[OpenIndiana-discuss] 3737 days of uptime

Roman Naumenko roman at naumenko.ca
Sun Apr 7 15:07:51 UTC 2013


Andrew Gabriel said the following, on 07-04-13 10:34 AM:
> Edward Ned Harvey (openindiana) wrote:
>>> From: Ben Taylor [mailto:bentaylor.solx86 at gmail.com]
>>>
>>> Patching is a bit of arcane art.  Some environments don't have
>>> test/acceptance/pre-prod with similar hardware and configurations, so
>>> minimizing impact is understandable, which means patching only what is
>>> necessary.
>> This thread has long since become pointless and fizzled, but just for 
>> the fun of it:
>>
>> I recently started a new job, where updates had not been applied to 
>> any of the production servers in several years.  (By decree of former 
>> CIO).  We recently ran into an obstacle where some huge critical 
>> deliverable was not possible without applying the updates.  So we 
>> were forced, the whole IT team working overnight on the weekend, to 
>> apply several years' backlog of patches to all the critical servers 
>> worldwide.  Guess how many patch-related issues were discovered.  
>> (Hint:  none.)
>>
>> Patching is extremely safe.  But let's look at the flip side. Suppose 
>> you encounter the rare situation where patching *does* cause a 
>> problem.  It's been known to happen; heck, it's been known to happen 
>> *by* *me*.  You have to ask yourself, which is the larger risk?  
>> Applying the patches, or not applying the patches?
>> First thing to point out:  Suppose you patch something and it goes 
>> wrong ...  Generally speaking you can back out of the patch.  Suppose 
>> you don't apply the patch, and you get a virus or hacked, or some 
>> data corruption.  Generally speaking, that is not reversible.
>>
>> For the approx twice in my life that I've seen OS patches cause 
>> problems, and then had to reverse out the patches...  I've seen 
>> dozens of times that somebody inadvertently sets a virus loose on the 
>> internal network, or a server's memory or storage became corrupted 
>> due to misbehaving processes or subsystem, or some server has some 
>> kind of instability and needs periodic rebooting, or becomes 
>> incompatible with the current release of some critical software or 
>> hardware, until you apply the patches.
>> Patches are "bug fixes" and "security fixes" for known flaws in the 
>> software.  You can't say "if it ain't broke, don't fix it." It is 
>> broke, that's why they gave you the fix for it.  At best, you can 
>> say, "I've been ignoring it, and we haven't noticed any problems yet."
> 10 years ago, it was the case that something like half the support 
> calls would have never arisen if the system was patched up to date. (I 
> don't know the current figure for this.)
>
> OTOH, I have worked in environments where everything is going to be 
> locked down for 6-10 years. You get as current and stable as you can 
> for the final testing, and then that's it - absolutely nothing is 
> allowed to change. As someone else already hinted earlier in the 
> thread, the security design of such infrastructure assumes from the 
> outset that the systems are riddled with security holes, and they need 
> to be made secure in some other (external) way
And the side effect would be dramatically reduced OPEX due to lower 
numbers of stuff that should be supporting environment.

--Roman



More information about the OpenIndiana-discuss mailing list