Re: Compiled list (STIG for Debian)

2022-03-02 Thread Stephen Dowdy
On 3/2/22 10:54, Jeremiah C. Foster wrote: Cannot speak for it's provenance, but there's this; https://github.com/hardenedlinux/STIG-4-Debian Jeremiah, Thanks, that actually looks like more of an SRR (System Readiness Review[0]) evaluation checker for applicable STIGs. As it states, it uses

Re: Compiled list

2022-03-02 Thread Stephen Dowdy
On 3/2/22 07:43, Paul Tagliamonte wrote: STIGs are maintained by DISA, not by Debian   Paul On Wed, Mar 2, 2022 at 9:42 AM Stephanie Hall mailto:sh...@oteemo.com>> wrote: Good morning, Do you have an excel version of a STIG for Debian 9 & 10 that you would be willing to share?

Re: DSA-3708-1 mat -- security update (What are MAT users to do)?

2016-11-13 Thread Stephen Dowdy
So ExifTool alone may not be used to securely edit metadata in PDF files. that sounds like a "NO". :-( --stephen -- Stephen Dowdy - Systems Administrator - NCAR/RAL 303.497.2869 - sdo...@ucar.edu- http://www.ral.ucar.edu/~sdowdy/

Re: Security EOL within Debian Stable

2015-02-05 Thread Stephen Dowdy
On Wed, Feb 4, 2015 at 6:49 PM, Michael Gilbert wrote: > On Wed, Feb 4, 2015 at 8:09 PM, Stephen Dowdy wrote: >> So, if a user installs said package, but fails to notice any EOL DSA >> on it, the package gets left in place in a potentially VULNERABLE >> state. I.E. if a kn

Security EOL within Debian Stable

2015-02-04 Thread Stephen Dowdy
could apt-pin it. Similarly, a security-eol update could simply remove the executable bits from vulnerable applications, requiring end-user manual intervention. Still a shocker, but IMHO a better solution than leaving users vulnerable. Any comments, ideas, pointers to the reference that answers my qu

Re: are unattended updates a good idea?

2015-01-31 Thread Stephen Dowdy
> doing (blind) automatic security updates. > > Or are you maybe using something completly diffrent like puppet? > > Whats your practical experience with lots of servers? (i am not > interested in theoretical advises :-P ) > > Thanks a lot, > Mario > > > --

Re: Efficient way to keep track of security updates

2015-01-28 Thread Stephen Dowdy
libc6 2.13-38+deb7u6 2.13-38+deb7u7 libc6:i386 2.13-38+deb7u6 2.13-38+deb7u7 libc6-dev 2.13-38+deb7u6 2.13-38+deb7u7 libc6-i386 2.13-38+deb7u6 2.13-38+deb7u7 --stephen -- Stephen Dowdy - Systems Administrator - NCAR/RAL 303.497.2869 - sdo...@ucar.edu- http://www.ral.ucar.edu/~sdowdy/ apt-whatsup.sh Description: Bourne shell script

Q: Best Practices for 3rd party APT sources for security considerations?

2015-01-22 Thread Stephen Dowdy
6 0 990 URI-REDACTED wheezy/main amd64 Packages 100 /var/lib/dpkg/status 2.13-38+deb7u4 0 990 URI-REDACTED wheezy/updates/main amd64 Packages So, i don't have a 3rd party repo defined for libc6 (just site caching repos). But what is to stop 'dl

Re: FW: lists.debian.org has received bounces from you

2014-11-25 Thread Stephen Dowdy
> Subject: lists.debian.org has received bounces from you > > Dear subscriber, > > We've encountered some problems while sending listmail to your > emailaddress t...@steadfast.net. > ... > > -- Stephen Dowdy - Systems Administrator - NCAR/RAL 303.497.2869 - sdo...@ucar.edu- http://www.ral.ucar.edu/~sdowdy/

Re: [SECURITY] [DSA 2267-1] perl security update

2011-08-23 Thread Stephen Dowdy
o just what you currently have installed. Of course that only tells you packages that have metadata indicating that they depend on 'perl-modules', there could be other things that use it without notification. (then you're into running global finds looking for 'use' and &#x