From owner-freebsd-security@freebsd.org Mon Sep 12 14:21:55 2016 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7B84CBD849A for ; Mon, 12 Sep 2016 14:21:55 +0000 (UTC) (envelope-from 000.fbsd@quip.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [94.124.105.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3E868DA3; Mon, 12 Sep 2016 14:21:54 +0000 (UTC) (envelope-from 000.fbsd@quip.cz) Received: from elsa.codelab.cz (localhost [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id 6AF4428498; Mon, 12 Sep 2016 16:13:43 +0200 (CEST) Received: from illbsd.quip.test (ip-86-49-16-209.net.upcbroadband.cz [86.49.16.209]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTPSA id 528B328485; Mon, 12 Sep 2016 16:13:42 +0200 (CEST) Subject: Re: using pkg audit to show base vulnerabilities To: Mark Felder , freebsd security References: <57BEE965.8000903@quip.cz> <1473283515.3860529.718903225.76BE1456@webmail.messagingengine.com> From: Miroslav Lachman <000.fbsd@quip.cz> Message-ID: <57D6B816.7060407@quip.cz> Date: Mon, 12 Sep 2016 16:13:42 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:42.0) Gecko/20100101 Firefox/42.0 SeaMonkey/2.39 MIME-Version: 1.0 In-Reply-To: <1473283515.3860529.718903225.76BE1456@webmail.messagingengine.com> Content-Type: text/plain; charset=ISO-8859-2; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Sep 2016 14:21:55 -0000 Mark Felder wrote on 09/07/2016 23:25: > > > On Thu, Aug 25, 2016, at 07:49, Miroslav Lachman wrote: >> I am not sure if this is the right list or not. If not, please redirect >> me to the right one. >> >> I noticed this post from Mark Felder >> https://blog.feld.me/posts/2016/08/monitoring-freebsd-base-system-vulnerabilities-with-pkg-audit/ >> >> Great work Mark, thank you! >> >> I found it very useful. I want this to be part of the nightly reports on >> all our machines so I tried to write 405.base-audit. It is based on >> original 410.pkg-audit >> It can check kernel and world of a host or world in jail or chroot (if >> freebsd-version is installed in jail or chroot) >> >> You can my find first attempt at >> http://freebsd.quip.cz/script/405.base-audit.sh >> > > I have been toying with the idea of creating a port that provides a > script called "baseaudit" that can make it very easy to check your > system for known vulns. With the majority of the logic in this script we > could also include this periodic script in the package which would check > nightly as well. Perhaps we should collaborate on this together? I will > need to review your script in detail but at a glance it appears very > thorough. I filed this PR in the meantime https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=212306 We are using this patch in our Poudriere package builder. If you think new port is better then of course I can help with this. Any improvement is better than current state where users cannot easily audit base system and jails. Miroslav Lachman