You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@spamassassin.apache.org by Ian Zimmerman <it...@buug.org> on 2016/04/13 07:26:41 UTC
[OT] still configuring [Was: Disabling spamcop plugin]
On 2016-04-12 10:57 -0400, David Niklas wrote:
> You could use Gentoo, you get to configure it all yourself!
Funny you'd say that, I _am_ actually switching to it - on my
"workstation" role computers. I'm already over 50% over the hump, I
think.
But on "server type" computers, I just cannot spare a dedicated security
branch. I really don't have the time, and more importantly the nerves,
to scramble and recompile the world when each new vulnerability is
announced.
> You might also try Arch or Devuan. What distro are you using now?
Debian. Have been using it over 15 years now, and watched some of the
fun vanish over the last few.
--
Please *no* private copies of mailing list or newsgroup messages.
Rule 420: All persons more than eight miles high to leave the court.
Re: Disabling spamcop plugin
Posted by Alarig Le Lay <al...@swordarmor.fr>.
On Wed Apr 13 15:50:27 2016, Reindl Harald wrote:
> enough problems by wasting time if you have to maintain 10, 20, 30 or more
> servers and in case of problems need fast downgrades - especially if you run
> virtual machines where all the compile jobs share hardware
>
> besides that on a production server no compilers should be installed at all
> - the generation of malware which compiles itself is only a question of time
>
> what gentoo would need to solve for professional environemnts is that you
> have one machine which pulls the updates, compiles them and apckage them in
> a way all other machines in the network can pull and apply them in
> precompiled from over ftp, http or whatever network protocol
>
> we are doing the same even for Fedora servers where one machine which has
> all package sinstalled moves them from yum/dnf-cache to a repo folder, run
> createrepo and all other machines have only this repo enabled and so can do
> a "yum -y upgrade" which can be triggered over SSH directly from the admin
> machine with a "distribute-updates.sh" script and a own SSH key for that
> task
Hi,
When you run several dozens of servers, you should use and orchestrator.
By this way, you don’t spend time for each server.
Also, you can have a compiler for your gentoo architecture that serves
binary packages to other servers.
--
alarig
Re: Disabling spamcop plugin
Posted by Michael Orlitzky <mi...@orlitzky.com>.
On 04/13/2016 09:50 AM, Reindl Harald wrote:
>
> enough problems by wasting time if you have to maintain 10, 20, 30 or
> more servers and in case of problems need fast downgrades - especially
> if you run virtual machines where all the compile jobs share hardware
emerge --buildpkg will create a binary package that you can instantly
downgrade to with emerge --usepkg
> besides that on a production server no compilers should be installed at
> all - the generation of malware which compiles itself is only a question
> of time
I'm not convinced that an attacker who can execute commands on your
server is more dangerous when one of those commands is `gcc`.
>
> what gentoo would need to solve for professional environemnts is that
> you have one machine which pulls the updates, compiles them and apckage
> them in a way all other machines in the network can pull and apply them
> in precompiled from over ftp, http or whatever network protocol
>
As you wish:
https://wiki.gentoo.org/wiki/Binary_package_guide
Re: Disabling spamcop plugin
Posted by Reindl Harald <h....@thelounge.net>.
Am 13.04.2016 um 15:12 schrieb Michael Orlitzky:
> On 04/13/2016 01:26 AM, Ian Zimmerman wrote:
>> On 2016-04-12 10:57 -0400, David Niklas wrote:
>>
>>> You could use Gentoo, you get to configure it all yourself!
>>
>> Funny you'd say that, I _am_ actually switching to it - on my
>> "workstation" role computers. I'm already over 50% over the hump, I
>> think.
>>
>> But on "server type" computers, I just cannot spare a dedicated security
>> branch. I really don't have the time, and more importantly the nerves,
>> to scramble and recompile the world when each new vulnerability is
>> announced.
>
> This shouldn't be worse on Gentoo than it is anywhere else. We have a
> mailing list, gentoo-announce [0], where security advisories get sent.
> But, they only get sent out once the vulnerability has been fixed and
> marked stable /everywhere/, so they often come a little late.
> Nevertheless, security issues are fixed ASAP:
>
> 1. Some vulnerability is found.
>
> 2. The security team opens a bug, and contacts the maintainer of the
> affected package.
>
> 3. A fix is committed to the tree.
>
> 4. The arch teams scramble to stabilize the version with the fix.
>
> 5. The announcement is sent out.
>
> As long as you follow a semi-regular update cycle, you shouldn't have to
> do anything special, even if you run a stable system. The affected
> package will be recompiled automatically as part of the updates. Any
> packages *depending on* that package (like, if they're statically linked
> to it) will also be recompiled. No need to recompile @world
enough problems by wasting time if you have to maintain 10, 20, 30 or
more servers and in case of problems need fast downgrades - especially
if you run virtual machines where all the compile jobs share hardware
besides that on a production server no compilers should be installed at
all - the generation of malware which compiles itself is only a question
of time
what gentoo would need to solve for professional environemnts is that
you have one machine which pulls the updates, compiles them and apckage
them in a way all other machines in the network can pull and apply them
in precompiled from over ftp, http or whatever network protocol
we are doing the same even for Fedora servers where one machine which
has all package sinstalled moves them from yum/dnf-cache to a repo
folder, run createrepo and all other machines have only this repo
enabled and so can do a "yum -y upgrade" which can be triggered over SSH
directly from the admin machine with a "distribute-updates.sh" script
and a own SSH key for that task
Re: [OT] still configuring [Was: Disabling spamcop plugin]
Posted by Ian Zimmerman <it...@buug.org>.
On 2016-04-13 09:12 -0400, Michael Orlitzky wrote:
> package will be recompiled automatically as part of the updates. Any
> packages *depending on* that package (like, if they're statically linked
> to it) will also be recompiled.
But also _direct_ dependencies of the affected package, if the latest
version has new requirements. And this is the heart of the problem.
With a dedicated security channel like debian has, the fixes are
recompiled targeted to the base release, so (for example) I'd never have
to update perl because of a fix in spamassassin.
In fact you can leave debian servers to update themselves unattended,
most of the time. This is too huge a benefit for me to drop, even
weighed against the recent debian annoyances.
--
Please *no* private copies of mailing list or newsgroup messages.
Rule 420: All persons more than eight miles high to leave the court.
Re: [OT] still configuring [Was: Disabling spamcop plugin]
Posted by Michael Orlitzky <mi...@orlitzky.com>.
On 04/13/2016 01:26 AM, Ian Zimmerman wrote:
> On 2016-04-12 10:57 -0400, David Niklas wrote:
>
>> You could use Gentoo, you get to configure it all yourself!
>
> Funny you'd say that, I _am_ actually switching to it - on my
> "workstation" role computers. I'm already over 50% over the hump, I
> think.
>
> But on "server type" computers, I just cannot spare a dedicated security
> branch. I really don't have the time, and more importantly the nerves,
> to scramble and recompile the world when each new vulnerability is
> announced.
>
This shouldn't be worse on Gentoo than it is anywhere else. We have a
mailing list, gentoo-announce [0], where security advisories get sent.
But, they only get sent out once the vulnerability has been fixed and
marked stable /everywhere/, so they often come a little late.
Nevertheless, security issues are fixed ASAP:
1. Some vulnerability is found.
2. The security team opens a bug, and contacts the maintainer of the
affected package.
3. A fix is committed to the tree.
4. The arch teams scramble to stabilize the version with the fix.
5. The announcement is sent out.
As long as you follow a semi-regular update cycle, you shouldn't have to
do anything special, even if you run a stable system. The affected
package will be recompiled automatically as part of the updates. Any
packages *depending on* that package (like, if they're statically linked
to it) will also be recompiled. No need to recompile @world.
[0] https://www.gentoo.org/get-involved/mailing-lists/