[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Security EOL within Debian Stable



On Wed, Feb 4, 2015 at 6:49 PM, Michael Gilbert <mgilbert@debian.org> wrote:
> On Wed, Feb 4, 2015 at 8:09 PM, Stephen Dowdy wrote:
>> So, if a user installs said package, but fails to notice any EOL DSA
>> on it, the package gets left in place in a potentially VULNERABLE
>> state.  I.E. if a known exploit comes out, and the package is still
>> installed, the end-user could get a nasty surprise thinking that
>> because they've added security support to apt-sources and regularly
>> update, that they are protected.   This is a non-optimal and undesired
>> end-result.
>
> The debian-security-support package somewhat addresses those concerns
> [0], but it is not currently installed by default.  There was some
> discussion to make that happen, but hasn't been followed through.

Ah, that's useful to know, and that would be a a reasonable solution.

However, that package depends upon being current and having the ended&limited support db files updated

    $ check-support-status -V
     version 2014.09.07
    $ grep chromium /usr/share/debian-security-support/*  || echo "Chromium not listed"  
    Chromium not listed

It's been less than a week since 'chromium' support was EOL'd, so hopefully soon 'debian-security-support' will get that updated info.

To me, that's a satisfactory solution, again, depending upon it being maintained.   I'll ensure that our default FAI config includes that package from here out.
(additionally, a site administrator could, using those DBs manage package de-installation / deactivation or security-alert wrapper scriptage even automatically from it)

>> Note that chromium is in 'main' -- not 'contrib' or ..., so there's a
>> valid expectation that its security support won't just silently stop
>> -- unlike the other FAQ entry that says there's basically no security
>> support or contrib, non-free..
>
> I'm not sure where you get the "silently" concern from, but this topic
> is already discussed in wheezy's release notes [1].  The problem with
> that of course you'll point out is that users often don't read that...

By "silently", i mean that the package would continue to operate w/o warning that it's possibly vulnerable (sans any external info such as checking DSAs or having an updated 'debian-security-support' package and independently running it to identify the problem).   I've often injected shell-script wrappers around problematic packages to warn users via dialog/kdialog/simple-message that the package is vulnerable/problematical, etc -- until the problem's rectified.

Yeah, it's hard to read (and brain-store) multiple hundred page manuals for all the stuff a sysadmin is responsible for on a regular basis.  That's why i appealed to folks like you to set me straight ;)

> Best wishes,
> Mike
>
> [0] https://packages.qa.debian.org/d/debian-security-support.html
> [1] https://www.debian.org/releases/stable/amd64/release-notes/ch-information.en.html#browser-security

Thanks!
--stephen

--
Stephen Dowdy  -  Systems Administrator  -  NCAR/RAL
303.497.2869   -  sdowdy@ucar.edu        -  http://www.ral.ucar.edu/~sdowdy/

Reply to: