From 492753d9051e8b66718cba859f4cbb7524519507 Mon Sep 17 00:00:00 2001 From: Kota Kanbe Date: Tue, 14 Feb 2017 12:37:28 +0900 Subject: [PATCH] Update README --- README.fr.md | 2 +- README.ja.md | 11 +++++++---- README.md | 13 ++++++++----- 3 files changed, 16 insertions(+), 10 deletions(-) diff --git a/README.fr.md b/README.fr.md index 69a34e6c41..ec55399bbe 100644 --- a/README.fr.md +++ b/README.fr.md @@ -40,7 +40,7 @@ Vuls est un outil crée pour palier aux problèmes listés ci-dessus. Voici ses # Caractéristiques principales - Recherche de vulnérabilités sur des serveurs Linux - - Supporte Ubuntu, Debian, CentOS, Amazon Linux, RHEL + - Supporte Ubuntu, Debian, CentOS, Amazon Linux, RHEL, Raspbian - Cloud, auto-hébergement, Docker - Scan d'intergiciels non inclus dans le gestionnaire de paquets de l'OS - Scan d'intergiciels, de libraries de language de programmation et framework pour des vulnérabilités diff --git a/README.ja.md b/README.ja.md index 3c55aff9ee..0b979fc76f 100644 --- a/README.ja.md +++ b/README.ja.md @@ -39,7 +39,7 @@ Vulsは上に挙げた手動運用での課題を解決するツールであり # Main Features - Linuxサーバに存在する脆弱性をスキャン - - Ubuntu, Debian, CentOS, Amazon Linux, RHELに対応 + - Ubuntu, Debian, CentOS, Amazon Linux, RHEL, Raspbianに対応 - クラウド、オンプレミス、Docker - OSパッケージ管理対象外のミドルウェアをスキャン - プログラミング言語のライブラリやフレームワーク、ミドルウェアの脆弱性スキャン @@ -348,7 +348,7 @@ Vulsをスキャン対象サーバにデプロイする。Vulsはローカルホ ---- # Performance Considerations -- Ubuntu, Debian +- Ubuntu, Debian, Raspbian `apt-get changelog`でアップデート対象のパッケージのチェンジログを取得し、含まれるCVE IDをパースする。 アップデート対象のパッケージが沢山ある場合、チェンジログの取得に時間がかかるので、初回のスキャンは遅い。 ただ、2回目以降はキャッシュしたchangelogを使うので速くなる。 @@ -367,6 +367,7 @@ Vulsをスキャン対象サーバにデプロイする。Vulsはローカルホ | Amazon | 速い | | RHEL | 速い | | FreeBSD | 速い | +| Raspbian | 初回は遅い / 2回目以降速い | ---- @@ -394,6 +395,7 @@ web/app server in the same configuration under the load balancer | CentOS | 5, 6, 7| | Amazon Linux| All| | FreeBSD | 10| +| Raspbian | Wheezy, Jessie | ---- @@ -610,9 +612,9 @@ configtest: ``` vuls ALL=(root) NOPASSWD: /usr/bin/yum ``` -- Ubuntu, Debian +- Ubuntu, Debian, Raspbian ``` -vuls ALL=(root) NOPASSWD: /usr/bin/apt-get, /usr/bin/apt-cache +vuls ALL=(root) NOPASSWD: /usr/bin/apt-get ``` - Amazon Linux, FreeBSDはRoot権限なしでスキャン可能 @@ -631,6 +633,7 @@ Prepareサブコマンドは、Vuls内部で利用する以下のパッケージ | Amazon | All | - | | RHEL | 5, 6, 7 | - | | FreeBSD | 10 | - | +| Raspbian | Wheezy, Jessie | - | ``` diff --git a/README.md b/README.md index 0d60d4a309..019c2b2c86 100644 --- a/README.md +++ b/README.md @@ -45,7 +45,7 @@ Vuls is a tool created to solve the problems listed above. It has the following # Main Features - Scan for any vulnerabilities in Linux/FreeBSD Server - - Supports Ubuntu, Debian, CentOS, Amazon Linux, RHEL, FreeBSD + - Supports Ubuntu, Debian, CentOS, Amazon Linux, RHEL, FreeBSD and Raspbian - Cloud, on-premise, Docker - Scan middleware that are not included in OS package management - Scan middleware, programming language libraries and framework for vulnerability @@ -343,7 +343,7 @@ On the aggregation server, you can refer to the scanning result of each scan tar ---- # Performance Considerations -- On Ubuntu and Debian +- On Ubuntu, Debian and Raspbian Vuls issues `apt-get changelog` for each upgradable packages and parse the changelog. `apt-get changelog` is slow and resource usage is heavy when there are many updatable packages on target server. Vuls stores these changelogs to KVS([boltdb](https://github.com/boltdb/bolt)). @@ -364,6 +364,7 @@ High speed scan and resource usage is light because Vuls can get CVE IDs by usin | Amazon | Fast | | RHEL | Fast | | FreeBSD | Fast | +| Raspbian | First time: Slow / From the second time: Fast | ---- @@ -395,6 +396,7 @@ If there is a staging environment with the same configuration as the production | CentOS | 5, 6, 7| | Amazon Linux| All| | FreeBSD | 10| +| Raspbian | Wheezy, Jessie | ---- @@ -609,13 +611,13 @@ configtest: And also, configtest subcommand checks sudo settings on target servers whether Vuls is able to SUDO with nopassword via SSH. Example of /etc/sudoers on target servers -- CentOS, RHEL +- CentOS and RHEL ``` vuls ALL=(root) NOPASSWD: /usr/bin/yum ``` -- Ubuntu, Debian +- Ubuntu, Debian and Raspbian ``` -vuls ALL=(root) NOPASSWD: /usr/bin/apt-get, /usr/bin/apt-cache +vuls ALL=(root) NOPASSWD: /usr/bin/apt-get ``` - It is possible to scan without root privilege for Amazon Linux, FreeBSD. @@ -636,6 +638,7 @@ Prepare subcommand installs required packages on each server. | Amazon | All | - | | RHEL | 5, 6, 7 | - | | FreeBSD | 10 | - | +| Raspbian | Wheezy, Jessie | - | ```