DaemonForums  

Go Back   DaemonForums > OpenBSD > OpenBSD Security

OpenBSD Security Functionally paranoid!

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 15th November 2014
hitest's Avatar
hitest hitest is offline
Real Name: George Nielsen
VPN Cryptographer
 
Join Date: Sep 2008
Location: B.C., Canada
Posts: 374
Question Eratta and M:Tier

I generally like to follow the official errata with OpenBSD. However, lately I have become a huge fan of openup, the M:Tier utility.
Does the official errata address all or most of the security patches with OpenBSD? Does M:Tier pick up patches missed by the official errata? Can you use both the errata and openup to patch your OpenBSD 5.6 system? I realize this may be a foolish question.
Thank you for any and all replies.
__________________
hitest
Reply With Quote
  #2   (View Single Post)  
Old 15th November 2014
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,983
Default

For the convenience of the user community, M:Tier provides binary builds of -stable, the patch branch of OpenBSD. The OpenBSD Project does not have the resources to do so.

As described in OpenBSD FAQ 5.1, -stable includes published errata and may also include patches by the Project that are not in the errata. If so these are either less critical or have a narrow use case.

In addition to OpenBSD itself, the ports tree may also have patches tagged as -stable. As with the OS, these are patches for stability or security for ports which do not require library changes. See OpenBSD FAQ 15.3.10.

Last edited by jggimi; 15th November 2014 at 11:49 PM. Reason: typo, and clarity
Reply With Quote
  #3   (View Single Post)  
Old 15th November 2014
hitest's Avatar
hitest hitest is offline
Real Name: George Nielsen
VPN Cryptographer
 
Join Date: Sep 2008
Location: B.C., Canada
Posts: 374
Default

jggimi,

Thank you for the detailed, thorough explanation. I appreciate that a lot.
__________________
hitest
Reply With Quote
  #4   (View Single Post)  
Old 17th November 2014
blackhole's Avatar
blackhole blackhole is offline
Spam Deminer
 
Join Date: Mar 2014
Posts: 320
Default

Generally the errata is for those who want to stick with -RELEASE and just apply the security patches (someone please feel free to correct me here), whereas syncing your sources to -STABLE (with CVS) and rebuilding the base system is for those who actually want to follow -STABLE (probably ports tree included). So presumably if M tier provides binary builds of stable (no idea), then the same applies - and you would probably not want to combine it with patches on the errata page.
Reply With Quote
  #5   (View Single Post)  
Old 20th November 2014
hitest's Avatar
hitest hitest is offline
Real Name: George Nielsen
VPN Cryptographer
 
Join Date: Sep 2008
Location: B.C., Canada
Posts: 374
Default

Thanks for the reply, cynwulf. I'm using the install56 ISO from the openbsd mirrors to install OpenBSD 5.6. Can someone tell me if it is acceptable to use both the errata and openup on an OpenBSD 5.6 install? I'm not sure if I'm reading these replies correctly. Perhaps I'm mixing up what stable and release means. Sorry for the extra noise in this channel.
Thanks for any and all replies.
__________________
hitest
Reply With Quote
  #6   (View Single Post)  
Old 20th November 2014
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,983
Default

I hope this helps clarify.
  • Patches against -release, if they have significant impact for a large number of users, will be published in errata.
  • Patches can be made against -release which do not qualify for publishing as errata.
Both types of patches are added to -stable. Sometimes, there are no minor -stable patches committed, and in that case -release+errata is equivalent to -stable.

Run -release+errata, or run -stable. The choice is yours.

Some people may require a -stable patch that was not published as errata, so they must run it. Others may find maintaining -stable is easier than manually building modules affected by errata, whether building -stable themselves, or using the M:Tier provided kernels and filesets.
Reply With Quote
  #7   (View Single Post)  
Old 21st November 2014
hitest's Avatar
hitest hitest is offline
Real Name: George Nielsen
VPN Cryptographer
 
Join Date: Sep 2008
Location: B.C., Canada
Posts: 374
Default

Thanks so much for the reply, jggimi. I appreciate your assistance!
__________________
hitest
Reply With Quote
  #8   (View Single Post)  
Old 26th November 2014
gso gso is offline
Port Guard
 
Join Date: Nov 2014
Posts: 35
Default

Would I be correct in thinking that it would be a mistake to connect one's freshly installed 5.6 release directly to the Internet then executing openup (with certificate in place)?
Reply With Quote
  #9   (View Single Post)  
Old 26th November 2014
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,983
Default

Quote:
Originally Posted by gso View Post
Would I be correct in thinking that it would be a mistake to connect one's freshly installed 5.6 release directly to the Internet ...?
Let's look at the published errata: 9 patches to date, 7 for reliability, 2 for security.
  • 003: SECURITY FIX: October 1, 2014 All architectures
    nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual host confusion attacks in some configurations. This issue was assigned CVE-2014-3616.
Are you operating an nginx(8) web server on that freshly installed 5.6-release system? Probably not, even if you intend to provision one, as your use case is a freshly installed 5.6-release.
  • 005: SECURITY FIX: October 20, 2014 All architectures
    This patch disables the SSLv3 protocol by default. Applications depending on SSLv3 may need to be recompiled with
    SSL_CTX_clear_option(ctx, SSL_OP_NO_SSLv3); but we recommend against the continued use of this obsolete protocol.
Will you connect your system to a server that requires you to use this obsolete (and insecure) protocol? Before you update? Probably not. Your use case is a freshly installed 5.6-release.


Reply With Quote
Old 26th November 2014
gso gso is offline
Port Guard
 
Join Date: Nov 2014
Posts: 35
Default

How would I configure named (or unbound which I think is now in base) to resolve mtier.org?

Last edited by gso; 26th November 2014 at 09:10 PM.
Reply With Quote
Old 26th November 2014
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,983
Default

Do you need to operate your own nameserver? Looking at this same use case --- your first installation of a new system, you need only point your resolver at your ISP's nameserver.

If you are using DHCP for dynamic IP address configuration, the DHCP server would provide your system with the IP address(es) of your nameserver(s) at connection time. On OpenBSD, the resolver is configured by the dhclient(8) program, which is either run manually by the admin -- you, now -- or run at boot time by specifying "dhcp" in the applicable hostname.if(5) file. The program does this by altering your resolv.conf(5) file when it receives its assigned IP address and any nameserver IP address(es) from the DHCP server it contacts.

If you assign static IP addresses, you would edit /etc/resolv.conf manually, or you would let the installation script edit the file on your behalf by providing a nameserver IP address during installation.

Last edited by jggimi; 26th November 2014 at 09:15 PM. Reason: typos
Reply With Quote
Old 27th November 2014
gso gso is offline
Port Guard
 
Join Date: Nov 2014
Posts: 35
Default

I wouldn't normally consider unencrypted DNS, however the issue I was experiencing seems to have been resolved with the dhclient.conf supercede modifier and dhcp DNS option to overide the DHCP provided DNS with an alternative server (advertising enhanced security as a feature in this instance). Why this should make all the difference I'm not sure. Maybe the DNS should not be left to ISP defaults?

With this, M:Tier (provisionally at least) seems to have done the job fine. The only point I would note is that if not prior copied into /etc/signify the mtier public key is downloaded with ftp - the $FETCH var. at the top of the openup script though can be used to change the download method.

Security hardened and socksified firefox-esr seems to be holding out also.

Last edited by gso; 27th November 2014 at 02:37 PM.
Reply With Quote
Old 27th November 2014
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,983
Default

Quote:
Originally Posted by gso View Post
Security hardened ... firefox....
There are OpenBSD users who would say that is an oxymoron. There is an active thread on the misc@ mailing list where a user is attempting to isolate FF with various methods. Other users have chimed in to try to help.

http://marc.info/?t=141616714600001&r=1&w=2
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
M:tier Updates - Positive Experience shep OpenBSD General 1 16th March 2014 03:13 PM
M:Tier ssl certificate shep OpenBSD Installation and Upgrading 5 12th November 2013 06:36 PM
Current Packages in 2nd Tier US mirrors shep OpenBSD Installation and Upgrading 0 4th April 2012 02:00 PM


All times are GMT. The time now is 03:28 PM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick