<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: compiled from source = bad security practice</title>
	<atom:link href="http://www.gfi.com/blog/compiled-source-bad-security-practice/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/compiled-source-bad-security-practice/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=compiled-source-bad-security-practice</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Miro</title>
		<link>http://www.gfi.com/blog/compiled-source-bad-security-practice/comment-page-1/#comment-1120</link>
		<dc:creator>Miro</dc:creator>
		<pubDate>Fri, 18 Dec 2009 09:20:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1567#comment-1120</guid>
		<description><![CDATA[I am afraid I have to disagree with you.

Yes package managers abstract the package management to the level that it&#039;s easy to use. And that&#039;s great! Every modern package manager keeps track of version numbers and dependencies for you so really you do not have to. When you want to know what version you have, all you need to do is query the package manager while if you compile from source this would be a lot more trickier.

My point was, do not compile from source, because if you use your distros packaging tool, you are safer in that you will install only tested software and patches which will match dependencies you have already installed while if you manually install from the latest tarball you will have to manually track all the patches and dependencies and everything else down the tree. 

To properly track security updates and cherry-pick patches for a stable package branch is not an easy task to do. It gets a lot worse when you have to backport a patch from a different version.

If you want the granular control of knowing exactly what versions of everything you have installed you can still do that with a package manager easily. You&#039;re not giving that away at all. To rest easy you can check a package and its dependency versions and ensure they were correctly updated.]]></description>
		<content:encoded><![CDATA[<p>I am afraid I have to disagree with you.</p>
<p>Yes package managers abstract the package management to the level that it&#8217;s easy to use. And that&#8217;s great! Every modern package manager keeps track of version numbers and dependencies for you so really you do not have to. When you want to know what version you have, all you need to do is query the package manager while if you compile from source this would be a lot more trickier.</p>
<p>My point was, do not compile from source, because if you use your distros packaging tool, you are safer in that you will install only tested software and patches which will match dependencies you have already installed while if you manually install from the latest tarball you will have to manually track all the patches and dependencies and everything else down the tree. </p>
<p>To properly track security updates and cherry-pick patches for a stable package branch is not an easy task to do. It gets a lot worse when you have to backport a patch from a different version.</p>
<p>If you want the granular control of knowing exactly what versions of everything you have installed you can still do that with a package manager easily. You&#8217;re not giving that away at all. To rest easy you can check a package and its dependency versions and ensure they were correctly updated.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Richard Parvass</title>
		<link>http://www.gfi.com/blog/compiled-source-bad-security-practice/comment-page-1/#comment-1059</link>
		<dc:creator>Richard Parvass</dc:creator>
		<pubDate>Wed, 16 Dec 2009 13:19:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1567#comment-1059</guid>
		<description><![CDATA[No way is this bad security practice!

For example: Suppose we wish to update a copy of apache. Using compile-from-source, every dependency has to be evaluated in order to upgrade that apache. However, if you use a package manager, do you really know which packages are being updated? Do you know which exploits your system is now vulnerable to? No.

Package managers are great for taking the &quot;hard work&quot; out of updating a system, but they bring a level of dissociation from the fundamentals of system administration that could be allowing systems to be exploited. And certainly the administrator does not know exactly which versions of which packages are on their systems.]]></description>
		<content:encoded><![CDATA[<p>No way is this bad security practice!</p>
<p>For example: Suppose we wish to update a copy of apache. Using compile-from-source, every dependency has to be evaluated in order to upgrade that apache. However, if you use a package manager, do you really know which packages are being updated? Do you know which exploits your system is now vulnerable to? No.</p>
<p>Package managers are great for taking the &#8220;hard work&#8221; out of updating a system, but they bring a level of dissociation from the fundamentals of system administration that could be allowing systems to be exploited. And certainly the administrator does not know exactly which versions of which packages are on their systems.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 15:00:20 by W3 Total Cache --