Matthew Hannigan wrote:

On Mon, May 23, 2005 at 07:02:24PM +1000, Rick Welykochy wrote:

Matthew Hannigan wrote:


If you did 'yum update ' regularly (every day, at the very least))
you most likely would not have been hit by this exploit.

That is the best way/ path of least pain.

Is it?
In a production environment?


My short answer would be *especially* in a production
environment, if production means 'being exposed to the internet'.

A fuller answer depends what you perceive the risks
are and what other steps you took to protect yourself.

If you're running an integrity checker, selinux, chrooted
apache, no-exec stack, some lesser known architecture, blah blah blah,
you could afford to give yourself a little more time to try out
updates on a test/qa server for compatibility first.

Were you thinking of compatibility concerns or security of
vendor updates?  If the latter, well, you either trust them
or not really.  Fedora/Redhat gpg sign their updates; you should
enable that checking at least.

Compatibility concerns. The spectre of a security update
introducing more insecurity is rare in my experience.

But updates have screwed things up: RH and libc(?) probs years ago,
Apple OS X update trounced on dual-boot Linux awhile back, Win
XP SP2 broke compatibility with certain apps (apparently with good reason).

The basic rule in production (i.e. a service being offered to public/
customers / clients) is to test before deploying changes. There are
often too many components and interconnected cross-relationships
that have never been tested in *your* specific configuration to have
been adequately tested by the update provider.

Methinks that blindly accepting updates or auto-updating sans testing
can lead to unexpected delights and late nights scratching head at console.

cheers
rickw



--
_________________________________
Rick Welykochy || Praxis Services

"I drank what?" - Socrates, 399 BC
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to