Paul Jodlowski wrote:
>Currently OpenSSH is at 6.4p1, I have been asked by our
>Network Security Team to upgrade to OpenSSH 7.4.

That's an "amusing" recommendation from your Network Security Team. Unless
security patches have been backported and applied to a particular
distribution of OpenSSH, OpenSSH 7.4p1 has at least three known security
vulnerabilities that I see: CVE-2018-15919, CVE-2018-15473, and
CVE-2017-15906.

So is your Network Security Team running around and getting lots of other
systems "updated" to an insecure release of OpenSSH (7.4), if those other
systems don't have backported security patches? Probably. Ooops.

I think you'll need to educate your colleagues (politely, diplomatically)
on how security patching and backporting works. It's great they're checking
-- too few organizations do even that -- but they're not checking well, and
their advice is not helpful.

As a general or at least widespread practice, and for decades now, software
version and release numbers often refer to *functional* levels. In Db2 for
z/OS, for example, this concept is now explicitly labeled "Function Level"
just to remove ambiguity, e.g. "Function Level 502." In contrast, security
updates and patches typically flow through the service stream, using
PTF/APAR numbers (as in z/OS), fixpack or service pack indicators (e.g.
"SP8"), date codes (e.g. "20190204"), or some other indicator that isn't
part of the major version and release level. That's what your security
teams should regularly check for, and that's how they should express their
recommendations if they spot something missing.

z/OS OpenSSH is a fully IBM supported component of z/OS. As long as you're
on a supported release of z/OS, then backported patches for security and
defects -- and sometimes functional improvements -- are available to you as
part of the service stream and should be promptly applied per your
preventive maintenance plan. (You should have such a plan.) As others have
mentioned, you should subscribe to the IBM Z Security Portal, and you
should also closely monitor at least the fixes marked HIPER.

Just to drive home this point, this practice isn't peculiar to mainframes
or even to servers. For instance, if you have a desktop or laptop PC
running Microsoft Windows, you can be running any of several functional
versions/levels of Windows that are all still Microsoft supported, with
security patches available for all those supported function levels. Just
looking at Windows 10, here are the versions that are still receiving
security updates from Microsoft (as I write this, and without any special
support contracts):

Windows 10, version 1703 (Enterprise and Education editions only)
Windows 10, version 1709 (Enterprise and Education editions only)
Windows 10, version 1803
Windows 10, version 1809

Yes, that's four versions of the Windows 10 product alone, in multiple
editions, that Microsoft is supplying with security patches through their
regular (non-extended) service streams. But if you have some security team
say, "You should install Windows 10, version 1803," that's bad advice as
such. Version 1803 as it originally shipped has several known security
defects. No, they need to check for specific security patches and, when
they find something missing, provide actionable advice on which specific
patches to apply. For Microsoft's products, patch identifiers start with
the letters "KB" followed by a sequence of digits. So the correct advice
would be something like this:

"According to our latest check, System XYZ123 is missing Microsoft security
patches KB012345, KB012346, and KB987653. Our preventive maintenance plan
for Windows desktops and laptops requires applying all security patches
within 45 days unless the operations team has granted a temporary waiver
for good cause, and subject to special conditions and limitations. Please
apply these missing security patches, and any others, right away. We will
check again within the next few days to verify that the patches have been
successfully applied."

Bonus points are awarded if your security teams also check for End of
Service dates (to keep on eye on whether you and others are getting too
close to the end of security patch availability), review preventive
maintenance plans, and make sure those plans are being followed well.
Example:

"Also, after you apply these patches, we recommend that you upgrade from
Windows 10, version 1709, to the latest version of Windows within the next
90 days. Version 1709 will reach End of Support soon and will no longer be
able to comply with our preventive maintenance plan."

Unfortunately you might have to tell your security team how to do their
jobs competently. Be gentle. :-)

--------------------------------------------------------------------------------------------------------
Timothy Sipples
IT Architect Executive, Industry Solutions, IBM Z & LinuxONE
E-Mail: sipp...@sg.ibm.com

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to