|Contents||Bulletin||Scripting in shell and Perl||Network troubleshooting||History||Humor|
|News||See also||Recommended books||Recommended Links||Solaris 10 patch log||Humor||Etc|
Applying patches have evolved into complex, time-consuming processes. Knowing what software updates and patches to use and when to apply them have become important cost saving measure. To minimize the cost, while maintaining a reasonable level of risk Sun provides Recommended Patch Clusters which is the most common patching solution for enterprize (so called "blind patching"). While this strategy does address patching issues and compliance issues, it also introduces more change to the system than is necessary. Therefore, for critical servers you might chose to apply patches only to address specific issues or needs and not apply patches merely to keep current. Without understanding whether those patches provide and what production or security problems they fix, the jury is out amount the benefits of "blind patching" for critical servers. But the fashion now is to patch everything and this trend accelerated with SOX.
Solaris Recommended Patch Clusters do not upgrade Solaris to the next minor revision, for example from 04/04 to 04/08, you stay on the same revision as you was.
The most common commands for managing patches are:
install_cluster - install cluster patches by using the command. This is command used for installing Recommended Cluster, the most common patching method in Solaris. You can also manage patches through the Solaris™ Management Console, but command line is simpler.
showrev -p -- List patches
patchadd – Installs uncompressed patches
patchrm – Removes patches installed
/var/sadm/pkg directory is used to save the base packages
/var/sadm/patch contains the list of installed patched. The date of the creation of a directory for a particular patch is actually the date of patch installation.
SunSolve is the mail
location to get patches. Recommended patch cluster can be downloaded via
ftp and HTTP from a browser. HTTP
might be helpful if you have a firewall. You should use
install_cluster for the installation of the Recommended
Installing individual patches is a more tedious and time-consuming task. Each patch must be downloaded, placed on each server, uncompressed, untarred, installed, and removed.
The recommended patch cluster is a zip file with the OS version as a prefix, for example for Solaris 9 it will be 9_Recommended.zip.
Before installing any patches, you need to verify if the
/var filesystem has sufficient space. A
recommended patch cluster may need up to 0.5G. The availability of free space can be checked by executing
/var. It might make sense to remove extra log from this filesystem to free more space.
Generally you need to download Recommended Patch Cluster into partition that has a lot of space, for example /home or /opt -- it is a bad idea to download it to the /tmp partition, as it is mapped to the memory or root partition as it is often (and should be) pretty tiny (less then 1G). There are perverts that allocate to root partition several gigabytes, but generally it is a stupid idea. Moreover I would recommend to convert root home directory to /root as it is done in Red Hat, but that's another story (see hardening for details)
To determine the current set of patches installed, you can use the command:
showrev -p | more.
The resulting long long listing shows each patch and its revision level. To find if a particular patch installed use grep for example:
showrev -p | grep 116268
Each patch is also identified with a revision number separated by a dash from the patch number. It is only necessary
to install the most current revision.
116268-05 would indicate a patch revision of 05, and all patches with
the revision lower than 05 would be considered obsolete. The patch number typically does not change, however the revision
number changes with every new release. This makes it easy to identify new releases.
The kernel patch level can be verified by typing uname -a. This command shows the current OS release and the current kernel patch installed. The command can be executed by any user and does not require root privileges.
Determining the completeness of patching the kernel revision status on dozens of servers is a time-consuming process. You can split audit into two parts: data collection and report generation. Data collection can be made into a monthly cron job.
Using the SunSolve Web site one can try to describe a problem and locate patches that might solve it, or at least list current bug reports about the problem. Once you have a list of possible patches, use the showrev -p command to see which patches are currently installed on the system and remedy any differences. As always, be sure you have a working backup of your system before making major changes (such as installing patches). Note that, rarely, patches that are installed do not appear in the showrev -p list. These are patches which include only firmware, and make no system code changes. Because there are no software changes, they are not recorded as an installed patch. The Web site can send a notification when any document of interest changes.
Another means of gaining patch information is to join Sun's mailing lists.
Now let's look at the individual tools.
PatchDiag uses information from uname, pkginfo, and showrev -p to determine the software and patches installed on your system. It then uses a patch cross-reference (patchdiag.xref) to compare the recommended patch level for each package with the current status. The result is a report that lists up-to-date patches, patches that are out-of-date, and needed, recommended, security, and Y2K patches. You can then use this list as a basis for patch installations.
The program also allows command-line arguments which direct it to pkginfo and showrev output stored in files. In this way, PatchDiag can work on state information saved on other hosts. You could collect package and patch information from all Solaris machines, run PatchDiag against each set of information, and have a report listing the patches needed on each host.
When downloading, it also checks the patch against the CHECKSUMS file from SunSolve, assuming that you have access to this file via contract support. If desired, it will reboot the machine after it is through. It provides many different ways to get the files, from a common NFS directory to local directory access. It will take a list of patches to be installed from the source directory and skip the others, or it will let you specify patches to install on the command line. Finally, it will take compressed patches from one directory and uncompress them in another, just in case you have read-only NFS. PatchReport is written in Perl and does require a few extra Perl libraries. If this column has convinced you to revamp your patch practices, PatchReport could be just to tool to make your patch duties more manageable.
One lesson system administrators learn the hard way is to make a Sun Service call, no matter what. For instance, a search of SunSolve may reveal that a patch exists that looks like an exact remedy to a problem. Great, but a quick (and it usually is quick) call to 1-800-USA-4-SUN can sometimes reveal that the problem is a hardware issue, or that there's a procedure that needs to be followed that isn't indicated in the patch README. The folks at technical support have more information available than you'll find on SunSolve. Use them whenever you have any doubts. Also, be sure to review any README or postscript (ps) files that come with the patches. They often contain crucial information!
One thing to look out for with firmware patches (PROM patches in particular) is that some don't like having a serial-port-attached terminal for a console. I just installed such a patch, and it took quite some time before this was discovered. Make sure you read the postscript files before you install patches, because the README files don't have this information. A little FYI from a slightly burnt admin.
Some patches replace binaries wholesale, and most recommended and suggested clusters include updates to Sendmail and BIND. Many people are using later versions of Sendmail and Bind then supplied by Sun. When you apply the recommended patch cluster, these binaries are overwritten. I usually edit the patch list to not patch Sendmail and/or BIND. This is important because otherwise one can spend a lot of time trying to troubleshoot mail and/or DNS. Be sure to save such binaries before patching and restore afterward, or edit the patch list, or both, to avoid this problem.
|Bulletin||Latest||Past week||Past month||
About: Patch Check Advanced (pca) generates lists of installed and missing patches for Sun Solaris systems and optionally downloads patches. It resolves dependencies between patches and installs them in the correct order. It works on all versions of Solaris and on both SPARC and x86.
Changes: Checks for patches that are only partly installed have been added. A bug with missing patches with multiple versions of the same package has been fixed. Failed patch installs are logged to syslog. Minage option being one day off has been fixed. Certificates for HTTPS downloads from SunSolve and PCA home have been added. The code was simplified in several places. Patch handling has been added for several new patches.
Get information about how Sun Connection can help you to deploy, manage, and track software updates on your systems that use the Solaris OS or Linux OS.
Sun Connection offers three options for managing your systems:
- Enterprise: A networked service enabling patch, dependency and compliance management for thousands of heterogeneous systems in distributed data centers. The enterprise edition requires a subscription purchase.
- Hosted: Sun-hosted service for remote management of updates on multiple systems. The hosted edition is available to you with a Sun Service Plan.
- System: Client-side software, for reliable, timely updating on a single system. The system edition is free with registration.
For information about the features and value offered by each product, go to http://www.sun.com/service/sunupdate/.
This community web site is the place to share and view tips and tricks from other sys admins who are using Sun Connection. To see contributions from the community, or to submit content, click Participate.
Would you like to use Sun Update Connection System and the Sun Update Connection Proxy to manage your systems against fixed "baseline" patch sets representing a point in time, using a local source of patches? Although Sun's tools don't directly support this, it can be done. The following write-up explains how.
Sun Update Connection uses a patch set file that it retrieves from its patch source, either directly from Sun's patch server or indirectly through a Sun Update Connection Proxy (also known as a local patch server or LPS). The default patch set,
current.zip, contains all of the currently available patches for that day. The
current.zipfile is cached locally on the LPS and returned when a local Sun Update Connection client requests the file during a patch analysis operation.
current.zipfile is produced once a day and contains all of the current patches. If you copy today's
currentYYMMDD.zipyou can later refer to that as the baseline for that day. For example, to create a baseline for November 10, 2006, copy the
current.zipfile produced on November 10, 2006 to
Perform these tasks to configure a proxy server for your environment and establish a patch baseline:
- Install the Sun Update Connection Proxy Software
- Configure the Sun Update Connection Proxy
- Establish a Fixed Patch Baseline
Install the Sun Update Connection Proxy Software
The system that you designate to be your local patch server must be using the Solaris 10 Operating System (Solaris OS).
- Install the current Sun Update Connection client on the Solaris 10 system that will be used as the local patch server. Note that the Solaris 10 1/06 and later releases include the client software; however, it's always a good idea to include the latest revision as fixes to the client might affect your performance.
- Register the system with a service plan so your patch server will have access to all patches, including the Sun Update Connection Proxy patch.
- Install the Sun Update Connection Proxy patch.
Configure the Sun Update Connection Proxy
The server can be configured in either connected or standalone mode. If the server is configured in connected mode, it will send requests to Sun to get patches and patch metadata that are not in its local cache. The requests can be sent to Sun through an intervening server. If a server is configured in standalone mode, it does not have any connections to Sun and is limited to the data that is available in its local repository. Once your proxy is configured, point your clients to the proxy server.
- Sun Update Connection Proxy Setup - Connected Server
- Sun Update Connection Proxy Setup - Standalone Server
- Sun Update Connection Proxy Setup - Client
Sun Update Connection Proxy Setup - Connected Server
The Sun Update Connection Proxy is configured in connected mode when its patch source URL is Sun's server.
- Set the server's network proxy, if needed:patchsvr setup -x network-proxy-name:port
- Set the server's patch source:patchsvr setup -p https://getupdates1.sun.com/solaris/
Note: This is the default setting.
Sun Update Connection Proxy Setup - Standalone Server
The Sun Update Connection Proxy is configured in standalone mode when its patch source is on the local system, typically a directory full of patches or a CD-ROM. Set the server's patch source:patchsvr setup -p file:/patchsvr
In this example, there must be a
/patchsvrdirectory on the host, and you must populate that directory as discussed below.
Sun Update Connection Proxy Setup - Client
Set clients to use the proxy server as their patch source (on each client):smpatch set patchpro.patch.source=http://server-name:3816/solaris/
Note: Don't omit the trailing "/".
Congratulations, you now have a local patch server. If you're running in connected mode there is really nothing more you need to do but get to work. If you are running in standalone mode you need to plan how you will populate and manage the local repository.
If you are running in standalone mode you must manually populate your server's repository with patches and patch metadata files. The format of the local repository is as follows. If the patch source URL is
file:/patchsvr, under the
/patchsvrdirectory you will need to create the following directories:
- Patches - Put patches here; signed patches in
- Database - Put thecurrent.zipfile in this directory
- Category - Default
- Collection - Default
- Misc - Put
patchdb.zipfor legacy Patch Manager clients in this directory
The most straightforward way of populating a standalone patch server is to alternate between connected and disconnected modes. When connected, the Proxy can retrieve the current patch metadata file,
current.zipinto a similar structure under
/var/sadm/spool/patchsvr. You will need to rename the files as you copy them into
/patchsvr. If you know the specific patches that your environment will need you can also use the
smpatch downloadcommand with the
-foption to download the specific patches. You can use other methods to get the right set of patches into the cache that might be needed in your environment. For example, after running an analysis on the Proxy host (
smpatch analyze > patchlist) you will have the set of patches needed by that host. You could then do this same operation on your local client systems to produce a master list of patches needed for these systems. Once you have a master patch list, you can include it in the
smpatchcommand as follows:smpatch download -f -x idlist=master_list
When your local patch source is populated with a current
current.zip, and the patches you intend to deploy to your local systems, you can disconnect your Proxy and run it in standalone mode to serve patches to your local clients.
Establish a Fixed Patch Baseline
Sun updates the database of patches available to the Sun Update Connection software daily. This database, also known as the patch metadata file, patch set, or collection, is called
current.zipand represents the current set of patches available on Sun's external patch server. That file changes daily. If you would like to represent a fixed point of time you can manually create a baseline metadata file, appropriately named, and refer to that when performing patch analysis on your local system. Note that this strategy is not without pitfalls: specifically, it does not address the treatment of withdrawn patches. Sun does periodically withdraw patches for a variety of reasons. By freezing a
current.zipfile for later use you might be including some of those withdrawn patches. If you decide to use this baseline strategy you must be aware that you may be applying patches that Sun has withdrawn as defective or obsolete.
Here's how to create a baseline:
- Copy the
current.zipfile and save it with a new file name that makes sense for your environment.cp /patchsvr/Database/current.zip /patchsvr/Database/new-file-name.zip
For example:cp /patchsvr/Database/current.zip /patchsvr/Database/baseline060731.zip
- Add this baseline file to the collections file by adding a new entry as follows:current.name=Current Available Updatesbaseline060731.name=Baseline for 7/31/06
You may notice other patch sets in this file. You can leave them or remove those if not appropriate to your environment. What is on the right side of the equals sign is the user-visible text string that will appear in the Update Manager Patch Collections selection box.
Now you must configure a local client to use a baseline. If using Update Manager, select Patch Collections drop-down box and select the desired baseline.
Note: You may need to manually remove the client's cached versions of these files. Simply remove the files under
smpatch, use the following command:smpatch set patchpro.patchset=baseline060731
Subsequent host analysis will be performed using this baseline. As long as the desired patches are available in the Proxy's repository then everything should work as expected.
BigAdmin Submitted Article Automating patch installation Mike Myers, July, 2004
Like other computing sites, we've seen security become more and more important in our environment. One aspect of security that we had done a particularly poor job on was regular (proactive) system patching. Mostly, this was because the system admins, after working a long hard day, had little desire to work late at night or on weekends to execute system patching. Also, there was nothing to "trigger" a system to get patched. We only patched when we did major work on systems or upgraded them, or when a system crashed and support identified a patch to fix the issue -- generally, that was all. Sadly, we had systems that went for over three years without patching, and we had dozens of different patch sets on our servers. Consistent it was not.
Because we carry a Platinum contract from Sun and run Sun Explorer Software on all our systems (about 115 of them), we receive a monthly status report. This showed us just how badly we were doing -- lots of red. (As an aside, I'd highly recommended these reports to anyone who's not getting them -- talk to your account rep.) We would try to fix the worst of these, but without an actual policy for this, the fixes tended to get preempted by "real" work.
This obviously wasn't acceptable.
To solve this, we first created a "security" policy saying that systems must be patched every 90 days (security is in quotes because this also has a major effect on availability -- far fewer system crashes). This gave us a requirement to meet and allowed us to build a process to do just that.
The process we developed included the following points:
- Go out to Sun every 90 days and pull the "Recommended and Security" patch cluster for each OS revision that we're running. These are stored on a central NFS server. We also pull a few extra patches, for example, CDE, Java technology, and VERITAS patches.
- Write a report (run weekly) that shows how many days it has been since each system was patched. This report is delivered to the coordinator who schedules the patching.
- Create a new "rc" script that applies the patch set from the central NFS server. This was one of the critical bits, so this script was designed to be easy enough to use that virtually anyone could run it -- the only input required is a "should we patch (Y/N)?". If it runs into errors, it has instructions to page an admin.
- Write a script to be run via
sudo(or RBAC) to insert the new rc script into the startup scripts at
/etc/rc2.d/S73autopatching-- just after
S72inetsvcruns, so most network services are available but no applications should have started yet. Patching in "true" single-user mode would have been much more difficult since we would have had to set up the network routing and such. This seemed like a good compromise. This script removes itself after running.
Fortunately for our site, we have a 7x24 operations staff. These folks are not admins (even junior level) but are very good at following rigidly designed procedures. The boot time script has just such a well-documented, rigid flow.
Once all that was in place and tested in our lab, we unleashed it on our little world.
Things were a bit rocky to start -- system owners were not used to taking outages so often and often complained long and loud about how we were driving down availability. We stuck to our guns, mostly playing the security card, and eventually people got used to this new procedure. Some folks even gave us a schedule of outages for the next 12 months.
Some of the admins were a little disgruntled, too. They believed that patching was a critical aspect of their jobs and were uncomfortable with others taking on this role. This didn't last long once it became clear that the process was reliable and gave them a few weekends back.
Things have improved in our environment dramatically since then. Our monthly reports from Sun are now mostly green. We can now let the regular patching cycle address certain less critical security announcements. We still patch the more critical announcements outside of this schedule; fortunately, many of those don't require a reboot. Unscheduled system outages have dropped dramatically. I don't think we've had a single service call to Sun that ended with, "That problem is addressed by a patch," since our first complete pass through the systems.
We've had to use a few tricks to make things run smoothly. The rc script has to be smart enough to know if it's patching the central NFS server itself, in which case it seeks out the files locally instead of trying NFS. Obviously we have to make sure to schedule the NFS server patching at a time when no one else is patching.
We use a heavily modified version of the
install_clusterscript that Sun ships with the patch clusters. It scans the
patch_orderfile and eliminates patches that are already on the system. This decreases the time to apply a patch significantly.
Since all patches must be tested in the lab before we release them to the system owners, we built a facility into the rc script to pull the patches from a "staging" area (and turn on a bunch of debugging) when appropriate responses are provided (for example, answering "debug" to the "shall we patch" question).
To keep our processes clean and consistent, the same script can be run from the command line (as root) during system build to patch the new system to the same cluster that is being deployed in our environment.
The rc script uses
/etc/nologinto block logins while the system is being patched. It also uses a local alerting to a console in our operations room to let the operators know that the process is stopped waiting for some type of response (either the initial "shall we patch" questions or an error later on). The full transcript of the patching session is captured and emailed to the list of system admins for post-patching review (either immediately if there's a problem or the next business day otherwise).
One trick: If you're running from an rc script, you cannot just say
read foobarin your script -- you must explicitly specify
/dev/consoleas your tty:read foobar < $mytty
The structure on the central patch server is that all patches are in a share called
/patches. Under these are directories for each OS release that is supported, which are called
release> is whatever is returned by
uname -r, and
DATEis a date stamp of the form DDMMYYYY. These directories in turn hold a
_Addondirectory that hold the Recommended and security bundle and a local bundle of your own choosing. The
install_clusterscript in each directory is what gets executed to drive the actual patching.
There are also directories called
VxFS_DATE/vx_release/OS_RELEASE, which have patches for VERITAS Volume Manager and File System, respectively (these also are driven by
install_clusterscripts so they can house multiple patches).
Here is a link to the autopatching rc script, which will require some customization for each environment.
|Bulletin||Latest||Past week||Past month||
PatchReport or PatchReport for 2.7 is a script to assist in the automation of patch installation. PatchReport is written in perl, and does require the addition of several perl modules, libnet, Data-Dumper, MD5, libwww-perl, and IO. Casper Dik's fastpatch program is also supported. Use of the fastpatch program can dramatically reduce the time to install patches! Its use is highly recommended.
PatchReport operates in two main modes. The first mode makes use of the Recommended patch list available from sunsolve.sun.com/pub-cgi/us/pubpatchpage.pl the list of patches available to non contract customers. PatchReport will retrieve the recommended patch list, and compare it to the output of your 'showrev -p' output. If invoked with the '-r' flag PatchReport will go and retrieve the needed patches. A sample of the output will help to elucidate the process.
BugTraq Archive Re Checking for most recent Solaris Security
Well, sun patch reports are quite strange, i remember last year, the syslog patch wasn't recommended. Now, the ToolTalk patch is recommended for 2.5.1, 2.5.1_x86 and 2.6_x86 but not for 2.6. Was it because the public ttdb exploit was only for 2.5.1? Little work is needed to make it work on 2.6. Too bad for people who blindly install the recommended patch cluster. Anyway, i parsed the latest Sun patch report for easy reading and retrieving: http://www.hert.org/solaris/patches , i'll add cross links to advisory later.
Enclosed is a script that checks if your Solaris system has the latest security patches applied.
patchdiag (from Sun) does much the same as what this script does (at least, by what you have said). It also notifies which patches are "Recommended" and "Security" patches. You can get it at http://online.sunsolve.sun.co.uk/sunsolve/uk/patchdiag/ (this is the UK URL).
Unfortunately, this is only available for contract customers.
There was a blurb about it in a ;login: last year. http://www.cs.duke.eduwjspr.html
Or use the automated email patch status robot at pogostick.net. See http://pogostick.net/~pdiag/english.html -- Our (my) service makes no pretence of being a service that extremely vulnerable machines should use. But then again, the mail you send doesn't need to identify _which_ machine the showrev output is from. Just take the showrev/pkginfo from one machine, put it into a file, email it from another machine (with correct subject). So any eavesdropper would only know that somewhere (in the world) there is a Sun/Solaris machine with this software/patchlevel.
Doesn't sound very good to send the configuration of your machine over the internet by email. What if someone gets it and use that information to know the vulnerabilities of your server? Using your service he would know:
* Which Software you have installed in your server
* Which patches you have applied (and what's more interesting, which
patches you *haven't* applied)
* The OS version, platform, etc...
* Your server's name
Mmmmmmm... Just the information someone would need to hack your system :) What about making public the program you use, to run it locally? (showrev -p ; pkginfo -l)|yourniceprog
Sun makes patch update tasks more bearable in a few ways.
GASP! -- Georgetown Automated Solaris Patchtool
SAGE ;login - ToolMan Meets PatchReport
One of my co-workers, Joe Shamblin, is our OS and security guru and is generally the one burdened with the chore of keeping our systems up-to-date with the latest patches. He has brilliantly automated and simplified this odious task.
Joe created and regularly employs a not-so-trivial Perl script called PatchReport, so named because in its initial incarnation its sole function was to produce a report à la patchdiag, but with two improvements: it automatically downloaded the xref file, and it provided a more usable, consolidated report. The table produced by PatchReport combines the information from all three sections of the patchdiag report, indicating in a single line for each patch if it is Recommended, Security, and/or if a prior version is already installed. This makes it much easier to scan the list and decide which patches are appropriate for your system.
But PatchReport has evolved into a full-fledged patch analyzer (the report), downloader, and installer. As noted earlier, it can accomplish all of this and leave a Solaris system completely up to date via a single command. Invoked with appropriate options specified, PatchReport will: connect to the Sunsolve site, download the patchdiag.xref and CHECKSUMS files, analyze patches on your system and produce a report, download selected patches, check the md5 checksums, and install the patches. You can even tell it to shut down and reboot the system when it's done! Listing 2 shows an example of a PatchReport run.
By the way, if PatchReport finds that your system is completely up to date, well, you'll just have to find out for yourself what happens.
You can also use PatchReport in conjunction with Sun's JumpStart suite (used to install new systems). PatchReport can download appropriate patches to a directory. Then JumpStart can be configured to install these patches to the OS during the initial installation. Alternatively, JumpStart could be configured to call PatchReport directly.
PatchReport is written for Solaris and not extended to other operating systems because Sun has a very open and well-documented patch system that makes programs like patchdiag and PatchReport possible. Other vendors, please take note.
Solaris Patch Levels by Thomas Knox
...The first thing to do is to install the Sun patchdiag tool onto your servers. I like to install it into /usr/local/patchdiag so I always know where it is, no matter what system I might be on. The patchdiag tool can be found at:
and the most recent version (as of this writing) is 1.0.4.
... ... ...
After you have downloaded the patchdiag tool, install it into a uniform place. All of my scripts assume /usr/local/patchdiag; change yours accordingly:cd /usr/local zcat patchdiag-1.0.4.tar.Z | tar -xvf - ln -s patchdiag-1.0.4 patchdiag cd patchdiag ./patchdiag_setup
I also make a user (called “patches”) who owns the patchdiag directory on each machine. This account is used to automate pushing the patchdiag.xref file to all of the servers:cd /usr/local chown -R patches patchdiag-1.0.4 chmod 700 patchdiag-1.0.4 The Automation Process
The first script (Listing 1) will go out to the SunSolve FTP site and download the current patchdiag.xref file for system analysis. After downloading it, it will push it to all of your other servers.
Replace host1 login_id password ... hostX login_id password with your server names and the login information (i.e., sunbox1 patches patchpw /usr/local/patchdiag). Since this script will have live account information, it is a good idea to keep it owned by root with permissions 700, and in a private directory.
I initially used ncftpget to FTP the patchdiag.xref file, but Sun changed how the file was stored (it is now listed as a 0 byte file), and ncftpget will no longer retrieve this file, even with command-line arguments to “force” a RETR.
This script was designed to run as a cron entry. How frequently you check your patch levels should help you determine how often to run this script. Running it at off-peak hours will endear you to the Sun administrators.
The next phase of automation involves determining which patches need to be downloaded, retrieving them, and prepping them for installation. This script (Listing 2) uses wget, available from:
or precompiled from:
Follow the instructions provided by your download of wget and install it.
Replace my_login_id with your SunSolve login ID, and my_passwd with your SunSolve password. Again, because Listing 2 contains live passwords, keep it in a private directory with permissions 700.
patch.ignore is a list of patch IDs that you do not want to get. For example, if you’re running a headless Solaris 8 server, you probably do not want patch 108576 to support Expert3D IFB Graphics. List the patches without revision numbers. A patch.ignore file that contained the following:108569 108576 108864
would not download patches 108569, 108576, or 108864.
If your server is behind a proxy, add the flags:--proxy=on --proxy-user=my_id --proxy-passwd=my_passwd
to the wget statement above, thus supplying your correct proxy user id and password. Be sure to add the line:
http_proxy = http://my.company.proxy:port/
to your ~/.wgetrc file, or define the environment variable http_proxy in the script (e.g., http_proxy=http://proxy.company.com: \ 8080/; export http_proxy)
This script will get all current patches for your system that were not explicitly excluded by the patch.ignore file, and their associated readme files. It will also expand the patches for easy installation. This script can also be run from cron, preferably after the first one runs.
Now that the patches have been placed on your systems, it is up to you to determine system applicability and install them by hand. It would be easy to also automate the patch installation. A simple i=‘ls -d 1*-*‘; for j in $i;do;patchadd $j;done would work well. However, it is highly recommended not to do so. Rather review each patch’s .readme and PATCH-ID/README files to determine applicability, special requirements, and whether a specific order is needed for installation.
Using these scripts on a regular basis on my servers has enabled me to be much more proactive in keeping my systems up to date and preventing problems before they become major issues. It has also reduced the usual hassle in finding new patches and retrieving them, thus saving my time for other tasks.
patchfetch2 - report patch status, select wanted patches and download
Solaris -- Patch Management (04-Dec-2000) -- This is essentially two Born shell scripts CheckPatches and GetApplyPatch.
Patch management is fundamental to security. Two simple tools we've developed for patch management are presented -- CheckPatches to list outstanding patches and GetApplyPatch to apply them. Traditional Unix tar kit available.
Solaris PatchReport 2.x (Solaris patch tool) PatchReport 2.x is ready for download. The latest update contains support for Casper Dik's fastpatch, and has the ability to exclude certain patches based on patch ids. PatchReport can be found at the following URL(s):
Solaris-specific resources on things I can do to secure boxes before putting them into production. I was specifically
having problems with having patches and packages on the box that would never be used, and were security risks.
Many good responses:
1. Casper Dik <casper@holland.Sun.COM>
I want to make sure that by installing the patches I don't end upinstalling a service that I didn't previously have. Will running the cluster patch script install a patch for lpd, for example, if the lpd package hasn't previously been installed?
If you removed the entire package, the patch won't install ("no applicable packages found"). If you just removed a few files, and those file are included in the patch, the files will be restored.
Is this the most prudent way to upgrade a box with security and keeping current in mind? I understand there is a program out there that will monitor the current state of your machine with respect to the currently available patches? Does anyone know anything more about this?
Monitor the security patches and download them. I'd also suggest taking all of the recommended patches. Another recommendation
of mine is getting
ftp.wins.uva.nl:/pub/solaris/fix-modes.tar.gz Also, check the sunworldonline columns (including back issues) off Suin's home page and check the security column.
2. Gnuchev Fedor <email@example.com>
there is a patchxref on sunsolve1 - atol with daily updated database of patches - so you can check which patches are
required according to what packages are really loaded on your machine patch will not be applied if the package is not installed
what's more unpleasant it will fail to apply if you'd made some changes to the system and replaced files within a package
- since it checks against /var/sadm/install/contents database.
Should I just remove the entire existing named and sendmail packages before proceeding? Is that generally the proper approach?
Well, NO - do not remove - move all files as *.bak or *.orig - but keep them (well, for no good reason actually - except
possibility to bail out)
//frankly - never had to bail out - ISC tools are fine on Solaris :-)
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : C++ Humor : ARE YOU A BBS ADDICT? : Object oriented programmers of all nations : C Humor : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor: Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : The Most Comprehensive Collection of Editor-related Humor : Microsoft plans to buy Catholic Church : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor : Best Russian Programmer Humor : Russian Musical Humor : The Perl Purity Test : Politically Incorrect Humor : GPL-related Humor : OFM Humor : IDS Humor : Real Programmers Humor : Scripting Humor : Web Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor :
The Last but not Least
|You can use PayPal to make a contribution, supporting hosting of this site with different providers to distribute and speed up access. Currently there are two functional mirrors: softpanorama.info (the fastest) and softpanorama.net.|
The statements, views and opinions presented on this web page are those of the author and are not endorsed by, nor do they necessarily reflect, the opinions of the author present and former employers, SDNP or any other organization the author may be associated with. We do not warrant the correctness of the information provided or its fitness for any purpose.
Last modified: February 01, 2013