Well, now I have a real excuse to install the Bluetooth (waiting to see if it broke anything) and Java (just too darn lazy) updates too. Bye-bye uptime.
Originally posted by X86BSD
Dont even get me started on how STUPID it is to require a restart on every single update. It's just plain dumb. It's like they don't know what unix is. Or how to use it even though its sitting underneath the pretty candy UI.
Originally posted by X86BSD
Dont even get me started on how STUPID it is to require a restart on every single update. It's just plain dumb. It's like they don't know what unix is. Or how to use it even though its sitting underneath the pretty candy UI.
Dont even get me started on how STUPID it is to require a restart on every single update. It's just plain dumb. It's like they don't know what unix is. Or how to use it even though its sitting underneath the pretty candy UI.
Originally posted by X86BSD
It's hard to restart for trivial crap that does NOT need a restart. If you come from the unix universe you would understand. You stop the server in question, (sshd, httpd etc..) patch it, install new server, restart server. Not the whole machine. It's like going to get gas for your car at the pump and having to tear down your engine and rebuild it every time. It's stupid and makes no sense. This is not windows.
Originally posted by Wyrm
Does anyone know if you have to restart the OSX Server when installing security patches?
Originally posted by X86BSD
My friend has been sitting on a remote root issue that affects all versions of OS X for months. Apple has *finally* agreed it will get addressed in a future patch. I Love OS X and Apple but come on, they need a serious blow to the head with a blunt object to get them to take a bug serious and do something about it. They finally agreed to patch it after many emails back and forth and finally a pretty curt "fix the issue or im releasing it into the wild without you having time to fix it." email. So let's not all fawn over Apple's "speedy" patch timing.
Originally posted by X86BSD
one or one thousand makes no difference. You cannot just reboot a machine every time a security update comes up if you run mission critical services off of it. Unless you want to admit OS X is a toy OS that cant hang with 1970 technology like UNIX that can be patched without taking the entire machine down. Is that what you are trying to say?
I love OS X, but some of you need some experience in the real world about mission critical deployment. And why its retarded to reboot a whole machine or machine's to patch ssh.
Originally posted by mstecker
Did my last post really get modded out for being insulting? Okay, let me phrase this in a non-insulting way:
This story strikes me as untrue. It's easy to claim that an anonymous friend has an exploit for a bug that I can't tell you about, but let met tell you how slow Apple is in fixing it.
What makes more sense to me is that anyone who tries to blackmail apple into doing anything is likely to end up behind bars.
I hope Apple calls your "friend's" bluff. If it were serious, and a real exploit, they would have fixed it, as they've done instantly for other serious exploits. If not, they're going to let your "friend" huff and puff all he likes.
Originally posted by X86BSD
My friend has been sitting on a remote root issue that affects all versions of OS X for months. Apple has *finally* agreed it will get addressed in a future patch. I Love OS X and Apple but come on, they need a serious blow to the head with a blunt object to get them to take a bug serious and do something about it. They finally agreed to patch it after many emails back and forth and finally a pretty curt "fix the issue or im releasing it into the wild without you having time to fix it." email. So let's not all fawn over Apple's "speedy" patch timing.
Originally posted by X86BSD
As far as how to fix zlib without rebooting.
Patch zlib
Install new zlib
Recompile app's using zlib.
If it's a kernel lib. *Schedule Downtime*
"But whaaa how do i find out what apps use zlib???"
I don't know how YOU run your servers but I only run one service usually per box.
Static libs only. Never dynamic for obvious reasons And usually in a Jail.
And I know exactly what lib's they link against.
Maybe you need more organization if you have 1000 apps running on a single server and don't know what's using what or linked to what. Which would be a security nightmare anyway.
Originally posted by X86BSD
I don't know how YOU run your servers but I only run one service usually per box.
Static libs only. Never dynamic for obvious reasons And usually in a Jail.
And I know exactly what lib's they link against.
Your friend should start posting it everywhere that Mac traffic is significant. /. might be a good start....Originally posted by X86BSD
My friend has been sitting on a remote root issue that affects all versions of OS X for months. Apple has *finally* agreed it will get addressed in a future patch. I Love OS X and Apple but come on, they need a serious blow to the head with a blunt object to get them to take a bug serious and do something about it. They finally agreed to patch it after many emails back and forth and finally a pretty curt "fix the issue or im releasing it into the wild without you having time to fix it." email. So let's not all fawn over Apple's "speedy" patch timing.
Originally posted by Analog Kid
Sorry, I selectively ignored this bit... Let me restate:
If I'm changing core libraries, and I look at my market and realize that half are home users and the other half are artists-- am I going to ask them to recompile and install all apps statically linked to OpenSSL, or am I going to say "click restart to continue"?
I'd be willing to be less than 50% of users have the dev tools even installed...
Originally posted by X86BSD
You can think whatever you wish. The fact remains by Nov 26th this glaring security hole affecting every version of OS X 10.2+ client and server will be issued forth in a security advisory by said author.
It probably even affects all versions of OS X. Proof is in the pudding you can doubt all you wish, but I will state here for record you will either see another security update by Nov 26th or you will see the SA released on full-disclosure and thereby the rest of the globe. This is not a bluff this is a valid serious security issue Apple has decided is not worth the time to fix as of yet. On the 26th you can decide if Apple was justified or not. Trying to get a vendor to fix a glaring security issue is not blackmail. But I doubt I will convince you of this.
Originally posted by Analog Kid
Dude, listen, I'd like to reboot less than I do. Not because it does me any harm, but because I like to see the 'uptime' number get big.