From owner-freebsd-security Fri Dec 15 16:28:30 2000 From owner-freebsd-security@FreeBSD.ORG Fri Dec 15 16:28:28 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from s1-c2.cnmnetwork.com (s1-c2.cnmnetwork.com [209.163.64.71]) by hub.freebsd.org (Postfix) with SMTP id 519FB37B400 for ; Fri, 15 Dec 2000 16:28:28 -0800 (PST) Received: (qmail 23159 invoked from network); 15 Dec 2000 16:27:04 -0800 Received: from prometheus.cnmnetwork.com (HELO compton) (irc@209.79.28.5) by s1-c2.cnmnetwork.com with SMTP; 15 Dec 2000 16:27:04 -0800 Date: Fri, 15 Dec 2000 16:41:31 -0800 (PST) From: jrz Reply-To: jrz Subject: Re: Security Update Tool.. To: security@freebsd.org MIME-Version: 1.0 Content-Type: TEXT/plain; charset=us-ascii Content-MD5: lKuS6XRrvG1dpZ0H/EDzPQ== X-Mailer: dtmail 1.3.0 @(#)CDE Version 1.4 SunOS 5.8 i86pc i386 Message-Id: <20001216002828.519FB37B400@hub.freebsd.org> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >> My question is, is there a util yet that in theory (maybe if so, or if >> someone writes one would work differently than what I'm imagining) queries a >> central database with all the security advisories, checks the local system >> for comparisons and vulnerabilities against that database and reports to the >> user who ran the util. >> >> ie, sacheck -H sa-host.freebsd.org would be fairly easy to write a shell or perl script that checks for current advisories and prints it out in pretty format. -jrz --- Jacob Zehnder | Systems Engineer CNM Network | http://www.cnmnetwork.com business: jrz@cnmnetwork.com other: jrz@rackmount.org --- "Where am I, and what am I doing in this handbasket?" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message