- remove portaudit references, as it is no longer in the Ports Collection

Differential Revision:	https://reviews.freebsd.org/D1303
Approved by:	wblock (mentor)
This commit is contained in:
Jason Helfman 2015-03-27 18:55:30 +00:00
parent 78529d41f6
commit cb4141e875
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=46387
2 changed files with 39 additions and 57 deletions

View file

@ -197,15 +197,11 @@
&a.ports; and the &a.ports-bugs;.</para>
<warning>
<para>Before installing any application, check <uri
xlink:href="http://vuxml.freebsd.org/">http://vuxml.freebsd.org/</uri>
for security issues related to the application or install
<package>ports-mgmt/portaudit</package>. Once installed, type
<command>portaudit -F -a</command> to check all installed
applications for known vulnerabilities. When
<application>pkg</application> is being used the audit
functionality is built in. Execute <command>pkg audit
-F</command> to get a report on vulnerable packages.</para>
<para>Before installing any application, check <link
xlink:href="http://vuxml.freebsd.org/"></link>
for security issues related to the application or type
<command>pkg audit -F</command> to check all installed
applications for known vulnerabilities.</para>
</warning>
<para>The remainder of this chapter explains how to use packages
@ -1116,16 +1112,13 @@ Deinstalling ca_root_nss-3.15.1_1... done</screen>
Collection as described in the previous section. Since
the installation of any third-party software can introduce
security vulnerabilities, it is recommended to first check
<uri
xlink:href="http://vuxml.freebsd.org/">http://vuxml.freebsd.org/</uri>
<link xlink:href="http://vuxml.freebsd.org/"></link>
for known security issues related to the port. Alternately,
if <package>ports-mgmt/portaudit</package> is installed, run
<command>portaudit -F</command> before installing a new
run <command>pkg audit -F</command> before installing a new
port. This command can be configured to automatically
perform a security audit and an update of the vulnerability
database during the daily security system check. For more
information, refer to the manual page for
<application>portaudit</application> and
information, refer to &man.pkg-audit.8; and
&man.periodic.8;.</para>
</warning>

View file

@ -78,7 +78,7 @@
</listitem>
<listitem>
<para>How to use <application>portaudit</application> to audit
<para>How to use <application>pkg</application> to audit
third party software packages installed from the Ports
Collection.</para>
</listitem>
@ -3091,7 +3091,7 @@ drwxr-xr-x 2 robert robert 512 Nov 10 11:54 public_html</programlisting>
</sect2>
</sect1>
<sect1 xml:id="security-portaudit">
<sect1 xml:id="security-pkg">
<info>
<title>Monitoring Third Party Security Issues</title>
@ -3102,7 +3102,7 @@ drwxr-xr-x 2 robert robert 512 Nov 10 11:54 public_html</programlisting>
</info>
<indexterm>
<primary>portaudit</primary>
<primary>pkg</primary>
</indexterm>
<para>In recent years, the security world has made many
@ -3117,48 +3117,37 @@ drwxr-xr-x 2 robert robert 512 Nov 10 11:54 public_html</programlisting>
capability. There is a way to mitigate third party
vulnerabilities and warn administrators of known security
issues. A &os; add on utility known as
<application>portaudit</application> exists solely for this
purpose.</para>
<application>pkg</application> includes options explicitly for
this purpose.</para>
<para>The
<package>ports-mgmt/portaudit</package>
port polls a database, which is updated and maintained by the
&os; Security Team and ports developers, for known security
issues.</para>
<para><application>pkg</application> polls a database for security
issues. The database is updated and maintained by the &os; Security
Team and ports developers.</para>
<para>To install <application>portaudit</application> from the
Ports Collection:</para>
<para>Please refer to <link
xlink:href="&url.books.handbook;/pkgng-intro.html"></link> for
instructions on installing
<application>pkg</application>.</para>
<screen>&prompt.root; <userinput>cd /usr/ports/ports-mgmt/portaudit &amp;&amp; make install clean</userinput></screen>
<para>Installation provides &man.periodic.8; configuration files
for maintaining the <application>pkg</application> audit
database, and provides a programmatic method of keeping it
updated. This functionality is enabled if
<literal>daily_status_security_pkgaudit_enable</literal>
is set to <literal>YES</literal> in &man.periodic.conf.5;.
Ensure that daily security run emails, which are sent to
<systemitem class="username">root</systemitem>'s email account,
are being read.</para>
<para>During the installation, the configuration files for
&man.periodic.8; will be updated, permitting
<application>portaudit</application> output in the daily
security runs. Ensure that the daily security run emails, which
are sent to <systemitem class="username">root</systemitem>'s
email account, are being read. No other configuration is
required.</para>
<para>After installation, and to audit third party utilities as
part of the Ports Collection at any time, an administrator may
choose to update the database and view known vulnerabilities
of installed packages by invoking:</para>
<para>After installation, an administrator can update the
database and view known vulnerabilities in installed packages
by invoking the following command:</para>
<screen>&prompt.root; <userinput>pkg audit -F</userinput></screen>
<screen>&prompt.root; <userinput>portaudit -Fda</userinput></screen>
<note>
<para>The database is automatically updated during the
&man.periodic.8; run. The above command is optional and can
be used to manually update the database now.</para>
</note>
<para>To audit the third party utilities installed as part of
the Ports Collection at anytime, an administrator can run the
following command:</para>
<screen>&prompt.root; <userinput>portaudit -a</userinput></screen>
<para><application>portaudit</application> will display messages
for any installed vulnerable packages:</para>
<para><application>pkg</application> displays messages
any published vulnerabilities in installed packages:</para>
<programlisting>Affected package: cups-base-1.1.22.0_1
Type of problem: cups-base -- HPGL buffer overflow vulnerability.
@ -3174,9 +3163,9 @@ You are advised to update or deinstall the affected package(s) immediately.</pro
versions affected, by &os; port version, along with other web
sites which may contain security advisories.</para>
<para><application>portaudit</application> is a powerful utility
and is extremely useful when coupled with the
<application>portmaster</application> port.</para>
<para><application>pkg</application> is a powerful utility
and is extremely useful when coupled with
<package>ports-mgmt/portmaster</package>.</para>
</sect1>
<sect1 xml:id="security-advisories">