I have > 500 machines under my control, about 445 of them are connected to 
uptrack (rhel 4 & 5).  We used ksplice to block a few root exploits before we 
had a chance to reboot machines.  Since we are still testing we rolled out the 
new kernel anyway but I've run for weeks ksplice'd without a problem.  The only 
problem I did run into was when applying a specific splice relating to 32-bit I 
had to stop some processes.  HP's modified IPMI seems to cause some problems as 
well.  All other updates seemed to go fine and once we passed the kernel that 
included those fixes we didn't have that issue applying new updates.

As far as vulnerability reporting we're working with the ksplice API (a restful 
interface) and our local security team to mark nessus vulnerabilities as null 
based on CVE numbers.  I'd love to have nessus or other tools just realize a 
box is kspliced, but you can work around this by mapping in CVE numbers to 
nessus vulnerabilities since ksplice is telling you which CVEs they are 
repairing.  This would require some local tool that is producing audit reports 
that could be modified, homegrown or otherwise.

>From a stability standpoint, given the price it's almost ridiculous this 
>product isn't an option when you buy Red Hat or other distro's.  It's like 
>forgetting to check off "sport tires" when you bought that sports car.

It's also valuable as an insurance plan running in a mode where I've got no 
splices because I can sleep better knowing even if I ignore most of the CVEs, 
that reaaaaly bad one can be avoided with a massive script pretty quickly.  And 
you can un splice something too, and yes it works.  It even works on a VERY 
busy system.

Hope this helps.
p.s. some of my systems have 50+ splices applied right now.


      

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to