Advertisement
Kimarite

Announcement of long term support for Debian oldstable

Apr 16th, 2014
515
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.82 KB | None | 0 0
  1. [SECURITY] [DSA 2907-1] Announcement of long term support for Debian oldstable
  2. (5 év a kiadás megjelenésétől számítva)
  3.  
  4. A következő levél témája:
  5. „Ez egy előzetes értesítés, hogy a rendszeres biztonsági támogatás a Debian GNU / Linux 6.0 (kódnevén "squeeze") 2014. május 31-én megszűnne,
  6. # Egy újabb kiadás megjelenése után egy évig tart a Debian biztonsági frissítési támogatása az oldstable verzióra.
  7. azonban mi örömmel jelentjük be, hogy az oldstable disztribúció, a Debian Squeeze részére a biztonsági támogatást meg fogjuk hosszabbítani, 2016. februárig, vagyis öt évvel a - most oldstable - kiadás megjelenésétől számítva. Ez a törekvés (LTS - Long Term Support) vezérli a különböző érdekelt feleket / vállalatokat, amelyeknek így az igényeit a hosszabb biztonsági támogatásra jobban ki tudjuk szolgálni ...”
  8.  
  9. #####
  10. Kapcsolódó hivatkozások:
  11. - DebianSqueeze
  12. https://wiki.debian.org/DebianSqueeze
  13. - DebianReleases
  14. https://wiki.debian.org/DebianReleases
  15. - Debian “squeeze” Release Information
  16. http://www.debian.org/releases/squeeze/
  17. - DebianOldStable
  18. https://wiki.debian.org/DebianOldStable
  19. #####
  20.  
  21. A levél
  22.  
  23. - -------------------------------------------------------------------------
  24. Debian Security Advisory DSA-2907-1 [email protected]
  25. http://www.debian.org/security/ Moritz Muehlenhoff
  26. April 16, 2014 http://www.debian.org/security/faq
  27. - -------------------------------------------------------------------------
  28.  
  29. This is an advance notice that regular security support for Debian
  30. GNU/Linux 6.0 (code name "squeeze") will be terminated on the 31st of
  31. May.
  32.  
  33. However, we're happy to announce that security support for squeeze is
  34. going to be extended until February 2016, i.e. five years after the
  35. initial release. This effort is driven by various interested parties /
  36. companies which require longer security support. See the "LTS" section
  37. of https://lists.debian.org/debian-devel-announce/2014/03/msg00004.html
  38. for the initial announcement.
  39.  
  40. The details are currently being sorted out and a more detailed
  41. announcement will be made soon.
  42.  
  43. Brief advance FAQ (but you should really wait for the more detailed
  44. announcement):
  45.  
  46. Q: What's the difference between regular security support and the LTS
  47. support?
  48. A: squeeze-lts is only going to support i386 and amd64. If you're
  49. running a different architecture you need to upgrade to Debian 7
  50. (wheezy). Also there are going to be a few packages which will not
  51. be supported in squeeze-lts (e.g. a few web-based applications
  52. which cannot be supported for five years). There will be a tool to
  53. detect such unsupported packages.
  54.  
  55. Q: Does this mean that Debian 7 (wheezy) and/or Debian 8 (jessie) will
  56. have five years security support as well?
  57. A: Likely, we'll see how squeeze-lts turns out. If there's sufficient
  58. support it will be continued for later releases as well. Also, see
  59. below.
  60.  
  61. Q: Is additional help needed?
  62. A: Absolutely. squeeze-lts is not handled by the Debian security team,
  63. but by a separate group of volunteers and companies interested in
  64. making it a success (with some overlap in people involved). So, if
  65. you're a company using Debian and seeing a benefit in security
  66. support for five years, get in touch with [email protected]
  67. and we'll see how you can help (if you e.g. don't have the manpower /
  68. know how but are willing to contribute, we can point you to a list
  69. of Debian consultants)
  70.  
  71. Mailing list: [email protected]
  72.  
  73.  
  74. A levélben hivatkozott oldal
  75. https://lists.debian.org/debian-devel-announce/2014/03/msg00004.html
  76. tartalma:
  77.  
  78. [Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]
  79. Bits from the Security Team
  80.  
  81. Subject: Bits from the Security Team
  82. From: Moritz Muehlenhoff <[email protected]>
  83. Date: Wed, 5 Mar 2014 20:03:01 +0100
  84. Message-id: <[email protected]>
  85. Mail-followup-to: [email protected]
  86.  
  87. -----BEGIN PGP SIGNED MESSAGE-----
  88. Hash: SHA1
  89.  
  90.  
  91. The Debian Security Team met on the first weekend of February at the
  92. Linux Hotel in Essen (along with an FTP master for archive/dak-related
  93. issues). Here's a summary of what was discussed and done. It also
  94. lists various useful tasks for which volunteers are welcome in order
  95. to speed things up.
  96.  
  97. Attendees: carnil, corsac, fw, jmm, luciano, geissert, ganneff
  98.  
  99. Debian Security Tracker
  100. - -----------------------
  101.  
  102. * In some cases source packages get renamed, e.g. the source package
  103. for the Linux kernel was called "linux-2.6" in oldstable and is
  104. "linux" in stable and later. Other examples are the various Ruby
  105. packages which got renamed from libfoo-ruby to ruby-foo. These
  106. renames currently need to be tracked manually. We're planning to
  107. automate these. If anyone wants to help and implement it, please see
  108. #738172
  109.  
  110. * We've discussed whether older release information should be kept in
  111. the database. There are some performance issues to be considered
  112. since the tracker data gets rebuild with every commit, but adding
  113. support for oldoldstable is still well within the limits of the
  114. system running the Debian Security Tracker.
  115.  
  116. * debsecan is a tool which is closely related to the Security Tracker:
  117. It uses the tracker data and outputs a list of all open
  118. vulnerabilities affecting a given system. There's currently not much
  119. development going into debsecan since people are busy with other
  120. topics. If anyone is interested in joining the debsecan
  121. maintenance/development (there's a certain level of interest since
  122. several patches are submitted to the BTS), debsecan can be moved to
  123. collab-maint. If anyone's interested please send a mail to
  124.  
  125. * We're considering to periodically send notifications of open
  126. vulnerabilities to maintainers. While we usually file bugs for all
  127. security bugs sometimes issues fall through the cracks and an
  128. additional reminder will be useful. We're planning to perform a test
  129. run and check on how to proceed from there.
  130.  
  131. * There are quite some vulnerabilities which are addressed in Debian,
  132. but for which no CVE identifier has been assigned. Since the CVE
  133. assignments are monitored by other parties, getting IDs
  134. assigned is useful for the open source community at large. They are
  135. currently tracked at
  136. https://security-tracker.debian.org/tracker/data/fake-names , if
  137. anyone is interested in coordinating CVE assignments, please get in
  138. touch with [email protected]
  139.  
  140. * Currently dak doesn't send out error and upload processing messages
  141. to uploaders to security-master. This is done to prevent information
  142. leaks of erroneous uploads of embargoed vulnerabilities and public
  143. mailing lists in the Maintainers: stanza of a package. Error
  144. messages will be sent to the primary email address of the PGP key of
  145. the uploaders (which prevents information leaks).
  146.  
  147. Security release workflow
  148. - -------------------------
  149.  
  150. * We tried using Request Tracker for some time now. This hasn't
  151. worked out to our satisfaction, so we have already switched to track
  152. pending security updates with a text file in our Subversion
  153. repository. We were still using RT for non-public issues, but we're
  154. planning to track these in an external, private Subversion
  155. repository in the future. Most of the documentation has already
  156. been changed, a change to the developer's reference is pending.
  157.  
  158. * Historically we've included the vulnerability type and the scope of
  159. a security issue in our DSAs. This has become mostly redundant and
  160. confusing (and it's covered in the advisory text anyway), so we've
  161. started to no longer include these in current advisories.
  162.  
  163. * The PGP key of the security team is currently handled in a traditional
  164. manner. Our current key expires in September 2015 and we're planning
  165. to move to smart cards for managing the key in the future.
  166.  
  167. * We're currently using Subversion. We discussed changing to git, but
  168. git doesn't offer significant benefit for our purpose so we decided
  169. to stick with it. However, we're planning a rename of the repository
  170. which is still named after the secure-testing project which is no
  171. longer active and is confusing people.
  172.  
  173. * Many packages are easily testable, but some packages are more
  174. intricate to setup or they require special purpose hardware. We're
  175. planning to keep a list of willing testers, so if you're running any
  176. of the packages below and are available for tests, please send a
  177. pidgin, openjdk-6, openjdk-7, drupal6, drupal7, asterisk, quagga,
  178. nginx, torque, openswan, roundcube, typo3, bind9, tomcat6/tomcat7,
  179. mediawiki and gridengine.
  180.  
  181.  
  182. Security archive
  183. - ----------------
  184.  
  185. * In order to avoid bottlenecks and to open up the security process
  186. further we're planning to allow maintainers which are not part of
  187. the security team to release security updates on their own. This
  188. applies to packages which have frequent vulnerabilities and where
  189. the maintainers are involved in the update process anyway. The exact
  190. details still need to be sorted out and some archive changes are
  191. required as well. Currently the release of a security update
  192. requires a login to security-master. We're planning for a mechanism
  193. similar to the procedure to allow upload privileges to DM;
  194. i.e. uploading a signed control message which triggers the actual
  195. update (probably with some tool like dcut). In a later step the
  196. advisory mail could be sent out by dak itself.
  197.  
  198. * In the past dak provided support for two distinct queues on
  199. security-master; one public and one for private security
  200. vulnerabilities. This feature is currently non-functional due to
  201. changes in dak development in the past, but we're planning to
  202. re-enable it again. This will allow us to make all public security
  203. updates initially available through a separate apt source prior to
  204. the release of a DSA (there's usually a delay between the initial
  205. upload of a fixed package and the release, e.g. to sort out further
  206. tests or to wait until all architectures are built). For non-private
  207. issues making this change opens to wider testing of upcoming
  208. security updates and furthermore earlier availability of updates for
  209. Debian-derived distributions based on oldstable/stable.
  210.  
  211. * We had occasional problems of mismatched tarballs between
  212. security-master and ftp-master. These are automatically detected and
  213. rejected when the security update is later merged into stable. These
  214. are now automatically detected and rejected when processing an
  215. upload to the security queue. Code which checked these during the
  216. upload was already available in dak and has been enabled during the
  217. meeting.
  218.  
  219.  
  220. Others
  221. - ------
  222.  
  223. * We're tentatively aiming for another Security Team meeting at the
  224. beginning of 2015. At that time Jessie will be in freeze which is a
  225. good opportunity to plan for jessie/jessie+1.
  226.  
  227. * In some cases the scope of security support needs to be limited (e.g
  228. webkit-based browsers in Wheezy) and sometimes packages need to
  229. end-of-lifed before the security support time frame ends. Currently
  230. this information needs to be retrieved from the release notes or
  231. announcement mails. We'd like to see a more technical solution which
  232. displays the unsupported packages for the installed packages on a
  233. specific system. If anyone wants to work on such a script, please
  234. contact [email protected] and we can hash out the details.
  235.  
  236. * Our documentation is currently spread across (too) many
  237. places. We're planning to create a one-stop site
  238. http://security-team.debian.org which links all information wrt to
  239. working/contributing on security, e.g. links to the security
  240. tracker, introduction information, links to useful wiki pages etc.
  241. Some preliminary work has already started - e.g. converting the docs
  242. to MarkDown.
  243.  
  244.  
  245. Distribution hardening
  246. - ----------------------
  247.  
  248. * The distribution hardening using dpkg-buildflags is coming along
  249. nicely. Coverage of security-sensitive packages and of all packages
  250. with priority:standard or above is above 95%. Some packages still
  251. need to be addressed or NMUed, please get in touch with
  252. [email protected] if you want to help out.
  253. Coverage of the rest of the archive is also making nice progress, if
  254. you're a maintainer and haven't fixed our packages yet, see
  255. https://wiki.debian.org/HardeningWalkthrough for more documentation.
  256.  
  257. * GCC 4.9 introduces an improved version of stack protection
  258. (-fstack-protector-strong). We're planning to propose this to the
  259. dpkg-buildflags once GCC 4.9 is the default compiler.
  260.  
  261. * We're planning to request for hidepid to be enabled by default (to 1).
  262. This will squash an entire class of information leaks. If you have any
  263. comments or objections, please get in touch with us.
  264.  
  265. * Since Wheezy the Linux kernel features a security mechanism which
  266. nullifies many symlink attacks (fs.protected_symlinks). We're
  267. planning to treat any vulnerabilities which are rendered moot by
  268. this protection as non-issues. If you're using custom Linux kernels
  269. builds you need to enable this option. kfreebsd (currently a
  270. technology preview) and Hurd (currently not a release arch) don't
  271. implement this security feature. We welcome feedback from the
  272. porters whether similar protections exist or whether they're
  273. feasible within the jessie release time frame.
  274.  
  275.  
  276. LTS
  277. - ---
  278.  
  279. * At the moment it seems likely that an extended security support
  280. timespan for squeeze is possible. The plan is to go ahead, sort out
  281. the details as as it happens, and see how this works out and whether
  282. it is going to be continued with wheezy.
  283. The rough draft is that updates will be delivered via a separate
  284. suite (e.g. squeeze-lts), where everyone in the Debian keyring can
  285. upload in order to minimise bottlenecks and allow contributions by
  286. all interested parties. Some packages will be exempted upfront due
  287. to their volatile nature (e.g. some web applications) and others
  288. might be expected to see important changes. The LTS suite will be
  289. limited to amd64 and i386. The exact procedures will be sorted out
  290. soon and announced in a separate mail.
  291.  
  292. * It needs to be pointed out that for this effort to be sustainable
  293. actual contributions by interested parties are required. squeeze-lts
  294. is not something that will magically fall from the sky. If you're
  295. dependent/interested in extended security support you should make an
  296. effort to contribute, either by contributing on your own or by
  297. paying a Debian developer/consultant to contribute for you.
  298. The security team itself is driving the effort, NOT doing it. Some team
  299. members will contribute to it individually, however.
  300.  
  301. * Anyone interested in contributing, please get in touch with
  302. [email protected]. We'll setup an initial coordination list
  303. with all interested parties. All policies / exact work will be
  304. sorted out there.
  305.  
  306.  
  307. Full minutes can be found at http://titanpad.com/secteamessen2014 and an
  308. archived version can be found at
  309. http://anonscm.debian.org/viewvc/secure-testing/doc/secteamessen2014-latest.txt?view=markup
  310.  
  311.  
  312.  
  313. -----BEGIN PGP SIGNATURE-----
  314. Version: GnuPG v1 -----END PGP SIGNATURE-----
  315.  
  316. Reply to:
  317.  
  318. Moritz Muehlenhoff (on-list)
  319. Moritz Muehlenhoff (off-list)
  320.  
  321. Prev by Date: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!
  322. Next by Date: Debian Contributors want YOUr data source!
  323. Previous by thread: Bits from keyring-maint: Pushing keyring updates. Let us bury your old 1024D key!
  324. Next by thread: Debian Contributors want YOUr data source!
  325. Index(es):
  326. Date
  327. Thread
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement