not able to install FR 3.0.16+git in (pure) Debian 9

Martin Pauly pauly at hrz.uni-marburg.de
Thu Sep 7 10:22:50 CEST 2017


Hi,

just got around now to see this:

>> If you would not mind, I would also propose striking out the HeartBleed
>> check from debian/rules in 3.0.x, to be able to install it on Debian 9.
>> Otherwise, the dependencies are not satisfied, and Debian 9 refuses to
>> install the packages.
>> [...]
>> -# Add dependency on distribution specific version of openssl that fixes
>> Heartbleed (CVE-2014-0160).
>> 
>> -ifeq ($(shell dpkg-vendor --derives-from Ubuntu && echo yes),yes)
>> 
>> -       SUBSTVARS = -Vdist:Depends="libssl1.0.0 (>= 1.0.1f-1ubuntu2)"
>> 
>> -else
>> 
>> -       SUBSTVARS = -Vdist:Depends="libssl1.0.0 (>= 1.0.1e-2+deb7u5)"
>> 
>> -endif

>   That can't happen, sorry.  The server must be secure, even if the underlying OS uses vulnerable versions of OpenSSL.

This is a non-issue, right? At least with Debian stable, the security team ususally fixes such vulnerabilities inside
the code of an existing version and afterwards distributes the fixed source and binary with a specific sub-versioning
(Ubuntu much the same, AFAIK). So this is what the above checks address in the most accurate way.
E.g. with Debian 8 (Jessie) you have openssl 1.0.1t-1+deb8u6 which is way more modern than the version required by rules.

BTW, they also have done exactly this quite recently to FR3.0.12,
citing their Announcement:

----------- From Debian Security Announcements 2017-08-11 -----------------------
All those issues are covered by this single DSA, but it's worth noting
that not all issues affect all releases:

   - CVE-2017-10978 and CVE-2017-10983 affect both jessie and stretch

   - CVE-2017-10979, CVE-2017-10980, CVE-2017-10981 and CVE-2017-10982
     affect only jessie

   - CVE-2017-10984, CVE-2017-10985, CVE-2017-10986 and CVE-2017-10987
     affect only stretch.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.2.5+dfsg-0.2+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 3.0.12+dfsg-5+deb9u1.
----------------------------------------------------------------------------------

So they still distribute 3.0.12, but with everything fixed.

This way of incorporating security-related bug fixes into source
is interesting in a number of ways:
- Sometimes it's simpler: For the TLS-Cache issue with 3.0.12, they simply changed
   the default config by removing the entire cache {} section from the eap config file.
   --> quick, simple, and non-disruptive (could only hamper performance in special cases)
- For the fuzzing issues found in 3.0.14, they incorporated the fixes into their 3.0.12
   source tree -- but it took them 11 days in this case. This includes extensive tests, though.
   So once the update is there, you can install it almost blindly.
- Not everyone likes his sources changed "silently". This had lead to Mozilla forcing Debian
   to rename their security-patched version of Firefox to Iceweasel and Thunderbird to Icedove.
   cf. https://lwn.net/Articles/676799/ (this is about how the dispute was finally resolved)

Cheers, Martin

-- 
   Dr. Martin Pauly     Phone:  +49-6421-28-23527
   HRZ Univ. Marburg    Fax:    +49-6421-28-26994
   Hans-Meerwein-Str.   E-Mail: pauly at HRZ.Uni-Marburg.DE
   D-35032 Marburg

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5393 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20170907/bbe381d4/attachment.bin>


More information about the Freeradius-Users mailing list