Re: Mass update deployment strategy

2007-01-10 Thread Moritz Muehlenhoff
On 2007-01-09, Florian Weimer [EMAIL PROTECTED] wrote:
 * Javier Fernández-Sanguino Peña:

 If your installation where slightly bigger (maybe 100 systems) I would
 suggest you invest your time working with OVAL [1] and CVE [2]:

 a) deploy an OVAL agent at the nodes with apt-capabilities

 b) have a central OVAL server send new signatures to nodes so they can tell
   you wether they are vulnerable or not (and need to have a DSA applied or
   not)

 Does anyone publish Debian-specific OVAL signatures?

Not to my knowledge.

 Do you think there is a need for them?

No, too much beaucracy for too little gain.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Mass update deployment strategy

2007-01-10 Thread Javier Fernández-Sanguino Peña
On Tue, Jan 09, 2007 at 08:08:36PM +0100, Florian Weimer wrote:
 Does anyone publish Debian-specific OVAL signatures?  Do you think
 there is a need for them?

Not that I know of, but I have a converter to OVAL signatures that can
generate the XML files from the website contents. But somebody has to adapt
the OVAL agent to do Debian checks too.

I think there is a need for them, as there is currently no way to have a
Debian systems integrate in heterogeneus patch management systems without too
glue. Tools like update-notifier and debsecan are nice, but for
desktop users or administrators handling a few systems, not for enterprise
deployments.


Regards

Javier


signature.asc
Description: Digital signature


Re: Mass update deployment strategy

2007-01-10 Thread Javier Fernández-Sanguino Peña
On Wed, Jan 10, 2007 at 07:23:36PM +0100, Moritz Muehlenhoff wrote:
  Do you think there is a need for them?
 
 No, too much beaucracy for too little gain.

What bureaucracy? Unlike CVE names, each vendor can generate their own OVAL
signatures. For example:
http://people.redhat.com/mjc/oval/
for more information on Red Hat's OVAL strategy see:
http://www.redhat.com/security/transparent/oval/

Regards

Javier


signature.asc
Description: Digital signature


Re: Mass update deployment strategy

2007-01-09 Thread FreekNL

Dear George,

A setup that works well, is to work with your own Debian and/or Ubuntu
repository, to which you only commit (apt-move) packages when you
tested and approved beforehand.

On your test setup you will see exactly what the impact will be from
update X on configuration Y and you will have a chance to script the
answers to posed questions as well thus being able to fully automate
the installation while maintaining an integrit infrastructure.

This will also save quite a bit of bandwidth.

One more advanced step (where you limit the SPOF for the installation
server) is to use apt-proxy to get a peer2peer alike update mechanism.

You may then configure your systems to download and install all
updates at a set timely interval from your CRM-production mirror
without thinking.

If you setup two repo's, say production and testing, you could
measure the impact of a (security)update on _one_ test system.

Perhaps you could also combine its functionality with the suggested
solution from Javier.

A fun addition would be to use a hypvervisor (Xen) to run one instance
of every deployed configuration from within your network on a separate
virtual machine.
Which adds even more advantages, because you can easily restore the
state of your machines and you only need _one_ machine to measure the
impact of updates.

Have used this setup quite a few times, where there is always one
(often combined with other services) update server per geographical
site.

Kind regards,
Freek Kauffmann



On 12/1/06, Javier Fernández-Sanguino Peña [EMAIL PROTECTED] wrote:

On Mon, Nov 27, 2006 at 08:37:42PM +0100, mario wrote:
 Do you have a strategy or anything to automate this task a little more?
 The server farm is growing and i might have to look after 20 or 30
 installations soon. I can already see myself updating ubuntu/debian
 installations all day long :(.

Let me throw some ideas around...

If your installation where slightly bigger (maybe 100 systems) I would
suggest you invest your time working with OVAL [1] and CVE [2]:

a) deploy an OVAL agent at the nodes with apt-capabilities

b) have a central OVAL server send new signatures to nodes so they can tell
  you wether they are vulnerable or not (and need to have a DSA applied or
  not)

c) priorise work based on the severity of the vulnerability (you can use both
  NIST's CVE DB [1] and the priorities set by the Debian Testing Security
  team in their tracker for this)

d) request systems to update with a patch (remote ssh connection will do for
this)

Unfortunately, a) is not yet possible. I have working OVAL agents for Debian
(i.e. they compile) but have not had the time yet to write an adapter for
Apt (shouldn't be too difficult). I'm trying to finish the DSA to OVAL xml
signature converter so that generating xml signatures from the DSAs published
at the website will be a breeze, but I have not yet finished with that. Any
help with that would be appreciated.

The only thing I can find close to that is to use Nessus with Local Security
Checks and use the feed which provides tests for Debian vulnerabilities
(I believe this is possible with the free feed, but maybe they have changed
it). This is hardly optimal as it requires the systems to be live in the
network when you are 'scanning it'.

You can also do it by hand, if you are so inclined:

a) have the systems send you their status files when they are online to a
  central system
b) have a central system pick up those files and compare that information with
  a database of known vulnerabilites in Debian
c) priorise the systems and vulnerabilities based on the above criteria
d) have the central system ask the other systems to install the patch from
  security.debian.org (or your local repository) based on c)

The first two parts of that (by-hand) solution are already written in the
scripts provided by Tiger (check the package source:
systems/Linux/deb_checkadvisories and systems/Linux/2/update_advisories)

Unfortunately, nobody has written off a free enterprise patch management
for Debian. There are non-free commercial alternatives you can easily find,
but I'm not going to publitize them in this mailing list (contact me in
private if you are desperate looking for one).

Regards

Javier

[1] http://oval.mitre.org
[2] http://cve.mitre.org
[1] Formerly ICAT, now it's the National Vulnerability Database


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFb3OtsandgtyBSwkRAosBAJ9dYAeZCMxCqbh4nZq0nVP6RZcq7ACfQdPv
KgUoC58ZnelCJWGrO0o9Yi8=
=hokl
-END PGP SIGNATURE-





Re: Mass update deployment strategy

2007-01-09 Thread Florian Weimer
* Javier Fernández-Sanguino Peña:

 If your installation where slightly bigger (maybe 100 systems) I would
 suggest you invest your time working with OVAL [1] and CVE [2]:

 a) deploy an OVAL agent at the nodes with apt-capabilities

 b) have a central OVAL server send new signatures to nodes so they can tell
   you wether they are vulnerable or not (and need to have a DSA applied or
   not)

Does anyone publish Debian-specific OVAL signatures?  Do you think
there is a need for them?



Re: Mass update deployment strategy

2006-12-08 Thread dsr
On Tue, Nov 28, 2006 at 05:32:35PM -0500, Joe Bouchard wrote:
 I would say that if you let your machines blindly to an apt-get update;
 apt-get upgrade every day, most of the time it won't be a problem, but
 someday it may be a problem and you might render half your cluster
 unbootable.  There are various modifications to this blind update theme
 as others have suggested, but I think the basic issue remains. There will
 be some of those packages which ask a lot of questions.  The thing I think

If you know the answers to the questions, you can deploy the
answers as well. See the preseeding section of the
debian-installer package.

 I am getting ready to deploy hundreds of small embedded devices running
 Debian, and keeping them up to date is a potential nightmare, and I
 consider it carefully. 

First, there's no point in doing a blind update. Do an
eyes-wide-open update: reserve a few of your devices in the lab
as test units. When you see a package update come along that
pertains to your setup, install it on a test unit. Figure out
the answers to any questions. Run all your tests to see if it's
still working properly. When you are convinced that it is good,
move the package to your own repository. That should be the only
repository these devices are configured to look at, and should
contain every package they need, and none that they do not need.

That repository is safe for auto-update, auto-upgrade.

-dsr-

-- 
.-  -..- .-.  --. ..- .-.  --- -. --- .-..  - -. .-.. 
.--- ..- -. -.-- .-. ..-.  ... -... .  .-- .-. ..-.  ..-.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Mass update deployment strategy

2006-11-30 Thread Javier Fernández-Sanguino Peña
On Mon, Nov 27, 2006 at 08:37:42PM +0100, mario wrote:
 Do you have a strategy or anything to automate this task a little more?
 The server farm is growing and i might have to look after 20 or 30
 installations soon. I can already see myself updating ubuntu/debian
 installations all day long :(.

Let me throw some ideas around...

If your installation where slightly bigger (maybe 100 systems) I would
suggest you invest your time working with OVAL [1] and CVE [2]:

a) deploy an OVAL agent at the nodes with apt-capabilities

b) have a central OVAL server send new signatures to nodes so they can tell
  you wether they are vulnerable or not (and need to have a DSA applied or
  not)

c) priorise work based on the severity of the vulnerability (you can use both
  NIST's CVE DB [1] and the priorities set by the Debian Testing Security
  team in their tracker for this)

d) request systems to update with a patch (remote ssh connection will do for
this)

Unfortunately, a) is not yet possible. I have working OVAL agents for Debian
(i.e. they compile) but have not had the time yet to write an adapter for
Apt (shouldn't be too difficult). I'm trying to finish the DSA to OVAL xml
signature converter so that generating xml signatures from the DSAs published
at the website will be a breeze, but I have not yet finished with that. Any
help with that would be appreciated.

The only thing I can find close to that is to use Nessus with Local Security
Checks and use the feed which provides tests for Debian vulnerabilities
(I believe this is possible with the free feed, but maybe they have changed
it). This is hardly optimal as it requires the systems to be live in the
network when you are 'scanning it'.

You can also do it by hand, if you are so inclined:

a) have the systems send you their status files when they are online to a
  central system
b) have a central system pick up those files and compare that information with
  a database of known vulnerabilites in Debian
c) priorise the systems and vulnerabilities based on the above criteria
d) have the central system ask the other systems to install the patch from
  security.debian.org (or your local repository) based on c)

The first two parts of that (by-hand) solution are already written in the
scripts provided by Tiger (check the package source:
systems/Linux/deb_checkadvisories and systems/Linux/2/update_advisories)

Unfortunately, nobody has written off a free enterprise patch management
for Debian. There are non-free commercial alternatives you can easily find,
but I'm not going to publitize them in this mailing list (contact me in
private if you are desperate looking for one).

Regards

Javier

[1] http://oval.mitre.org
[2] http://cve.mitre.org
[1] Formerly ICAT, now it's the National Vulnerability Database


signature.asc
Description: Digital signature


Re: Mass update deployment strategy

2006-11-28 Thread Marcin Owsiany
On Mon, Nov 27, 2006 at 03:37:22PM -0500, George Georgalis wrote:
 
 for n in host1 host2 hostz; do
  ssh [EMAIL PROTECTED] $ENV  $UPD ; $UPG  $UPC
 done

Check out dsh and its option -c instead of this step :-)

Marcin
-- 
Marcin Owsiany [EMAIL PROTECTED] http://marcin.owsiany.pl/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Mass update deployment strategy

2006-11-28 Thread Joe Bouchard
I would say that if you let your machines blindly to an apt-get update;
apt-get upgrade every day, most of the time it won't be a problem, but
someday it may be a problem and you might render half your cluster
unbootable.  There are various modifications to this blind update theme
as others have suggested, but I think the basic issue remains. There will
be some of those packages which ask a lot of questions.  The thing I think
you really need to wonder about is kernel packages a few times I have
used stock kernels (not ones I compiled), and when a new update comes out
the apt-get upgrade tries to install the new kernel, update lilo.conf, run
lilo, and advises you that reboot asap.  My personal track record with this
has been less than perfect, and a few times I've need to revert to an old
kernel, or use an emergency boot CD to fix the problem and then I'm all
set.  Therefore, kernel upgrades are something I want to do manually at
this point in my life, and I tend to stick with the same kernel for long
periods of time.

I am getting ready to deploy hundreds of small embedded devices running
Debian, and keeping them up to date is a potential nightmare, and I
consider it carefully.  Here is my strategy thus far:
- My devices are the same, hardware wise, and it's my intent to keep them
the same software wise.
- Remove anything I don't need.  Anything that's purged won't need to be
updated.  A samba server doesn't need gcc, or X, or frozen bubble, or
apache, or LaTex.  Eliminate those packages, and you remove the maintenance
concerns on those packages.
- General security approaches which reduce exposure.  Eliminate services,
use tight firewall rules, network isolation, read-only filesystems, and all
that.
- Look at the security updates and decide for yourself how exposed you are,
and if it's really necessary to upgrade a particular package right now.  If
they find a bug which is only exploitable at the console, and none of my
systems have a console, I don't need to worry about it really, or at least
I can put it off until I have a bunch that matter.  Or in the case of some
exotic (potential) risk with a race condition where my local users would
have do something rediculously complex, and I know they aren't smart enough
to know how to do that, I can weigh the cost/benefit of inaction and
potentially postpone this patch until I really need it.
- When I finally do have to make some updates, I will do a couple machines
by hand, and then make sure it works, then write a script which hits each
of the other boxes and does exactly the same.

That's my plan, we'll see how well it works.  These systems are small data
collection appliances, with no proprietary data, and if one of these gets
hijacked we have taken steps to prevent it from spreading, so the
consequences of a vulnerability are rather small.  If you have a public web
server, that's a whole 'nother story.

Good luck.
Joe



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Mass update deployment strategy

2006-11-27 Thread mario
Hello List,

i am responsible for 10 (ubuntu and debian) installations so far.
I have installed apticron which informs me about updates frequently. 
Actually, its that often that i sometimes need to invest 1h a day just
doing updates.

Do you have a strategy or anything to automate this task a little more?
The server farm is growing and i might have to look after 20 or 30
installations soon. I can already see myself updating ubuntu/debian
installations all day long :(.

My installations are most of the time small firewalls and samba servers.

Any comments or field reports about this?

Thanks, Mario





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Fwd: Mass update deployment strategy

2006-11-27 Thread Manuel García

-- Forwarded message --
From: Manuel García [EMAIL PROTECTED]
Date: Nov 27, 2006 3:46 PM
Subject: Re: Mass update deployment strategy
To: mario [EMAIL PROTECTED]


Well, if every machine have the same hardware you may use systemimager
to do the upgrade, read about systemimager in [1]

[1] http://www.systemimager.org/documentation/

On 11/27/06, mario [EMAIL PROTECTED] wrote:

Hello List,

i am responsible for 10 (ubuntu and debian) installations so far.
I have installed apticron which informs me about updates frequently.
Actually, its that often that i sometimes need to invest 1h a day just
doing updates.

Do you have a strategy or anything to automate this task a little more?
The server farm is growing and i might have to look after 20 or 30
installations soon. I can already see myself updating ubuntu/debian
installations all day long :(.

My installations are most of the time small firewalls and samba servers.

Any comments or field reports about this?

Thanks, Mario





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]





--
Manuel Garcia.
Jefe de Informática CASEP.
Administrador de redes
Consultor independiente
Debian GNU/Linux Testing codename Etch


--
Manuel Garcia.
Jefe de Informática CASEP.
Administrador de redes
Consultor independiente
Debian GNU/Linux Testing codename Etch



Re: Mass update deployment strategy

2006-11-27 Thread George Georgalis
On Mon, Nov 27, 2006 at 08:37:42PM +0100, mario wrote:
Hello List,

i am responsible for 10 (ubuntu and debian) installations so far.
I have installed apticron which informs me about updates frequently. 
Actually, its that often that i sometimes need to invest 1h a day just
doing updates.

Do you have a strategy or anything to automate this task a little more?
The server farm is growing and i might have to look after 20 or 30
installations soon. I can already see myself updating ubuntu/debian
installations all day long :(.

My installations are most of the time small firewalls and samba servers.

Any comments or field reports about this?

on your master computer you could run a script somthing like this...

#!/bin/sh

set -e
set -x
ENV=set -e  export TERM=$TERM  . /etc/profile
UPD=echo  hostname  Updating Package Lists...  apt-get -qq update || 
true
UPG=apt-get upgrade --show-upgraded
UPC=apt-get clean

for n in host1 host2 hostz; do
 ssh [EMAIL PROTECTED] $ENV  $UPD ; $UPG  $UPC
done


don't forget to have ssh-agent working beforehand.

// George

-- 
George Georgalis, systems architect, administrator IXOYE


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



RE: Mass update deployment strategy

2006-11-27 Thread Morgan Walker
There is also a package called cron-apt which will automatically update
your debian machines and send you an email regarding what it updated.

~Morgan

-Original Message-
From: George Georgalis [mailto:[EMAIL PROTECTED] 
Sent: Monday, November 27, 2006 3:37 PM
To: debian-security@lists.debian.org
Subject: Re: Mass update deployment strategy

On Mon, Nov 27, 2006 at 08:37:42PM +0100, mario wrote:
Hello List,

i am responsible for 10 (ubuntu and debian) installations so far.
I have installed apticron which informs me about updates frequently. 
Actually, its that often that i sometimes need to invest 1h a day just
doing updates.

Do you have a strategy or anything to automate this task a little more?
The server farm is growing and i might have to look after 20 or 30
installations soon. I can already see myself updating ubuntu/debian
installations all day long :(.

My installations are most of the time small firewalls and samba
servers.

Any comments or field reports about this?

on your master computer you could run a script somthing like this...

#!/bin/sh

set -e
set -x
ENV=set -e  export TERM=$TERM  . /etc/profile
UPD=echo  hostname  Updating Package Lists...  apt-get -qq update
|| true
UPG=apt-get upgrade --show-upgraded
UPC=apt-get clean

for n in host1 host2 hostz; do
 ssh [EMAIL PROTECTED] $ENV  $UPD ; $UPG  $UPC
done


don't forget to have ssh-agent working beforehand.

// George

-- 
George Georgalis, systems architect, administrator IXOYE


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



Re: Mass update deployment strategy

2006-11-27 Thread Steve Kemp
On Mon, Nov 27, 2006 at 08:37:42PM +0100, mario wrote:

 i am responsible for 10 (ubuntu and debian) installations so far.
 I have installed apticron which informs me about updates frequently. 
 Actually, its that often that i sometimes need to invest 1h a day just
 doing updates.

  Given the choice I'd much prefer identical distributions, even
 with a little pain.  Since things differ between Ubuntu  Debian
 (and Redhat/SuSE/etc).  Having two or more security update schedules
 and two lots of testing is more painful.

 Do you have a strategy or anything to automate this task a little more?

  cfengine.

  I'm interested in puppet, but it wasn't (isn't yet?) stable at
 the time I started automation on a decent sized farm.

Steve
-- 
Debian GNU/Linux System Administration
http://www.debian-administration.org/



signature.asc
Description: Digital signature


Re: Mass update deployment strategy

2006-11-27 Thread Mikko Rapeli
On Mon, Nov 27, 2006 at 03:52:40PM -0500, Morgan Walker wrote:
 There is also a package called cron-apt which will automatically update
 your debian machines and send you an email regarding what it updated.

And upgraded, if you really trust your package sources:

$ cat /etc/cron-apt/action.d/9-dist-upgrade 
dist-upgrade -y -V -u -o Dpkg::Options::=--force-confold

-Mikko


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]