant wrote:
  On Sun, 21 May 2006, Colin Percival wrote:
 In order to better understand
 which FreeBSD versions are in use, how people are (or aren't)
  keeping them updated, and why it seems so many systems are not
  being updated, I have put together a short survey of 12
  questions.
 
  I applaud this survey, however question 9 missed an important
  point, at least to me.  I was torn between answering less than
  once a month and I never update.
 
  While I find ports to be the single most useful feature of the
  FreeBSD experience, and can't thank contributors enough for the
  efforts, I on the other hand find updating my installed ports
  collection (for security reasons or otherwise) to be quite
  painful.  I typically use portupgrade to perform this task.  On
  several occasions I got bit by doing a portupgrade which wasn't
  able to completely upgrade all dependencies (particularly when X,
  GUI's, and desktops are in the mix -- though I always follow the
  special Gnome upgrade methods when appropriate).
 
  I can't rule out some form of pilot error, but the end result was
  pain.
 
  After several instances of unsatisfactory portupgrades (mostly in
  the 5.2 through early 5.4 timeframe), I adopted the practice of
  either not upgrading ports at all for the life of a particular
  installation on a machine (typically about one year), or when
  necessary by removing *all* ports from the machine, cvsup'ing,
  and reinstalling.  This has served me quite well, particularly
  considering the minimal threat profile these particularly systems
  face.
 
  So, in short, that's why *I* rarely update ports for security
  reasons.
 
  There are steps that could be taken at the port maintenance level
  that would work well for my particular case, however that's
  beyond the scope of the survey.  Thanks for taking the time put
  the survey together, I certainly hope it proves useful.
 
  Thank you,
  Brent Casavant

 I share this frustration with you.  I was once told that the pain
 in upgrading is due largely to a somewhat invisible difference
 between installing a pre-compiled package, and building+installing
 a port.  In theory, if you stick to one method or the other, things
 will stay mostly consistent.  But if you mix them, and particularly
 if you update the ports tree in the process, the end result is a
 bit more undefined.  One thing that I wish for is that the ports
 tree would branch for releases, and that those branches would get
 security updates.  I know that this would involve an exponentially
 larger amount of effort from the ports team, and I don't fault them
 for not doing it.  Still, it would be nice to have.
More ports seem to be separating out their different version into 
portname20, portname, portname21, etc.  This takes out quite a bit of 
the updating woes without causing too much overhead for the 
maintainers.  Since maintaining a security branch for releases would 
require too much overhead it might be nice to have mechanism to track 
the release version of the installed software.
eg.
For 6.0 release I installed lang/lua which is lua-5.0
Then when I cvsup next time the maintainer has created a lang/lua50 
port for the old version and lang/lua is now version 5.1.  It would 
be nice to have a mapping that I can say Stay with version 5.0.x 
and when I do a portupgrade it will see that lua-5.0 is installed so 
use lang/lua50 instead of lang/lua.
As a port maintainer, I could probably live with that extra mapping.

Though currently I try to keep a few jails configured on my desktop 
that match customer's configurations and perform updates in the jail 
first.  Just to see it there will be any hiccups before actually 
performing the updates on a customer's system.  I only have 3 basic 
configurations that I use so it's not that big of a deal for me.

My biggest grip about updating the base system is the mergemaster 
step, but once mergemaster -U is cut into a release it should fix 
that annoyance.

-- 
Anish Mistry


pgpSYqKguxyBf.pgp
Description: PGP signature


RE: FreeBSD Security Survey

2006-05-22 Thread Constant, Benjamin

Hi,

We don't use binary update as we use custom kernels.
We're using portaudit for security flaw with the installed ports but I don't
think there is any equivalent for the base and kernel? I'm subscribed and 
I'm monitoring the FreeBSD Security Advisories mailing-list but there is (as
far as I know) no easy system like portaudit to compare you installed base
and kernel source tree against security advisories. Are there best practices
in this area knowing that all my system are not running the same level of
patches and non of them are running something else then -STABLE? I'll
probably switch from -STABLE to -RELENG in the future (was not possible in
the beginning as features we're looking for were only in -STABLE) and apply
security fixes but I think it won't change the amount of work to perform
compared to a non source based operating system.

Regards,

Benjamin Constant

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:owner-freebsd-
 [EMAIL PROTECTED] On Behalf Of Colin Percival
 Sent: lundi 22 mai 2006 5:55
 To: freebsd security; FreeBSD Stable
 Subject: FreeBSD Security Survey
 
 Dear FreeBSD users and system administrators,
 
 While the FreeBSD Security Team has traditionally been very good at
 investigating and responding to security issues in FreeBSD, this only
 solves half of the security problem: Unless users and administrators
 of FreeBSD systems apply the security patches provided, the advisories
 issued accomplish little beyond alerting potential attackers to the
 presence of vulnerabilities.
 
 The Security Team has been concerned for some time by anecdotal reports
 concerning the number of FreeBSD systems which are not being promptly
 updated or are running FreeBSD releases which have passed their End of
 Life dates and are no longer supported. In order to better understand
 which FreeBSD versions are in use, how people are (or aren't) keeping
 them updated, and why it seems so many systems are not being updated, I
 have put together a short survey of 12 questions. The information gathered
 will inform the work done by the Security Team, as well as my own personal
 work on FreeBSD this summer.
 
 If you administrate system(s) running FreeBSD (in the broad sense of are
 responsible for keeping system(s) secure and up to date), please visit
   http://people.freebsd.org/~cperciva/survey.html
 and complete the survey below before May 31st, 2006.
 
 Thanks,
 Colin Percival
 FreeBSD Security Officer
 ___
 freebsd-stable@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-stable
 To unsubscribe, send any mail to [EMAIL PROTECTED]

The information contained in this transmission may contain privileged and
confidential information.  It is intended only for the use of the
person(s) named above. If you are not the intended recipient, you are
hereby notified that any review, dissemination, distribution or
duplication of this communication is strictly prohibited. If you are not
the intended recipient, please contact the sender by reply email and
destroy all copies of the original message.
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Massimo Lusetti
On Sun, 2006-05-21 at 23:44 -0600, Scott Long wrote:

 ports tree in the process, the end result is a bit more undefined.  One
 thing that I wish for is that the ports tree would branch for releases,
 and that those branches would get security updates.  I know that this
 would involve an exponentially larger amount of effort from the ports
 team, and I don't fault them for not doing it.  Still, it would be nice
 to have.

Yes, totally agree.
That's the way OpenBSD ports tree works and it worked very well for me.
Thus not to say FreeBSD's one didn't, but it takes a lot more attention,
which isn't always a bad thing ;)

-- 
Massimo.run();


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Marian Hettwer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi there,


Scott Long wrote:
 Brent Casavant wrote:
 
 While I find ports to be the single most useful feature of the FreeBSD
 experience, and can't thank contributors enough for the efforts, I on
 the other hand find updating my installed ports collection (for security
 reasons or otherwise) to be quite painful.  I typically use portupgrade
 to perform this task.  On several occasions I got bit by doing a
 portupgrade which wasn't able to completely upgrade all dependencies
 (particularly when X, GUI's, and desktops are in the mix -- though I
 always follow the special Gnome upgrade methods when appropriate).

Like Scott pointed out below, stick with either building from source, or
using packages. Mixing them may have strange side effects.
To give an example.
I usually use portupgrade without using packages. But last time I needed
to update my ports (on a production server, though private not corporate
server), I used portupgrade -P (to use packages if available).
It updated php, using packages, but unluckily the packages were built
against apache13. I'm using apache20, so my php installation was
trashed. Argh.
But even more painful is the fact that portupgrade _always_ fails on
some perl modules. Usually p5-XML-Parser. I don't know why, but it's
annoying...

 ports tree in the process, the end result is a bit more undefined.  One
 thing that I wish for is that the ports tree would branch for releases,
 and that those branches would get security updates.  I know that this
 would involve an exponentially larger amount of effort from the ports
 team, and I don't fault them for not doing it.  Still, it would be nice
 to have.
I have to agree on that statement. I would love to see branched ports.
This can get very important on servers, were you don't want to have
major upgrades, but only security updates.
I guess it's a question of manpower, hm?
Would a survey help? As in ask the ports team and FreeBSD
administrators? Maybe some will start to become port maintainer too,
just to support the increased work on ports due to branching them...
I would :)

best regards,
Marian
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFEcYb+gAq87Uq5FMsRAvAeAKDY0wCnps8sNKkRqUL0+77/WEh/GgCfayuU
/PH2TCKdBC7l9M6TrgY+rZM=
=hbzY
-END PGP SIGNATURE-
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Michel Talon
 ports tree in the process, the end result is a bit more undefined.  One
 thing that I wish for is that the ports tree would branch for releases,
 and that those branches would get security updates.  I know that this
 would involve an exponentially larger amount of effort from the ports
 team, and I don't fault them for not doing it.  Still, it would be nice
 to have.

Yes, totally agree.
That's the way OpenBSD ports tree works and it worked very well for me.
Thus not to say FreeBSD's one didn't, but it takes a lot more attention,
which isn't always a bad thing ;)

OpenBSD doesn't have next to 15000 ports. In my opinion, this richness is
one of the main assets of FreeBSD, and by necessity implies a great difficulty
to maintain everything in a coherent and secure state. You have only to
contemplate the years it took to release Debian Sarge to convince yourself.
Personnally i am quite pleased with the present state of the FreeBSD ports,
i think it is in a much better state than a couple of years before, and
for my own use, security is a very secondary issue. People who have machines
exposed on the internet usually have a small number of ports installed, and
can maintain them in the latest secure version. I have around 600 ports
installed on my 6.1 machine, which will certainly grow in time, and no
intention whatsoever to run portupgrade on that.


-- 

Michel TALON

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Matthias Andree
Scott Long [EMAIL PROTECTED] writes:

 I share this frustration with you.  I was once told that the pain in
 upgrading is due largely to a somewhat invisible difference between
 installing a pre-compiled package, and building+installing a port.  In
 theory, if you stick to one method or the other, things will stay mostly
 consistent.  But if you mix them, and particularly if you update the
 ports tree in the process, the end result is a bit more undefined.  One
 thing that I wish for is that the ports tree would branch for releases,
 and that those branches would get security updates.  I know that this
 would involve an exponentially larger amount of effort from the ports
 team, and I don't fault them for not doing it.  Still, it would be nice
 to have.

Speaking as a port maintainer, if these branches would allow to just
MFC updates from HEAD that are proven and meet dependency requirements
for the new version, I think I'd be able to handle this. The major ports
for concern I maintain (db3* db4*) have forked minor versions for
compatibility anyways.

If it's a bugfix only policy that may involve ripping out the minimum
fix out of a larger patch set, it'll pretty much be a non-starter for me
unless someone funds that work.

-- 
Matthias Andree
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Herve Boulouis
Le 22/05/2006  11:43, Michel Talon a ?crit:
 
 OpenBSD doesn't have next to 15000 ports. In my opinion, this richness is
 one of the main assets of FreeBSD, and by necessity implies a great difficulty
 to maintain everything in a coherent and secure state. You have only to
 contemplate the years it took to release Debian Sarge to convince yourself.
 Personnally i am quite pleased with the present state of the FreeBSD ports,
 i think it is in a much better state than a couple of years before, and
 for my own use, security is a very secondary issue. People who have machines
 exposed on the internet usually have a small number of ports installed, and
 can maintain them in the latest secure version. I have around 600 ports
 installed on my 6.1 machine, which will certainly grow in time, and no
 intention whatsoever to run portupgrade on that.

I completely agree with Michel.

The question that I think is missing from the survey is the usage you do of
your freebsd installation. All production servers I have (50) use few ports
and upgrades (security related or not) are always done by hand. On the
other side, I nearly always use precompiled packages on my workstation to
save compile time and dependencies headaches.

-- 
Herve Boulouis
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread IOnut
On Mon, 22 May 2006 11:40:16 +0200
Marian Hettwer [EMAIL PROTECTED] wrote:

  ports tree in the process, the end result is a bit more undefined.  One
  thing that I wish for is that the ports tree would branch for releases,
  and that those branches would get security updates.  I know that this
  would involve an exponentially larger amount of effort from the ports
  team, and I don't fault them for not doing it.  Still, it would be nice
  to have.

 I have to agree on that statement. I would love to see branched ports.
 This can get very important on servers, were you don't want to have
 major upgrades, but only security updates.
 I guess it's a question of manpower, hm?

With the maintainers/commiters/physical_resources we have now this is
impossible.
Take a look at pav@'s PR stats page: http://www.oook.cz/bsd/prstats/
There are ~1000 new ports PRs per month. The PT Team has managed to
close about the same number per month (fewer during the freeze, of
course).
Currently there are 551 open PRs. 238 in feedback state, etc.

 Would a survey help? As in ask the ports team and FreeBSD
 administrators? Maybe some will start to become port maintainer too,
 just to support the increased work on ports due to branching them...
 I would :)

There are ~4300 unmaintained ports. Maybe you could start maintaining
some of them _now_ ?

-- 
IOnut - Un^d^dregistered ;) FreeBSD user
  Intellectual Property is   nowhere near as valuable   as Intellect

BOFH excuse #146:
Communications satellite used by the military for star wars




signature.asc
Description: PGP signature


Re: FreeBSD Security Survey

2006-05-22 Thread Marian Hettwer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Ion,

Ion-Mihai IOnut Tetcu wrote:

I have to agree on that statement. I would love to see branched ports.
This can get very important on servers, were you don't want to have
major upgrades, but only security updates.
I guess it's a question of manpower, hm?
 
 
 With the maintainers/commiters/physical_resources we have now this is
 impossible.
That's what I guessed...

 Take a look at pav@'s PR stats page: http://www.oook.cz/bsd/prstats/
 There are ~1000 new ports PRs per month. The PT Team has managed to
 close about the same number per month (fewer during the freeze, of
 course).
 Currently there are 551 open PRs. 238 in feedback state, etc.
I see...

 
 
Would a survey help? As in ask the ports team and FreeBSD
administrators? Maybe some will start to become port maintainer too,
just to support the increased work on ports due to branching them...
I would :)
 
 
 There are ~4300 unmaintained ports. Maybe you could start maintaining
 some of them _now_ ?
 
I'll have a look into my ports tree. Let me guess, ports which are have
the maintainer [EMAIL PROTECTED] are unmaintained?

regards,
Marian
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFEcZXhgAq87Uq5FMsRAnqFAJ4t0fO+uQTk/XRDFvTcA9ZLKuy6PACguig5
qAKibfTgwhzrVojGkHPyvpk=
=6eKY
-END PGP SIGNATURE-
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Steven Hartland

Brent Casavant wrote:

On Sun, 21 May 2006, Colin Percival wrote:



So, in short, that's why *I* rarely update ports for security reasons.

There are steps that could be taken at the port maintenance level that
would work well for my particular case, however that's beyond the
scope of the survey.  Thanks for taking the time put the survey
together, I certainly hope it proves useful.


Perfectly put there Brent portupgrade is all very powerful but:
* Take an absolute age to do anything but the simplest updates
* Often fails and needs significant manual fixing

Here its usually 100 times quicker to just do:
pkg_info | awk '{print $1}'  packages.txt
cat packages.txt | xargs pkg_delete -f
cat packages.txt | xargs pkg_add -r

This at least brings you up to a known good set. Alternatively I
also use something similar but build from ports the problem with
that is often the ports need to be built with custom options to get
back to how you started so unless you where very maticuls in
noting down the options to every port on every machine you
installed something often goes wrong :(

On good example of portupgrade going off on one is a simple
upgrade of mtr we dont install any X on our machines so mtr-nox11
is installed. Whenever I've tried portupgrade in the past its
always trolled of and started downloading and build the behemoth
that is X, CTRL+C hence always ensues and I forget about upgrading
until I really HAVE to.

   Steve




This e.mail is private and confidential between Multiplay (UK) Ltd. and the person or entity to whom it is addressed. In the event of misdirection, the recipient is prohibited from using, copying, printing or otherwise disseminating it or any information contained in it. 


In the event of misdirection, illegible or incomplete transmission please 
telephone (023) 8024 3137
or return the E.mail to [EMAIL PROTECTED]

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread IOnut
On Mon, 22 May 2006 12:43:47 +0200
Marian Hettwer [EMAIL PROTECTED] wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Hi Ion,
 
 Ion-Mihai IOnut Tetcu wrote:
 
 I have to agree on that statement. I would love to see branched ports.
 This can get very important on servers, were you don't want to have
 major upgrades, but only security updates.
 I guess it's a question of manpower, hm?
  
  
  With the maintainers/commiters/physical_resources we have now this is
  impossible.
 That's what I guessed...

And it's not only HR lack problem, we would need more hardware for the
package building cluster too.
 
  Take a look at pav@'s PR stats page: http://www.oook.cz/bsd/prstats/
  There are ~1000 new ports PRs per month. The PT Team has managed to
  close about the same number per month (fewer during the freeze, of
  course).
  Currently there are 551 open PRs. 238 in feedback state, etc.
 I see...
 
  
 Would a survey help? As in ask the ports team and FreeBSD
 administrators? Maybe some will start to become port maintainer too,
 just to support the increased work on ports due to branching them...
 I would :)

IMO this could work  only with some funding from interested companies.
Maybe that could be an idea for a survey.

  There are ~4300 unmaintained ports. Maybe you could start maintaining
  some of them _now_ ?
  
 I'll have a look into my ports tree. Let me guess, ports which are have
 the maintainer [EMAIL PROTECTED] are unmaintained?

Yup. Just ' cd /usr/ports/ ; make search [EMAIL PROTECTED] '


-- 
IOnut - Un^d^dregistered ;) FreeBSD user
  Intellectual Property is   nowhere near as valuable   as Intellect

BOFH excuse #324:
Your packets were eaten by the terminator




signature.asc
Description: PGP signature


Re: FreeBSD Security Survey

2006-05-22 Thread Jonathan Noack
On 05/22/06 05:40, Marian Hettwer wrote:
 Scott Long wrote:
 Brent Casavant wrote:
 While I find ports to be the single most useful feature of the FreeBSD
 experience, and can't thank contributors enough for the efforts, I on
 the other hand find updating my installed ports collection (for security
 reasons or otherwise) to be quite painful.  I typically use portupgrade
 to perform this task.  On several occasions I got bit by doing a
 portupgrade which wasn't able to completely upgrade all dependencies
 (particularly when X, GUI's, and desktops are in the mix -- though I
 always follow the special Gnome upgrade methods when appropriate).
 
 Like Scott pointed out below, stick with either building from source, or
 using packages. Mixing them may have strange side effects.
 To give an example.
 I usually use portupgrade without using packages. But last time I needed
 to update my ports (on a production server, though private not corporate
 server), I used portupgrade -P (to use packages if available).
 It updated php, using packages, but unluckily the packages were built
 against apache13. I'm using apache20, so my php installation was
 trashed. Argh.
 But even more painful is the fact that portupgrade _always_ fails on
 some perl modules. Usually p5-XML-Parser. I don't know why, but it's
 annoying...

Dropping [EMAIL PROTECTED]

Odd, I just did a 'portupgrade -fm -s p5-XML-Parser' and it worked
fine.  Note that I included the '-m -s' because it sometimes causes
port build breakage for me (postfix comes to mind).  Perhaps a
'portupgrade -Rf p5-XML-Parser' is in order?  The only dependencies are
perl and expat, so a recursive rebuild shouldn't take too long.  My
persistent port build breakages (that weren't caused by an error in the
port) have always been resolved by rebuilding all dependencies or
removing '-m -s'.

-Jonathan

-- 
Jonathan Noack | [EMAIL PROTECTED] | OpenPGP: 0x991D8195



signature.asc
Description: OpenPGP digital signature


Re: FreeBSD Security Survey

2006-05-22 Thread Jonathan Noack
On 05/22/06 06:45, Steven Hartland wrote:
 Brent Casavant wrote:
 On Sun, 21 May 2006, Colin Percival wrote:
 
 So, in short, that's why *I* rarely update ports for security reasons.

 There are steps that could be taken at the port maintenance level that
 would work well for my particular case, however that's beyond the
 scope of the survey.  Thanks for taking the time put the survey
 together, I certainly hope it proves useful.
 
 Perfectly put there Brent portupgrade is all very powerful but:
 * Take an absolute age to do anything but the simplest updates
 * Often fails and needs significant manual fixing
 
 Here its usually 100 times quicker to just do:
 pkg_info | awk '{print $1}'  packages.txt
 cat packages.txt | xargs pkg_delete -f
 cat packages.txt | xargs pkg_add -r
 
 This at least brings you up to a known good set. Alternatively I
 also use something similar but build from ports the problem with
 that is often the ports need to be built with custom options to get
 back to how you started so unless you where very maticuls in
 noting down the options to every port on every machine you
 installed something often goes wrong :(

Dropping [EMAIL PROTECTED]

The OPTIONS feature stores port preferences and helps a lot with this.
Not all ports are converted yet, but that's just a matter of time.  My
only complaint is that when options are added I'm not prompted for my
preference (I just get the default value).  I have to go back and
manually make config if I don't want the default.  If automatic
prompting for new options is added then we will truly have a set it and
forget it configuration system.  Because I track ports fairly closely
and usually catch new options, this hasn't annoyed me enough to fix it...

 On good example of portupgrade going off on one is a simple
 upgrade of mtr we dont install any X on our machines so mtr-nox11
 is installed. Whenever I've tried portupgrade in the past its
 always trolled of and started downloading and build the behemoth
 that is X, CTRL+C hence always ensues and I forget about upgrading
 until I really HAVE to.

You have to tell the ports system you don't want X (put the following in
/etc/make.conf):
WITHOUT_X11= yes

There are also ports (like bittorrent) that install GUIs by default.
You should also tell the ports system you don't want GUIs:
WITHOUT_GUI= yes

Some ports will still need the X libs (like graphviz), but that's not a
huge deal.

-Jonathan

-- 
Jonathan Noack | [EMAIL PROTECTED] | OpenPGP: 0x991D8195



signature.asc
Description: OpenPGP digital signature


Re: FreeBSD Security Survey

2006-05-22 Thread Charles Howse


On May 22, 2006, at 9:12 AM, Jonathan Noack wrote:


On 05/22/06 06:45, Steven Hartland wrote:

Brent Casavant wrote:

On Sun, 21 May 2006, Colin Percival wrote:


So, in short, that's why *I* rarely update ports for security  
reasons.


There are steps that could be taken at the port maintenance level  
that

would work well for my particular case, however that's beyond the
scope of the survey.  Thanks for taking the time put the survey
together, I certainly hope it proves useful.


Perfectly put there Brent portupgrade is all very powerful but:
* Take an absolute age to do anything but the simplest updates
* Often fails and needs significant manual fixing

Here its usually 100 times quicker to just do:
pkg_info | awk '{print $1}'  packages.txt
cat packages.txt | xargs pkg_delete -f
cat packages.txt | xargs pkg_add -r

This at least brings you up to a known good set. Alternatively I
also use something similar but build from ports the problem with
that is often the ports need to be built with custom options to get
back to how you started so unless you where very maticuls in
noting down the options to every port on every machine you
installed something often goes wrong :(


Dropping [EMAIL PROTECTED]

The OPTIONS feature stores port preferences and helps a lot with this.
Not all ports are converted yet, but that's just a matter of time.  My
only complaint is that when options are added I'm not prompted for my
preference (I just get the default value).  I have to go back and
manually make config if I don't want the default.  If automatic
prompting for new options is added then we will truly have a set  
it and

forget it configuration system.  Because I track ports fairly closely
and usually catch new options, this hasn't annoyed me enough to fix  
it...



On good example of portupgrade going off on one is a simple
upgrade of mtr we dont install any X on our machines so mtr-nox11
is installed. Whenever I've tried portupgrade in the past its
always trolled of and started downloading and build the behemoth
that is X, CTRL+C hence always ensues and I forget about upgrading
until I really HAVE to.


You have to tell the ports system you don't want X (put the  
following in

/etc/make.conf):
WITHOUT_X11= yes

There are also ports (like bittorrent) that install GUIs by default.
You should also tell the ports system you don't want GUIs:
WITHOUT_GUI= yes

Some ports will still need the X libs (like graphviz), but that's  
not a

huge deal.


Just curious, where are WITHOUT_X11 and WITHOUT_GUI documented?  I  
don't see either in /usr/share/examples/etc/make.conf, nor in man  
make.conf.



___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Hans Lambermont
Paul Allen wrote:

...
 Some speculation:  I've always thought portupgrade did the Wrong
 Thing(tm) by consulting the dependency graph in /var/db.   Better to
 merely learn which packages were installed and then exclusively use
 the port information...

Well, a.o. portmaster tries just to do that. Have a look at
sysutils/portmaster as an alternative to sysutils/portupgrade.

I think follow-ups should go to the freebsd-ports list.

regards,
   Hans Lambermont
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


RE: Re: FreeBSD Security Survey

2006-05-22 Thread FreeBSD User

   As an administrator, time is always an issue.  FreeBSD has proven
   itself time and again.  Having said that, one wish would be to have
   a default/built-in security update mechanism.
   Since time is always and issue, if the system could by default
   (without an admin having to write scripts and/or apps, or manually
   update) update itself for both system and installed ports/packages, it
   likely would reduce security issues exponentially.
   This of course would be a massive project/challenge. Varying system
   and kernel configurations alone would make this a huge challenge, not
   to mention the potential security implications.
   The survey is a great idea.  I suggest adding a section for
   administrators to add comments and/or wishes.
   Sejo
   Brent Casavant wrote:
 On Sun, 21 May 20
 06, Colin Percival wrote:
 
 
In order to better understand
which FreeBSD versions are in use, how people are (or aren´t) keeping
them updated, and why it seems so many systems are not being updated, I
have put together a short survey of 12 questions.
 
 
 I applaud this survey, however question 9 missed an important point,
 at least to me.  I was torn between answering less than once a month
 and I never update.
 
 While I find ports to be the single most useful feature of the FreeBSD
 experience, and can´t thank contributors enough for the efforts, I on
 the other hand find updating my installed ports collection (for security
 reasons or otherwise) to be quite painful.  I typically use portupgrade
 to perform this task.  On several occasions I got bit by doing a
 portupgrade which wasn´t able to completely upgrade all dependencies
 (particularly when 
 X, GUI´s, and desktops are in the mix -- though I
 always follow the special Gnome upgrade methods when appropriate).
 
 I can´t rule out some form of pilot error, but the end result was pain.
 
 After several instances of unsatisfactory portupgrades (mostly in the
 5.2 through early 5.4 timeframe), I adopted the practice of either not
 upgrading ports at all for the life of a particular installation on a
 machine (typically about one year), or when necessary by removing *all*
 ports from the machine, cvsup´ing, and reinstalling.  This has served
 me quite well, particularly considering the minimal threat profile these
 particularly systems face.
 
 So, in short, that´s why *I* rarely update ports for security reasons.
 
 There are steps that could be taken at the port maintenance level that
 would work well for my particular case, however that´s beyond the scope
 of the sur
 vey.  Thanks for taking the time put the survey together, I
 certainly hope it proves useful.
 
 Thank you,
 Brent Casavant
I share this frustration with you.  I was once told that the pain in
upgrading is due largely to a somewhat invisible difference between
installing a pre-compiled package, and building+installing a port.  In
theory, if you stick to one method or the other, things will stay mostly
consistent.  But if you mix them, and particularly if you update the
ports tree in the process, the end result is a bit more undefined.  One
thing that I wish for is that the ports tree would branch for releases,
and that those branches would get security updates.  I know that this
would involve an exponentially larger amount of effort from the ports
team, and I don´t fault them for not doing it.  Still, it would be nice
to have.
Scott
_
 __
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Miroslav Lachman

Charles Howse wrote:


Just curious, where are WITHOUT_X11 and WITHOUT_GUI documented?  I  
don't see either in /usr/share/examples/etc/make.conf, nor in man  
make.conf.


Many options (not all) are described in /usr/ports/KNOBS (but withou 
WITH_/WITHOUT_ prefixes)


Miroslav Lachman
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Allen
On Mon, May 22, 2006 at 12:06:54AM -0400, Brandon S. Allbery KF8NH wrote:
 
 On May 21, 2006, at 11:55 , Colin Percival wrote:
 
 The Security Team has been concerned for some time by anecdotal  
 reports
 concerning the number of FreeBSD systems which are not being promptly
 updated or are running FreeBSD releases which have passed their End of
 Life dates and are no longer supported. In order to better understand
 which FreeBSD versions are in use, how people are (or aren't) keeping
 them updated, and why it seems so many systems are not being  
 updated, I
 
 I have a 6-STABLE box that is not going to be updated to 6.1 any time  
 soon, because my personal mail will have to be offline while I do so  
 --- including nuking and rebuilding all ports because the ports tree  
 has been thrashed by multiple low level updates that affect a large  
 percentage of the tree --- and it's only a 600MHz box so it will be  
 offline for most of a week during that upgrade.  And I'm uncertain  
 how downgrading it to 6.0-RELEASE+security patches will complicate  
 things (downgrading via cvsup/buildworld is not a supported option,  
 last I checked).  Granted, I probably should have stuck with 6.0-R  
 --- but then, experience has shown me that the more reliable option  
 is to wait a week or two after release and then install -STABLE.
 
 In short:  keeping FreeBSD up to date tends to be painful at best.

I'd have to agree, though it's much better than some systems, it's still
something I'd like to see some improvement on.

For example, I understand the reasons for how Free BSD does things, I do.

However, one thing I'd love to see is a much better tool for handling
updates and upgrades.

I may get reamed for what I'm about to say, but I'm willing to deal with
whatever happens with this:

I'd like to see Free BSD include an approach to updates in the way
Slackware Linux does...

Now before I get 10,000 emails saying I'm stupid or something to that
effect let me explain:

I've been using supporting and telling about Free BSD for many years. When
I got my first computer, I had installed Free BSD not long after and that
was coming from Windows 95 / 98 SE.

One thing that always made me mad was when a new security flaw came out.

On my Slackware machines, it was no problem at all, I'd use wget to grab
the patch .tgz file, then do this:

upgradepkg *.tgz

I'd go get coffee or somethign and come back to all patches being
installed.

I know about portupgrade, and it's a good start, but I think there would be
huge benifit from a tool that allows you to download a tgz file and doing
the above to install patches.

A lot of Linux only users I know would use Free BSD if the patching system
was something more Slackware like. And I don't consider it a rip off to
make a system like that because well, Slackware is a supporter of BSD.

The Slackware Essentials book I bought has BSD on the back of it and BSD is
also listed as a supporter of Slackware, so I see no Moral problem with
creating something for Free BSD that would allow this.

From what I've seen in portupgrade, you have to use a key... Which is nice
and all, but it defeats the purpose when I've personally seens omeone say
 Ugh you have to do all this just to set up portupgrade? and you have to
recompile the Kernel for that Telnet update...

Explanations as to why don't work.

I just personally feel there would be a lot more boxes getting patches
installed if you could do it like Slackware, or Linux in general, and allow
for patches that you just install with one command.

RedHat and some other distros use RPM, and they have their own update
tools, but if you wanted you could just download the RPMs and do rpm -U to
update.

Slackware I've shown already. It's a good system.

From what I've understood, Free BSD doesn't usually do binarys I could
be wrong here as I'm no positive...

But I really think it would be for the best if there was something added to
Free BSD where you could juts install patches the way you do Linux.

I mean you wouldn't have to remove the other system that is in use now, and
as I saiud portupgrade is a good start, however for the people I talk to it
doesn't seem to be enough.

I'd love to see somethign like this added into Free BSD where for the
people who like the updates the way they are now could keep using that way,
and for the new comers and people who aren't used to it, they could use the
other way.

Like Is aid Linux has two ways, you can use an update tool like Redhat's
up2date, or you can download the RPMs yourself.

Slackware has Swaret, slackpkg, and slapt-get, or you can simply download
the patches which are already .tgz files, and use upgradepkg to install
them.

I think the benifits would be great and more people would use it if they
knew when a new security problem came out in Free BSD all they had to do
was download a patch and type upgradepkg, or type patch and it installed
 like this.

And then a front end could be done where 

Re: FreeBSD Security Survey

2006-05-22 Thread Paul Allen
From Doug Hardie [EMAIL PROTECTED], Sun, May 21, 2006 at 11:48:51PM -0700:
 Failover sounds good in theory but has significant issues in practice  
 that make it sometimes worse than the alternative.  Take mail  
 spools.  If you failover, mail the user saw before has disappeared.   
 Then when you fail back it reappears and newer messages disappear.   
 This is hardly unnoticable.  My users do not find that at all  
 acceptable.  Putting the mail spools on a different machine just  
 moves that problem to the different machine.  Trying to keep multiple  
 spools consistent has problems also.  I have watched raid system lose  

It's a hard problem that's why you buy a box to do it:
http://www.emc-rainwall.com

Rainfinity (recently bought by EMC) has patents on actual
peer-reviewed data-replication algorithms.

 Paul
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Julian H. Stacey
 And it's not only HR lack problem, we would need more hardware for the
 package building cluster too.

A lot of us run 24/7 netted servers with spare cycles,  wouldn't
be averse to allocating the idle loop to package building for
freebsd.org, but 3 problems:
- package building at prsent gets done on that trusted cluster,
- needs root for lots of buils, which many of us dont
  want to give out (sandboxes / chroot maybe ? )
- freebsd.org would need to know none of our client servers
  had `slipped it a mickey', which would best be protected
  against by anonymisining I guess, so we didnt even know
  what we were compiling.
- It'd need some mechanised automation, like SETI
A nice project for some Summer Of Code student this summer ?

-- 
Julian Stacey.  Consultant Unix Net  Sys. Eng., Munich.  http://berklix.com
Mail in Ascii, HTML=spam. Ihr Rauch = mein allergischer Kopfschmerz.
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread Peter Jeremy
On Mon, 2006-May-22 15:20:11 -, FreeBSD User wrote:
   Since time is always and issue, if the system could by default
   (without an admin having to write scripts and/or apps, or manually
   update) update itself for both system and installed ports/packages, it
   likely would reduce security issues exponentially.

I think it would substantially reduce the reliability and security.

Firstly, automatically installing arbitrary fixes on a production
system is almost always a bad idea.  The release engineering and
security teams do regression testing but can't test exactly your
system configuration and there's a non-trivial likelihood that
installing patch X will break something that your configuration relies
on.  This can be mitigated by using a test system and rolling out the
updates from it, but that negates the whole point.

It's also likely to inconvenience users.  Our ITS department take it
upon themselves to automatically roll out (wintel) desktop updates.
This almost always results in your desktop machine insisting that it
needs to be rebooted immediately when you are in the middle of doing
something crucial - thus breaking your concentration and potentially
losing data (my manager managed to lose 3 man-hours work once).  I,
for one, would hate it if my FreeBSD boxes started doing the same.

Specific FreeBSD versions aren't maintained forever.  An install it
and forget it philosophy will increase the number of machines that
aren't being patched because they are running unmaintained versions
of FreeBSD.  With the current approach, the sysadmin is aware that
particular machines need to be updated to a newer version.  If
everyting is automatic, the sysadmin will probably forget.

Finally, it only takes one security failure in the update process for
someone undesirable to own all the FreeBSD machines that have been
left in this default mode.  Despite the best efforts of FreeBSD
developers, FreeBSD will always contain bugs and some of them will
be security holes.  Any automatic update process needs to balance
the benefits of reducing the number of unpatched boxes against the
risks of the update system being subverted.

-- 
Peter Jeremy
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


RE: Re: FreeBSD Security Survey

2006-05-22 Thread FreeBSD User

   Should something like automatic security updates not be a goal? If
   done correctly, and on a per-stable/version basis, it is possible to
   increase security exponentially. The responsible administrator will
   naturally keep ontop of all changes and fixes.  But just like in the
   wintel and other *nix worlds, not every administrator updates their
   servers. Ok, maybe only a few FreeBSD administrators don´t update...
   What I am trying to suggest is a mechanism that incorporates all
   security fixes and specified (or installed) ports/packages for a given
   server, within a per-stable/version basis.  Tools that exist already
   accomplish this, and run by a custom script via cron.  There still
   would likely be a strong need for an administrator to buildworld,
   especially for those of us who prefer configuring custom kernels and
   bulilding (mostly) by source.
   It is naturally a wish that could potentially save a busy
   administrator some time. As I said, this of course would be a massive
   project/challenge. Varying system and kernel configurations alone
   would make this a huge challenge, not to mention the potential
   security implications.
   Granted, many FreeBSD versions will not be maintained for long periods
   of time.  But are there no out dated versions running now?
   Is something like this not worth looking at for the future?
   Sejo
    Original Message 
   From:Peter Jeremy
   Sent: Tue 23 May 2006 05:23:50 1000
   To: FreeBSD User
   Subject: Re: FreeBSD Security Survey
On Mon, 2006-May-22 15:20:11 -, FreeBSD User wrote:
   Since time is always and issue, if the system could by default
   (without an admin having to write scripts and/or apps, or manually
   update) update 
 itself for both system and installed ports/packages, it
   likely would reduce security issues exponentially.
I think it would substantially reduce the reliability and security.
Firstly, automatically installing arbitrary fixes on a production
system is almost always a bad idea.  The release engineering and
security teams do regression testing but can´t test exactly your
system configuration and there´s a non-trivial likelihood that
installing patch X will break something that your configuration relies
on.  This can be mitigated by using a test system and rolling out the
updates from it, but that negates the whole point.
It´s also likely to inconvenience users.  Our ITS department take it
upon themselves to automatically roll out (wintel) desktop updates.
This almost always results in your desktop machine insisting that it
needs to be rebooted immediately when you are in the middle of doing
 
something crucial - thus breaking your concentration and potentially
losing data (my manager managed to lose 3 man-hours work once).  I,
for one, would hate it if my FreeBSD boxes started doing the same.
Specific FreeBSD versions aren´t maintained forever.  An install it
and forget it philosophy will increase the number of machines that
aren´t being patched because they are running unmaintained versions
of FreeBSD.  With the current approach, the sysadmin is aware that
particular machines need to be updated to a newer version.  If
everyting is automatic, the sysadmin will probably forget.
Finally, it only takes one security failure in the update process for
someone undesirable to own all the FreeBSD machines that have been
left in this default mode.  Despite the best efforts of FreeBSD
developers, FreeBSD will always contain bugs and some of them will
be security holes.  Any automatic upda
 te process needs to balance
the benefits of reducing the number of unpatched boxes against the
risks of the update system being subverted.
-- 
Peter Jeremy
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-22 Thread David Magda


On May 22, 2006, at 11:49, Allen wrote:

On my Slackware machines, it was no problem at all, I'd use wget to  
grab

the patch .tgz file, then do this:

upgradepkg *.tgz


I believe there was some talk in the past of treating the base system  
like a package.  NetBSD has some code that does this called syspkg,  
but it isn't really working AFAICT.


The planned work on updating the installer was part of this (and Tim  
Kientzle's work on libarchive as well). FreeBSD Update would be  
something in a similar vein.


Is it safe to assume that this is still somewhat desired, but that  
one of the stumbling blocks is time / resources?


Regards,
David
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-21 Thread Brandon S. Allbery KF8NH


On May 21, 2006, at 11:55 , Colin Percival wrote:

The Security Team has been concerned for some time by anecdotal  
reports

concerning the number of FreeBSD systems which are not being promptly
updated or are running FreeBSD releases which have passed their End of
Life dates and are no longer supported. In order to better understand
which FreeBSD versions are in use, how people are (or aren't) keeping
them updated, and why it seems so many systems are not being  
updated, I


I have a 6-STABLE box that is not going to be updated to 6.1 any time  
soon, because my personal mail will have to be offline while I do so  
--- including nuking and rebuilding all ports because the ports tree  
has been thrashed by multiple low level updates that affect a large  
percentage of the tree --- and it's only a 600MHz box so it will be  
offline for most of a week during that upgrade.  And I'm uncertain  
how downgrading it to 6.0-RELEASE+security patches will complicate  
things (downgrading via cvsup/buildworld is not a supported option,  
last I checked).  Granted, I probably should have stuck with 6.0-R  
--- but then, experience has shown me that the more reliable option  
is to wait a week or two after release and then install -STABLE.


In short:  keeping FreeBSD up to date tends to be painful at best.

--
brandon s. allbery [linux,solaris,freebsd,perl]   
[EMAIL PROTECTED]
system administrator  [openafs,heimdal,too many hats]   
[EMAIL PROTECTED]
electrical and computer engineering, carnegie mellon university   
KF8NH




___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-21 Thread Doug Hardie


On May 21, 2006, at 20:55, Colin Percival wrote:

If you administrate system(s) running FreeBSD (in the broad sense  
of are
responsible for keeping system(s) secure and up to date), please  
visit

  http://people.freebsd.org/~cperciva/survey.html
and complete the survey below before May 31st, 2006.



What doesn't fit into the survey very well is that all my servers are  
production ones and it causes a lot of grief for users when I bring  
them down.  I try to hold updates to once per year because of that.   
I am currently in the middle of upgrading from 5.3 to 6.0.  The easy  
machines are done but there are still a few that will take  
considerable on-site time which is not easy to come by.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-21 Thread Brent Casavant
On Sun, 21 May 2006, Colin Percival wrote:

 In order to better understand
 which FreeBSD versions are in use, how people are (or aren't) keeping
 them updated, and why it seems so many systems are not being updated, I
 have put together a short survey of 12 questions.

I applaud this survey, however question 9 missed an important point,
at least to me.  I was torn between answering less than once a month
and I never update.

While I find ports to be the single most useful feature of the FreeBSD
experience, and can't thank contributors enough for the efforts, I on
the other hand find updating my installed ports collection (for security
reasons or otherwise) to be quite painful.  I typically use portupgrade
to perform this task.  On several occasions I got bit by doing a
portupgrade which wasn't able to completely upgrade all dependencies
(particularly when X, GUI's, and desktops are in the mix -- though I
always follow the special Gnome upgrade methods when appropriate).

I can't rule out some form of pilot error, but the end result was pain.

After several instances of unsatisfactory portupgrades (mostly in the
5.2 through early 5.4 timeframe), I adopted the practice of either not
upgrading ports at all for the life of a particular installation on a
machine (typically about one year), or when necessary by removing *all*
ports from the machine, cvsup'ing, and reinstalling.  This has served
me quite well, particularly considering the minimal threat profile these
particularly systems face.

So, in short, that's why *I* rarely update ports for security reasons.

There are steps that could be taken at the port maintenance level that
would work well for my particular case, however that's beyond the scope
of the survey.  Thanks for taking the time put the survey together, I
certainly hope it proves useful.

Thank you,
Brent Casavant
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-21 Thread David Nugent

Doug Hardie wrote:

On May 21, 2006, at 20:55, Colin Percival wrote:
If you administrate system(s) running FreeBSD (in the broad sense of 
are

responsible for keeping system(s) secure and up to date), please visit
  http://people.freebsd.org/~cperciva/survey.html
and complete the survey below before May 31st, 2006.


What doesn't fit into the survey very well is that all my servers are 
production ones and it causes a lot of grief for users when I bring 
them down.  I try to hold updates to once per year because of that.  I 
am currently in the middle of upgrading from 5.3 to 6.0.  The easy 
machines are done but there are still a few that will take 
considerable on-site time which is not easy to come by.


A good failover strategy comes into play here.

If you have one, then taking a single production machine off-line for a 
short period should be no big deal, even routine, and should not even be 
noticed by users if done correctly.  This should be planned for and part 
of the network/system design. Yes, it definitely requires more resources 
to support, but I'll rephrase the same problem: what happens when (and I 
mean *when* and not *if*) a motherboard or network card fries or you 
suffer a hard disk crash (even 2+ drives failing at the same time on a 
raid array is not particularly unusual considering that drives are quite 
often from the same manufactured batch)?


Lack of a failover on mission critical systems that *can't* be offline 
is like playing russian roulette.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: FreeBSD Security Survey

2006-05-21 Thread Scott Long

Brent Casavant wrote:


On Sun, 21 May 2006, Colin Percival wrote:



In order to better understand
which FreeBSD versions are in use, how people are (or aren't) keeping
them updated, and why it seems so many systems are not being updated, I
have put together a short survey of 12 questions.



I applaud this survey, however question 9 missed an important point,
at least to me.  I was torn between answering less than once a month
and I never update.

While I find ports to be the single most useful feature of the FreeBSD
experience, and can't thank contributors enough for the efforts, I on
the other hand find updating my installed ports collection (for security
reasons or otherwise) to be quite painful.  I typically use portupgrade
to perform this task.  On several occasions I got bit by doing a
portupgrade which wasn't able to completely upgrade all dependencies
(particularly when X, GUI's, and desktops are in the mix -- though I
always follow the special Gnome upgrade methods when appropriate).

I can't rule out some form of pilot error, but the end result was pain.

After several instances of unsatisfactory portupgrades (mostly in the
5.2 through early 5.4 timeframe), I adopted the practice of either not
upgrading ports at all for the life of a particular installation on a
machine (typically about one year), or when necessary by removing *all*
ports from the machine, cvsup'ing, and reinstalling.  This has served
me quite well, particularly considering the minimal threat profile these
particularly systems face.

So, in short, that's why *I* rarely update ports for security reasons.

There are steps that could be taken at the port maintenance level that
would work well for my particular case, however that's beyond the scope
of the survey.  Thanks for taking the time put the survey together, I
certainly hope it proves useful.

Thank you,
Brent Casavant


I share this frustration with you.  I was once told that the pain in
upgrading is due largely to a somewhat invisible difference between
installing a pre-compiled package, and building+installing a port.  In
theory, if you stick to one method or the other, things will stay mostly
consistent.  But if you mix them, and particularly if you update the
ports tree in the process, the end result is a bit more undefined.  One
thing that I wish for is that the ports tree would branch for releases,
and that those branches would get security updates.  I know that this
would involve an exponentially larger amount of effort from the ports
team, and I don't fault them for not doing it.  Still, it would be nice
to have.

Scott

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to [EMAIL PROTECTED]