Hello

I still haven't found an answer to this question:

How do I automate security updates on debian stable, and do it in a 
secure manner?

The only way to prevent one from getting trojans seems to be to check 
the signature that comes with the security-announce emails, then 
check the md5 sums listet there. Even when upgrading manually, one 
should only apt-get -d install package and then go into 
/var/cache/apt/archives and check the md5, so one could just ignore 
the apt system alltogether and use wget instead.

Someone has said once on this list that future versions of apt/debian 
will support signed packages. When will this be? There's nothing 
mentioned in the debian faq. (I've noticed that dpkg-buildpackage try 
to sign the package, but I haven't found any hint how to let dpkg 
check that.)

Maybe you will say "don't automatically change your production system 
even when you're protected against trojans, since it could break 
something", but if done carefully (i.e. the packages don't break 
anything), it should be better than forgetting to upgrade the server 
and let it run with a hole? What do you think?

Maybe it would be good enough to have a tool that first checks 
whether an *installed* package needs a security fix and then alarm 
the administrator. "apt-get update && apt-get -s -q -q upgrade" could 
be used for this, but it will also print packages that are on hold 
for some reason, so postprocessing would be needed anyway, and 
(network) failures would have to be handled gracefully to prevent 
sending false alerts to the admin - in short, I would prefer a 
finished solution to reinventing the wheel ;-)  (And upon receiving 
the alert, the admin would have to wait for the security-announce to 
arrive to be able to check the integrity)

It just seems like a missing link in the apt system.

Christian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to