From owner-freebsd-security@freebsd.org Wed Jul 3 15:20:58 2019 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6CE2815D71C0 for ; Wed, 3 Jul 2019 15:20:58 +0000 (UTC) (envelope-from srs0=uqfc=va=lafn.org=bc979@sermon-archive.info) Received: from mail.sermon-archive.info (sermon-archive.info [71.177.216.148]) by mx1.freebsd.org (Postfix) with ESMTP id 90F6A77F7E; Wed, 3 Jul 2019 15:20:57 +0000 (UTC) (envelope-from srs0=uqfc=va=lafn.org=bc979@sermon-archive.info) Received: from [192.168.1.144] (96-8-177-190.block0.gvtc.com [96.8.177.190]) by mail.sermon-archive.info (Postfix) with ESMTPSA id 45f4Yz6JcWz2fjRr; Wed, 3 Jul 2019 08:20:55 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (1.0) Subject: Re: FreeBSD Security Advisory FreeBSD-SA-19:10.ufs From: Doug Hardie X-Mailer: iPad Mail (16F203) In-Reply-To: Date: Wed, 3 Jul 2019 10:20:54 -0500 Cc: freebsd-security@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <20190703004924.8A5411A7D5@freefall.freebsd.org> To: Ed Maste X-Virus-Scanned: clamav-milter 0.100.2 at mail X-Virus-Status: Clean X-Rspamd-Queue-Id: 90F6A77F7E X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of srs0=uqfc=va=lafn.org=bc979@sermon-archive.info designates 71.177.216.148 as permitted sender) smtp.mailfrom=srs0=uqfc=va=lafn.org=bc979@sermon-archive.info X-Spamd-Result: default: False [-0.72 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-0.90)[-0.896,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:71.177.216.148]; MV_CASE(0.50)[]; MIME_GOOD(-0.10)[text/plain]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.97)[-0.974,0]; NEURAL_SPAM_SHORT(0.65)[0.651,0]; IP_SCORE(-0.09)[asn: 5650(-0.38), country: US(-0.06)]; MX_GOOD(-0.01)[cached: sermon-archive.info]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[148.216.177.71.list.dnswl.org : 127.0.10.0]; FORGED_SENDER(0.30)[bc979@lafn.org,srs0=uqfc=va=lafn.org=bc979@sermon-archive.info]; RCVD_NO_TLS_LAST(0.10)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:5650, ipnet:71.177.216.0/23, country:US]; FROM_NEQ_ENVFROM(0.00)[bc979@lafn.org,srs0=uqfc=va=lafn.org=bc979@sermon-archive.info]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-Mailman-Approved-At: Wed, 03 Jul 2019 15:53:14 +0000 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 03 Jul 2019 15:20:58 -0000 On Jul 3, 2019, at 05:41, Ed Maste wrote: >=20 >> On Wed, 3 Jul 2019 at 06:05, Doug Hardie wrote: >>=20 >>> Afterwards, reboot the system and run: >>>=20 >>> # fsck -t ufs -f -p -T ufs:-z >>>=20 >>> to clean up your existing filesystems. >>=20 >> After rebooting the system I get: >>=20 >> master# fsck -t ufs -f -p -T ufs:-z >> /dev/ada0p2: NO WRITE ACCESS >> /dev/ada0p2: UNEXPECTED INCONSISTENCY; RUN fsck MANUALLY. >>=20 >> Is this expected result or is there a problem here? >=20 > Thanks for reporting this - it looks like some more detail will need > to be added to the SA. The fsck needs to be run without the filesystem > being mounted read-write, most likely in single user mode. >=20 > I brought a test system down to single user mode, remounted / as > read-only, and ran the fsck command as follows: >=20 > # shutdown now > ... > Enter full pathname of shell or RETURN for /bin/sh: > # mount -u -o ro / > # fsck -t ufs -f -p -T ufs:-z > /dev/ufsid/5bf225f5889c157d: 28576 files, 304757 used, 27570235 free > (899 frags, 3446167 blocks, 0.0% fragmentation) > # exit That is going to be a bit tricky to do on a headless server that is remote. = None of mine have consoles. They are all accessed via SSH. Any ideas how t= his situation can be handled? =E2=80=94 Doug=