313 lines
12 KiB
Text
313 lines
12 KiB
Text
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" [
|
||
<!ENTITY base CDATA "..">
|
||
<!ENTITY date "$FreeBSD: www/en/security/security.sgml,v 1.161 2004/06/07 17:25:52 des Exp $">
|
||
<!ENTITY title "FreeBSD Security Information">
|
||
<!ENTITY % includes SYSTEM "../includes.sgml"> %includes;
|
||
<!ENTITY advisories.html.inc SYSTEM "advisories.html.inc">
|
||
]>
|
||
<!-- $FreeBSD: www/en/security/security.sgml,v 1.161 2004/06/07 17:25:52 des Exp $ -->
|
||
|
||
<html>
|
||
&header;
|
||
|
||
<H2>Introduction</H2>
|
||
|
||
<P>This web page is designed to assist both new and experienced users
|
||
in the area of FreeBSD security. FreeBSD
|
||
takes security very seriously and is constantly working
|
||
on making the OS as secure as possible.</P>
|
||
|
||
<P>Here you will find additional information, or links to information,
|
||
on how to protect your system against various types of attack,
|
||
on whom to contact if you find a security-related bug, and so on. There is
|
||
also a section on the various ways that the systems programmer can
|
||
become more security conscious so that he is less likely to
|
||
introduce vulnerabilities.</P>
|
||
|
||
<H2>Table of Contents</H2>
|
||
<UL>
|
||
<li><a href="#how">How and Where to report a FreeBSD security issue</a></li>
|
||
<LI><A HREF="#sec">Information about the FreeBSD Security Officer</A></LI>
|
||
<li><a href="charter.html">Charter for the Security Officer and Team</a></li>
|
||
<LI><A HREF="#pol">Information handling policies</A></LI>
|
||
<LI><A HREF="#adv">FreeBSD Security Advisories</A></LI>
|
||
<li><a href="http://www.freebsd.org/handbook/security-advisories.html">
|
||
Reading FreeBSD Security Advisories</a></li>
|
||
</UL>
|
||
|
||
<a name="how"></a>
|
||
<p>All FreeBSD Security issues should be reported directly to the
|
||
<a href="mailto:security@FreeBSD.org">Security Officer Team</a>
|
||
personally or otherwise to the <a href="mailto:security-officer@FreeBSD.org">
|
||
Security Officer</a>. All reports should at least contain:<br><br>
|
||
A description of the vulnerability;<br>
|
||
What versions of FreeBSD seem to be affected if possible;<br>
|
||
Any plausible workaround;<br>
|
||
And example code if possible.<br></p>
|
||
|
||
<p>After this information has been reported the Security Officer
|
||
or a Security Team delegate will get back with you.</p>
|
||
|
||
<A NAME=sec></A>
|
||
<H2>The FreeBSD Security Officer and the Security Officer Team</H2>
|
||
|
||
<P>To better coordinate information exchange with others in the security
|
||
community, FreeBSD has a focal point for security-related communications:
|
||
the FreeBSD Security Officer.</P>
|
||
|
||
<P>If you need to contact the FreeBSD Project about
|
||
a possible security issue, you should therefore <A
|
||
HREF="mailto:security-officer@FreeBSD.org">send mail to the Security
|
||
Officer</A> with a description of what you have found and the type of
|
||
vulnerability it represents.</P>
|
||
|
||
<p>In order that the FreeBSD Project may respond to vulnerability
|
||
reports in a timely manner, there are four members of the Security
|
||
Officer mail alias: the Security Officer, the Deputy Security Officer,
|
||
and two Core Team members. Therefore, messages sent to the
|
||
<a
|
||
href="mailto:security-officer@FreeBSD.org"><security-officer@FreeBSD.org></a>
|
||
mail alias are currently delivered to:</p>
|
||
|
||
<table>
|
||
<tr valign="top">
|
||
<td>Jacques Vidrine <a
|
||
href="mailto:nectar@FreeBSD.org"><nectar@FreeBSD.org></a></td>
|
||
<td>Security Officer</td>
|
||
</tr>
|
||
<tr valign="top">
|
||
<td>Dag-Erling Sm<53>rgrav <a
|
||
href="mailto:des@FreeBSD.org"><des@FreeBSD.org></a></td>
|
||
<td>Deputy Security Officer</td>
|
||
</tr>
|
||
<tr valign="top">
|
||
<td>Robert Watson <a
|
||
href="mailto:rwatson@FreeBSD.org"><rwatson@FreeBSD.org></a></td>
|
||
<td>FreeBSD Core Team member, Release Engineering liaison,<br>
|
||
TrustedBSD Project liaison, system security architecture expert</td>
|
||
</tr>
|
||
<tr valign="top">
|
||
<td>Warner Losh <a
|
||
href="mailto:imp@FreeBSD.org"><imp@FreeBSD.org></a></td>
|
||
<td>FreeBSD Core Team liaison, Security Officer Emeritus</td>
|
||
</tr>
|
||
</table>
|
||
|
||
<p>The Security Officer is supported by the <a
|
||
href="mailto:security@FreeBSD.org">FreeBSD Security Team
|
||
<security@FreeBSD.org></a>, a small group of committers
|
||
vetted by the Security Officer.</p>
|
||
|
||
<p>Please use the <a
|
||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/public_key.asc">Security
|
||
Officer PGP key</a> to encrypt your messages to the Security Officer
|
||
when appropriate.</p>
|
||
|
||
<a NAME="pol"></a>
|
||
<h2>Information handling policies</h2>
|
||
|
||
<p>As a general policy, the FreeBSD Security Officer favors full
|
||
disclosure of vulnerability information after a reasonable delay to
|
||
permit safe analysis and correction of a vulnerability, as well as
|
||
appropriate testing of the correction, and appropriate coordination
|
||
with other affected parties.</p>
|
||
|
||
<p>The Security Officer <em>will</em> notify one or more of the
|
||
<a href="mailto:admins@FreeBSD.org">FreeBSD Cluster Admins</a> of
|
||
vulnerabilities that put the FreeBSD Project's resources under
|
||
immediate danger.</p>
|
||
|
||
<p>The Security Officer may bring additional FreeBSD developers
|
||
or outside developers into discussion of a submitted security
|
||
vulnerability if their expertise is required to fully understand or
|
||
correct the problem. Appropriate discretion will be exercised to
|
||
minimize unnecessary distribution of information about the submitted
|
||
vulnerability, and any experts brought in will act in accordance of
|
||
Security Officer policies. In the past, experts have been brought
|
||
in based on extensive experience with highly complex components of
|
||
the operating system, including FFS, the VM system, and the network
|
||
stack.</p>
|
||
|
||
<p>If a FreeBSD release process is underway, the FreeBSD Release
|
||
Engineer may also be notified that a vulnerability exists, and its
|
||
severity, so that informed decisions may be made regarding the release
|
||
cycle and any serious security bugs present in software associated
|
||
with an up-coming release. If requested, the Security Officer will
|
||
not share information regarding the nature of the vulnerability with
|
||
the Release Engineer, limiting information flow to existence and
|
||
severity.</p>
|
||
|
||
<p>The FreeBSD Security Officer has close working relationships
|
||
with a number of other organizations, including third-party vendors
|
||
that share code with FreeBSD (the OpenBSD and NetBSD projects,
|
||
Apple, and other vendors deriving software from FreeBSD, as well
|
||
as the Linux vendor security list), as well as organizations
|
||
that track vulnerabilities and security incidents, such as CERT.
|
||
Frequently vulnerabilities may extend beyond the scope of the
|
||
FreeBSD implementation, and (perhaps less frequently) may have
|
||
broad implications for the global networking community. Under such
|
||
circumstances, the Security Officer may wish to disclose vulnerability
|
||
information to these other organizations: if you do not wish the
|
||
Security Officer to do this, please indicate so explicitly in any
|
||
submissions.</p>
|
||
|
||
<p>Submitters should be careful to explicitly document any special
|
||
information handling requirements.</p>
|
||
|
||
<p>If the submitter of a vulnerability is interested in a coordinated
|
||
disclosure process with the submitter and/or other vendors, this
|
||
should be indicated explicitly in any submissions. In the absence
|
||
of explicit requests, the FreeBSD Security Officer will select a
|
||
disclosure schedule that reflects both a desire for timely disclosure
|
||
and appropriate testing of any solutions. Submitters should be aware
|
||
that if the vulnerability is being actively discussed in public forums
|
||
(such as bugtraq), and actively exploited, the Security Officer may
|
||
choose not to follow a proposed disclosure timeline in order to
|
||
provide maximum protection for the user community.</p>
|
||
|
||
<p>Submitters should be aware that the FreeBSD Project is an open
|
||
source project, and source revision control information for every
|
||
change made to the FreeBSD source tree is publicly accessible. If a
|
||
disclosure schedule is provided, it should take into account both the
|
||
official release of advisory, patch, and update information, as well
|
||
as initial inclusion of fixes in the FreeBSD source tree. There is
|
||
necessarily a lag between the inclusion of fixes in the tree and the
|
||
generation and releases of advisories, patches, and binary updates, as
|
||
the source control system is used to generate them.</p>
|
||
|
||
<p>Submissions may be protected using PGP. If desired, responses will
|
||
also be protected using PGP.</p>
|
||
|
||
<A NAME=adv></A>
|
||
<H2>FreeBSD Security Advisories</H2>
|
||
|
||
<P>The FreeBSD Security Officer provides security advisories for
|
||
several branches of FreeBSD development. These are the <EM>-STABLE
|
||
Branches</EM> and the <EM>Security Branches</EM>. (Advisories are not
|
||
issued for the <EM>-CURRENT Branch</EM>.)</P>
|
||
|
||
<UL>
|
||
|
||
<LI><P>There is usually only a single -STABLE branch, although
|
||
during the transition from one major development line to another
|
||
(such as from FreeBSD 4.x to 5.x), there is a time span in which
|
||
there are two -STABLE branches. The -STABLE branch tags have names
|
||
like <TT>RELENG_4</TT>. The corresponding builds have names like
|
||
<TT>FreeBSD 4.6-STABLE</TT>.</P></LI>
|
||
|
||
<LI><P>Each FreeBSD Release has an associated Security Branch.
|
||
The Security Branch tags have names like <TT>RELENG_4_6</TT>.
|
||
The corresponding builds have names like <TT>FreeBSD
|
||
4.6-RELEASE-p7</TT>.</P></LI>
|
||
|
||
</UL>
|
||
|
||
<P>Issues affecting the FreeBSD Ports Collection are covered
|
||
in <A HREF="http://vuxml.FreeBSD.org/">the FreeBSD VuXML
|
||
document</A>.</P>
|
||
|
||
<P>Each branch is supported by the Security Officer for a limited time
|
||
only, and is designated as one of `<EM>Early adopter</EM>',
|
||
`<EM>Normal</EM>', or `<EM>Extended</EM>'. The designation is used as a
|
||
guideline for determining the lifetime of the branch as follows.</P>
|
||
|
||
<DL>
|
||
<DT>Early adopter</DT>
|
||
<DD>Releases which are published from the -CURRENT branch will be
|
||
supported by the Security Officer for a minimum of 6 months after
|
||
the release.</DD>
|
||
<DT>Normal</DT>
|
||
<DD>Releases which are published from the -STABLE branch will be
|
||
supported by the Security Officer for a minimum of 12 months after the
|
||
release.</DD>
|
||
<DT>Extended</DT>
|
||
<DD>Selected releases will be supported by the Security Officer for a
|
||
minimum of 24 months after the release.</DD>
|
||
</DL>
|
||
|
||
<P>The current designation and estimated lifetimes of the currently
|
||
supported branches are given below. The <EM>Estimated EoL
|
||
(end-of-life)</EM> column gives the earliest date on which that branch
|
||
is likely to be dropped. Please note that these dates may be extended
|
||
into the future, but only extenuating circumstances would lead to a
|
||
branch's support being dropped earlier than the date listed.</P>
|
||
|
||
<TABLE BORDER="3" CELLSPACING="0" CELLPADDING="2">
|
||
<TR>
|
||
<TH>Branch</TH>
|
||
<TH>Release</TH>
|
||
<TH>Type</TH>
|
||
<TH>Estimated EoL</TH>
|
||
</TR>
|
||
<TR>
|
||
<TD>RELENG_4</TD>
|
||
<TD>n/a</TD>
|
||
<TD>n/a</TD>
|
||
<TD>March 31, 2005</TD>
|
||
</TR>
|
||
<TR>
|
||
<TD>RELENG_4_8</TD>
|
||
<TD>4.8-RELEASE</TD>
|
||
<TD>Extended</TD>
|
||
<TD>March 31, 2005</TD>
|
||
</TR>
|
||
<TR>
|
||
<TD>RELENG_5_2</TD>
|
||
<TD>5.2.1-RELEASE</TD>
|
||
<TD>Early adopter</TD>
|
||
<TD>December 31, 2004</TD>
|
||
</TR>
|
||
<TR>
|
||
<TD>RELENG_4_9</TD>
|
||
<TD>4.9-RELEASE</TD>
|
||
<TD>Normal</TD>
|
||
<TD>October 31, 2004</TD>
|
||
</TR>
|
||
<TR>
|
||
<TD>RELENG_4_10</TD>
|
||
<TD>4.10-RELEASE</TD>
|
||
<TD>Extended</TD>
|
||
<TD>May 31, 2006</TD>
|
||
</TR>
|
||
</TABLE>
|
||
|
||
<P>Older releases are not maintained and users are strongly encouraged
|
||
to upgrade to one of the supported releases mentioned above.</P>
|
||
|
||
<P>Like all development efforts, security fixes are first brought into
|
||
the <A HREF="../doc/en_US.ISO8859-1/books/handbook/cutting-edge.html#CURRENT">FreeBSD-current</A> branch.
|
||
After a couple of days and some testing, the fix is retrofitted into
|
||
the supported FreeBSD-stable branch(es) and an advisory is then sent
|
||
out.</P>
|
||
|
||
<P>Some statistics about advisories released during 2002:</P>
|
||
<UL>
|
||
<LI>44 advisories of varying severity were issued for the base system.</LI>
|
||
<LI>12 advisories described vulnerabilities found only in FreeBSD.
|
||
The remaining 32 were problems shared with at least one other OS
|
||
(often due to shared code).</LI>
|
||
<LI>6 security notices were issued, covering a total of 95 issues in
|
||
optional third party applications included in the Ports Collection.</LI>
|
||
</UL>
|
||
|
||
<P>Advisories are sent to the following FreeBSD mailing lists:</P>
|
||
<UL>
|
||
<LI>FreeBSD-security-notifications@FreeBSD.org</LI>
|
||
<LI>FreeBSD-security@FreeBSD.org</LI>
|
||
<LI>FreeBSD-announce@FreeBSD.org</LI>
|
||
</UL>
|
||
|
||
<P>Advisories are always signed using the FreeBSD Security Officer
|
||
<A HREF="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/public_key.asc"> PGP key
|
||
</A> and are archived, along with their associated patches, at our
|
||
<A HREF="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/index.html">FTP CERT
|
||
repository</A>. At the time of this writing, the following advisories are
|
||
currently available (note that this list may be a few days out of date -
|
||
for the very latest advisories please check the
|
||
<A HREF="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/">FTP site</A>):</P>
|
||
|
||
&advisories.html.inc;
|
||
|
||
&footer
|
||
</body>
|
||
</html>
|