From owner-freebsd-security Mon Jul 29 18:20:25 2002 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 207F737B400 for ; Mon, 29 Jul 2002 18:20:21 -0700 (PDT) Received: from mail.drkshdw.org (user205.net239.fl.sprint-hsd.net [209.26.20.205]) by mx1.FreeBSD.org (Postfix) with ESMTP id E6DBA43E67 for ; Mon, 29 Jul 2002 18:20:19 -0700 (PDT) (envelope-from scorpio@drkshdw.org) Received: (qmail 77993 invoked by uid 85); 30 Jul 2002 01:20:58 -0000 Received: from scorpio@drkshdw.org by scorpio.DrkShdw.org by uid 82 with qmail-scanner-1.12 (uvscan: v4.1.60/v4205. spamassassin: 2.20. . Clear:. Processed in 0.743099 secs); 30 Jul 2002 01:20:58 -0000 Received: from unknown (HELO router.drkshdw.org) (192.168.134.2) by user205.net239.fl.sprint-hsd.net with SMTP; 30 Jul 2002 01:20:57 -0000 Message-Id: <5.1.1.6.0.20020729212013.00a03140@mail.drkshdw.org> X-Sender: scorpio@mail.drkshdw.org X-Mailer: QUALCOMM Windows Eudora Version 5.1.1 Date: Mon, 29 Jul 2002 21:21:16 -0400 To: Hendrik Scholz , freebsd-security@freebsd.org From: Jeff Palmer Subject: Re: audit-packages like program for FreeBSD? In-Reply-To: <20020730000534.84D0067B06@deimos.raisdorf.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org pkg_version -c works for me If all your ports are updated as needed, security issues are fixed as the portstree is updated ;-) Jeff Palmer scorpio@drkshdw.org At 10:05 AM 7/30/02 +1000, Hendrik Scholz wrote: >Hi! > >While using NetBSD I discovered the audit-packages package. >Basicly it consists of a script and a text file. >The text file contains information about packages/ports that are >vulnerable to any kind of remote/local/dos attack. >The script can be run by the daily cron job and then checks if one of the >installed packages is mentioned in the list of vulnerable packages. >If so it reports package name, version, type of bug and an URL to an >advisory as part of the cron report. >The text-file can be updated with ftp/wget/... > >As I've been thinking about this I just want to know if someone is >interested in this for FreeBSD? > >Writing the script itself should be no problem for me but maintaining the >vulnerability database could become difficult as the number of ports grow. >A script that crawls through the ports cvs tree and checking for ports >marked forbidden since the last run would be a good start but for >unmaintained ports bugtraq/vuln-watch/... has to be read. >Any ideas how to get more input? > >Which language to use? >Perl would do fine for this job but as Perl isn't in the base system >anymore a shell script or c program would be better if it should be >possible to run this as part of the daily cron job. >If I start with this what language should I use? > >Thanks for all comments, Hendrik > >P.S. I won't be able to answer all questions immediatly as I'm on vacation :) > >-- >Hendrik Scholz - - http://raisdorf.net/ > >drag me, drop me - treat me like an object > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-security" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message