From owner-freebsd-questions@FreeBSD.ORG Tue Feb 24 16:41:55 2015 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 3DBBF8C2 for ; Tue, 24 Feb 2015 16:41:55 +0000 (UTC) Received: from na3sys009aog117.obsmtp.com (na3sys009aog117.obsmtp.com [74.125.149.242]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BEE0E35D for ; Tue, 24 Feb 2015 16:41:54 +0000 (UTC) Received: from mail-oi0-f42.google.com ([209.85.218.42]) (using TLSv1) by na3sys009aob117.postini.com ([74.125.148.12]) with SMTP ID DSNKVOypzN48T3psKgj9++xuEz2uV8AIQ1mq@postini.com; Tue, 24 Feb 2015 08:41:54 PST Received: by mail-oi0-f42.google.com with SMTP id h136so20274497oig.1 for ; Tue, 24 Feb 2015 08:41:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourcefire.com; s=google; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=cYJTS7cRBsUMzbMrD1oyD1TcW80FtP2S6xmamTkVt8M=; b=e+4eplx3qqQ2y4Ioy/UPQYeAih4kDQkQs4P5Lp+7FRwvgVvobHqbu1p6+Sd2oS4I74 Y/TuRkN44IQMX5BnGqLLEza5mGwXa7GZpSggPhdksrlskEkBsl8CFKMvhjQnqYku9sAt UGyKPzJPlCsEij1EOO0NjJYEKirqiTSzGlW+c= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=cYJTS7cRBsUMzbMrD1oyD1TcW80FtP2S6xmamTkVt8M=; b=Ig3Kgi592uhvAQMJwriNX1j9hWBwL7+KJgHH5FkYAhT5psFyz1cG3BOc/cLPThLZBV 1Va5rI1lcJTzLz3Lc6QqVPPEqOsqdQna+Epoliv/ODwao/OizSSXeeQSpw/SGbWm7izh 5Nq24iWQ39agDw4eFsfACWZxfu0i1jV53bFb8uoG3M7EM+N73k7DItLsLrIUgWy5CqpK xR+fhKwZA/ESFB/yyMXHQi/uXimdIrKt/dFdNFqlGYXI0hlFPUin8DRk1V/Ol+pekQVS VdzntFa7VZiJ8NLAFP1VF5Tj77DZ1s4i4g+8JVVuE7jS5+xvOpg/0YeGztuuFx8L5yVz J7QQ== X-Received: by 10.202.215.212 with SMTP id o203mr10497769oig.85.1424786190361; Tue, 24 Feb 2015 05:56:30 -0800 (PST) X-Gm-Message-State: ALoCoQngASa9WPi0Tujhi8STWvLeEZqdTO/wb3hgR5HcYj+kHCA3ozp4T+Y7+LA6yHMSGMVP8F6ppAMBpsExsGA9YKHLsL7nhQqLu32nScOvIk+nYUZm8ItREEZy0l0hhGLXJ9VovAlvqlp7W3rvFJvkTagVnYBzxQ== MIME-Version: 1.0 X-Received: by 10.202.215.212 with SMTP id o203mr10497763oig.85.1424786190258; Tue, 24 Feb 2015 05:56:30 -0800 (PST) Received: by 10.202.108.148 with HTTP; Tue, 24 Feb 2015 05:56:30 -0800 (PST) In-Reply-To: <54E6F04A.5080409@gmail.com> References: <54E6B8B9.1060204@hiwaay.net> <54E6F04A.5080409@gmail.com> Date: Tue, 24 Feb 2015 08:56:30 -0500 Message-ID: Subject: Re: What's the latest release from freebsd-update? From: Dan Langille To: Johan Hendriks Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.18-1 Cc: freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Feb 2015 16:41:55 -0000 I think that none of these suggestions, while useful, are easily programmed into a Nagios check (for example). On Fri, Feb 20, 2015 at 3:28 AM, Johan Hendriks wrote: > > Op 20-02-15 om 05:31 schreef William A. Mahaffey III: > > On 02/19/15 08:34, Dan Langille wrote: >> >>> I want to write a check to let us know if a given server is on the >>> latest >>> version. >>> >>> For example, how can I determine that FreeBSD 9.3-RELEASE-p5 is the >>> latest >>> and greatest? >>> >>> I could run freebsd-update and see what comes back, but that's not ideal >>> for a Nagios check. >>> >>> This output seems promising: >>> >>> $ sysctl kern.version >>> kern.version: FreeBSD 9.3-RELEASE-p5 #0: Mon Nov 3 22:38:58 UTC 2014 >>> root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC >>> >>> Let's assume we use that as the check for the host. >>> >>> What do we compare it to? Where can I find out that 9.3-RELEASE-p6 is >>> available? >>> >> >> >> I'm running 9.3 (FreeBSD 9.3-RELEASE-p5) as well, & I have noticed >> posts going by onlist referencing 9.3-RELEASE-p9 (I think, might have >> been 8), although that is little help to you. You & I are several >> months back from today, probably safe to assume something newer is >> available. The bottom of >> https://www.freebsd.org/doc/handbook/updating-upgrading- >> freebsdupdate.html >> talks about comparing system versions. If you do a 'freebsd-update >> fetch' followed by a 'freebsd-update install' you will be updated to >> the latest & greatest patch level, but I'm not sure there is a way of >> checking that level apriori .... $0.02, no more, no less .... >> >> > Go to the website www.freebsd.org, on the right site there is a colum > security advisories > > click on the latest, and it will show you the latest patch level of all > versions. Like the example below, the advisory for sctp. > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > ============================================================ > ================= > FreeBSD-SA-15:03.sctp Security > Advisory > The FreeBSD > Project > > Topic: SCTP stream reset vulnerability > > Category: core > Module: sctp > Announced: 2015-01-27 > Credits: Gerasimos Dimitriadis > Affects: All supported versions of FreeBSD. > Corrected: 2015-01-27 19:36:08 UTC (stable/10, 10.1-STABLE) > 2015-01-27 19:37:02 UTC (releng/10.1, 10.1-RELEASE-p5) > 2015-01-27 19:37:02 UTC (releng/10.0, 10.0-RELEASE-p17) > 2015-01-27 19:36:08 UTC (stable/9, 9.3-STABLE) > 2015-01-27 19:37:02 UTC (releng/9.3, 9.3-RELEASE-p9) > 2015-01-27 19:36:08 UTC (stable/8, 8.4-STABLE) > 2015-01-27 19:37:02 UTC (releng/8.4, 8.4-RELEASE-p23) > CVE Name: CVE-2014-8613 > > > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions- > unsubscribe@freebsd.org" > -- Dan Langille Infrastructure & Operations Talos Group Sourcefire, Inc.