Koozali.org: home of the SME Server

Damn.. so many security updates...

guestHH

Damn.. so many security updates...
« on: September 22, 2003, 08:46:32 PM »
- Apache
- mod_ssl
- perl

can't keep up with it....

Ergin

Re: Damn.. so many security updates...
« Reply #1 on: September 22, 2003, 10:03:48 PM »
Hi there !

Care to share some more ?

guestHH

Re: Damn.. so many security updates...
« Reply #2 on: September 22, 2003, 10:07:54 PM »
well.... subscribe yourself to the RedHat security mailing lists and you'll know all detaisl

Ergin

Re: Damn.. so many security updates...
« Reply #3 on: September 22, 2003, 10:18:45 PM »
I understand your point... *** sigh ***

I don't know if there is anything I can say to comfort you BUT considering how often we have to patch (at work) to keep W2K servers running this is quite acceptable.

I myself was looking for an upgrade RPM for apache-1-3.27 and I finally found somewhere. Well, when I tried to upgrade apache I couldn't since it required glibc 2.3 etc etc...

So I took my test server (and old Pentium 200MMX and tested and so far it looks OK.

My point is, the upgrades for RH8 and RH9 are quite in time and RH73 daemon packages aren't updated as often as the newer versions. So my next step is installing all the developer packages and creating my own RPMS... I am NOT really sure if I can pull this off but I sure will it a try. (I don't think my wife will appriciate me spending more time in front of the computer)...

I understand how you feel... Just hang in there.

Byte

Re: Damn.. so many security updates...
« Reply #4 on: September 22, 2003, 10:39:49 PM »
take alook at this http://freshmeat.net/projects/rhupdate/?topic_id=147%2C253


Its free and checks your machine for updates, easy to install/complie we use it for all our machines saves it gives you a list of whats needs updating and you can install what you want it's for those who cant afford the Redhat Network Updates using the GUI instead you use good old command line

Hope this helps

Byte

Ray Mitchell

Re: Damn.. so many security updates...
« Reply #5 on: September 22, 2003, 11:02:37 PM »
Don't the updates that Mitel release keep a standard server secure ?

I was under the impression that a lot of the security notifications from other sources often do not apply to the Mitel sme server, mostly because sme does not use the specific versions of rpms that are affected.
My understanding was that Mitel release security fixes when absolutely necessary.
It also seems that many of the security tests out there will find false positives, and that the sme server is not actually compromised even though the test suggests it is.
Have I got it wrong ?

Regards
Ray Mitchell

Adserg

Re: Damn.. so many security updates...
« Reply #6 on: September 23, 2003, 12:19:55 AM »
Hi Ray

That's my understanding?

Im getting worried now.

Adserg

dave

Re: Damn.. so many security updates...
« Reply #7 on: September 23, 2003, 12:48:22 AM »
I think Ray's correct in that SME doesn't use many of the modules that standard RedHat will.  In trimming down the number of installed modules, it helps keep the system more secure; fewer installed modules/running processes means less vulnerabilities.  This also means when RedHat posts security issues, these issues may not apply to SME because the module may not be there.  Take a look at the install for RH and compare that with SME.  Last time I downloaded RH ISO's, there was 3 install CD's and a separate documentation CD where SME is a trim single CD install.

Another thing is that SME only firewalls the public NIC in a server and gateway configuration.  In server only, there is no network protection (firewalling) enabled.  This is by design and I believe it's a good one.  The belief is if it ('it' being any TCP/IP packet/datagram) is on the internal network, it's supposed to be.

Michael Soulier

Re: Damn.. so many security updates...
« Reply #8 on: September 23, 2003, 01:24:51 AM »
guestHH wrote:
>
> - Apache
> - mod_ssl
> - perl
>
> can't keep up with it....

Luckily, we can. ;-)

The above are nothing to worry about on the SME. We don't use renogotiation, and there is no exposure for the CGI module in supported code. That said, unsupported code using the CGI module should be audited by the authors to ensure no vulnerability.

Cheers,
Mike