NetBSD 2.0.2 Released 36
jschauma writes "James Chacon of the NetBSD Release Engineering team has announced that update 2.0.2 of the NetBSD operating system is now available. NetBSD 2.0.2 is the second security/critical update of the
NetBSD 2.0 release branch. This represents a selected subset of fixes deemed
critical in nature for stability or security reasons. More details are
available in the NetBSD
2.0.2 Release Announcement."
I wonder... (Score:5, Funny)
Re:I wonder... (Score:4, Informative)
Backward compatibility across major versions (for 1.5, 1.6.
Re:I wonder... (Score:3, Funny)
Re:I wonder... (Score:1)
So, speaking of security, (Score:5, Interesting)
Is this just part of the BSD landscape now? Did the idea pan out, and is BSD now relatively immune to a large class of security vulnerabilities?
OT, I know, but I remember thinking that if this worked as well as it sounded, it was a good reason to move my Linux servers over to BSD.
Re:So, speaking of security, (Score:4, Informative)
Re:So, speaking of security, (Score:4, Interesting)
So, what's the consensus been about the experience with this. Has it proven to be a huge improvement in security?
Re:So, speaking of security, (Score:5, Informative)
Writing systrace policies are alot of work, and requires much testing in order not to break the application. In addition you need knowledge of the system calls involved (pass/deny).
As an example "mv a /b" involves different system calls depending on a is on same filesystem as /b.
Re:So, speaking of security, (Score:2, Troll)
Re:So, speaking of security, (Score:1, Interesting)
I do this with my servers which run a modified postgresql, though I use OpenBSD.
Re:So, speaking of security, (Score:5, Insightful)
It's definitely a fun job though (one I wouldn't mind having), as long as the software is good. The BSDs are good in this regard, and so is Linux with the right patches and tools. But then sometimes a bug will come up nobody expected and it's all for naught
Re:So, speaking of security, (Score:3, Informative)
Re:So, speaking of security, (Score:2, Informative)
Re:So, speaking of security, (Score:3, Insightful)
So now an unprivileged app can masquerade as a apache or imapd.
Re:So, speaking of security, (Score:5, Interesting)
You do not understand the issue : Too many daemons runs as root just beacuse they need to bind to a low port. So any exploit will be a remote root exploit. Besides, if you rely on port numbers for security on random machines, I guess you have some problems ;-)
Re:So, speaking of security, (Score:2, Interesting)
It isn't just about a daemon getting root privileges. That's really bad of course. But impersonating a trusted program is really bad to, just not quite as bad. When the trusted program can bind to the port, and only that program, it solves both aspects of that particular problem.
Oh, there's lots more ways we can get in trouble, but every door that's closed and locked is a good th
Re:So, speaking of security, (Score:2)
Re:So, speaking of security, (Score:2)
While that's true, it's far from ideal. There have been many instances where popular apps (eg samba) that were supposed to drop root privlidges immediately, didn't do so properly, and became a remote root exploit anyhow...
Re:Gripes. (Score:1)