看板FB_security
标 题Re: Clarrification on whether portsnap was affected by the 2012
发信站NCTU CS FreeBSD Server (Tue Nov 20 22:50:35 2012)
转信站ptt!csnews.cs.nctu!news.cs.nctu!.cs.nctucs.nctu!.org!ownorg!owner-free
Am 20.11.2012 13:47, schrieb John Bayly:
> On 20/11/12 12:15, Gary Palmer wrote:
>> On Tue, Nov 20, 2012 at 10:49:13AM +0000, John Bayly wrote:
>>> Regarding the 2012 compromise, I'm a little confused as to what was and
>>> wasn't affected:
>>>
>>> >From the release:
>>>> or of any ports compiled from trees obtained via any means other than
>>>> through svn.freebsd.org or one of its mirrors
>>> Does that mean that any ports updated using the standard "portsnap
>>> fetch" may have been affected, I'm guessing yes.
>>>
>> " We have also verified that the most recently-available portsnap(8) snapshot matches the ports Subversion repository, and so can be fully trusted."
> I suppose that implies that the previous portsnap snapshots couldn't be
> [completely] trusted. Basically I wanted to know whether I had to go
> through all the ports I've updated from the snapshots within the given
> time frame and to a portupgrade --force on them. In the end I decided
> yes (luckily it's only on a single box)[email protected]"
So what ist the way to get a 'secure' portscollection?
first update with 'portsnap -f /etc/portsnap.conf fetch update '
and then 'portupgrade -caDf'
--
Dipl.Ing.Bader Richard GmbH, Helferichstrasse 32, 80999 Muenchen
Tel.: +49 89 892205 31
Fax.: +49 89 892205 33
http://www.bader-muenchen.de
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"