diff --git a/doc/guide/files/using.xml b/doc/guide/files/using.xml index 887afafc68ec..f7c4ee859cc0 100644 --- a/doc/guide/files/using.xml +++ b/doc/guide/files/using.xml @@ -1,4 +1,4 @@ - + Using pkgsrc @@ -99,7 +99,7 @@ and you can still use binary packages from someone else. other packages depend on it. Instead, they are moved to the vulnerable subdirectory. So you may need to add this directory to the PKG_PATH variable. - However, you should run audit-packages + However, you should run pkg_admin audit regularly, especially after installing new packages, and verify that the vulnerabilities are acceptable for your configuration. @@ -155,18 +155,18 @@ and you can still use binary packages from someone else. - Through security/audit-packages, + Through pkg_admin fetch-pkg-vulnerabilities, this list can be downloaded automatically, and a security audit of all packages installed on a system can take place. - There are two components to - security/audit-packages. The first - component, download-vulnerability-list, is for downloading + There are two components to auditing. The first + step, pkg_admin fetch-pkg-vulnerabilities, + is for downloading the list of vulnerabilities from the NetBSD FTP site. The second - component, audit-packages, checks to see if any of your + step, pkg_admin audit, checks to see if any of your installed packages are vulnerable. If a package is vulnerable, you will see output similar to the following: @@ -175,13 +175,24 @@ and you can still use binary packages from someone else. http://www.samba.org/samba/whatsnew/macroexploit.html - One can set up security/audit-packages to download the + You may wish to have the vulnerabilities - file daily, and include a package audit in the daily security script. - Details on this are located in the MESSAGE - file for security/audit-packages. + file downloaded daily so that + it remains current. This may be done by adding an appropriate entry + to the root users &man.crontab.5; entry. For example the entry + +# download vulnerabilities file +0 3 * * * /usr/sbin/pkg_admin fetch-pkg-vulnerabilities >/dev/null 2>&1 + + will update the vulnerability list every day at 3AM. You may wish to do + this more often than once a day. + + In addition, you may wish to run the package audit from the daily + security script. This may be accomplished by adding the following + line to /etc/security.local: + +/usr/sbin/pkg_admin audit +