diff options
author | sevan <sevan@pkgsrc.org> | 2017-01-09 07:01:33 +0000 |
---|---|---|
committer | sevan <sevan@pkgsrc.org> | 2017-01-09 07:01:33 +0000 |
commit | ac29015c97eaf745628eac41ed68bd82a0117f00 (patch) | |
tree | a9e8327f6b4ef0023153dcc6b0e58a65e21f2af0 /pkgtools/pkg_install | |
parent | e21612adb084e289ec0b9e9f2bd569b54df9add9 (diff) | |
download | pkgsrc-ac29015c97eaf745628eac41ed68bd82a0117f00.tar.gz |
Update message to match the "Checking for security vulnerabilities in installed packages"
section in the pkgsrc guide.
Diffstat (limited to 'pkgtools/pkg_install')
-rw-r--r-- | pkgtools/pkg_install/MESSAGE | 44 |
1 files changed, 21 insertions, 23 deletions
diff --git a/pkgtools/pkg_install/MESSAGE b/pkgtools/pkg_install/MESSAGE index 1a0ba782180..8ec7361f0a3 100644 --- a/pkgtools/pkg_install/MESSAGE +++ b/pkgtools/pkg_install/MESSAGE @@ -1,30 +1,28 @@ =========================================================================== -$NetBSD: MESSAGE,v 1.6 2014/12/05 14:31:07 schmonz Exp $ +$NetBSD: MESSAGE,v 1.7 2017/01/09 07:01:33 sevan Exp $ -You may wish to have the vulnerabilities file downloaded daily so that -it remains current. This may be done by adding an appropriate entry -to a user's crontab(5) entry. For example the entry +You may wish to have the vulnerabilities file downloaded daily so that it +remains current. This may be done by adding an appropriate entry to the root +users crontab(5) entry. For example the entry -# download vulnerabilities file +# Download vulnerabilities file 0 3 * * * ${PREFIX}/sbin/pkg_admin fetch-pkg-vulnerabilities >/dev/null 2>&1 - -will update the vulnerability list every day at 3AM. You may wish to do -this more often than once a day. - -In addition, you may wish to run the package audit from the daily -security script. This may be accomplished by adding the following -lines to /etc/security.local - -if [ -x ${PREFIX}/sbin/pkg_admin ]; then - ${PREFIX}/sbin/pkg_admin audit -fi - -Alternatively this can also be acomplished by adding an entry to a user's -crontab(5) file. e.g.: - -# run audit-packages -0 3 * * * ${PREFIX}/sbin/pkg_admin audit - +# Audit the installed packages and email results to root +9 3 * * * ${PREFIX}/sbin/pkg_admin audit |mail -s "Installed package audit result" \ + root >/dev/null 2>&1 + +will update the vulnerability list every day at 3AM, followed by an audit at +3:09AM. The result of the audit are then emailed to root. On NetBSD this may be +accomplished instead by adding the following line to /etc/daily.conf: + +fetch_pkg_vulnerabilities=YES + +to fetch the vulnerability list from the daily security script. The system is +set to audit the packages by default but can be set explicitly, if desired (not +required), by adding the follwing line to /etc/security.conf: + +check_pkg_vulnerabilities=YES + Both pkg_admin subcommands can be run as as an unprivileged user, as long as the user chosen has permission to read the pkgdb and to write the pkg-vulnerabilities to ${PKGVULNDIR}. |