Upgrade files are a lot larger than expected
-
We have tens of devices in production with built-in 1GB DOMs. These are hard and expensive to replace.
We'd be even happy with a special lite version, containing only one OS slice.
-
At this point I wouldn't trust a 1GB DOM… how old are those?
You could just run a full install, though upgrading an exiting install for cases may be tricky/impossible.
I doubt we'll be making a "lite" version like that, though we may yet find things to trim away to bring the size down a little more, I doubt it will be a drastic difference.
-
These are branded, rock-solid HP thin clients. Never failed because of the DOM.
Even a 98% filled up image would be fine, it won't allow installing packages, but still, it would work great as a standard pfSense box.
-
Then run a full install on them and not NanoBSD. Problem solved. :-)
Though you may still have trouble with updates on a disk that small.
That said, I don't care how "rock solid" something is, age will take it down eventually, and you should have a plan in place for when it does.
-
Will we still have 1GB NanoBSD image available in 2.3?
Image for 1GB card is built. If you have a 1GB card and a test system to try it on, why not install 2.3-ALPHA on it and report back how much disk space is used/free.
OK, I've installed the 1GB NanoBSD image, I'm satisfied with the fact that it only occupies 89% of the system partition, and it still contains a duplicate slice copy of it.
Maybe an exact brush up of the installed packages can recover a bit, but for a simple router that's perfectly fine. -
I guess that the new build is bigger because it is much more based on the standard FreeBSD distribution and we get a bunch more standard utilities built in by default.
About the image size, it increased because we are now distributing full packages instead of copy individual files and dependencies based on a copy list.
In the past I've learned (including from these forums) that installing various OS packages on a firewall increases the security risk. How's that statement changing now, with this new approach?
-
In the past I've learned (including from these forums) that installing various OS packages on a firewall increases the security risk. How's that statement changing now, with this new approach?
We are using the features built into FreeBSD to only build (or exclude) whole areas of the base OS rather than picking and choosing individual files specifically as one done in the past. This brings us closer in parity to FreeBSD which simplifies things overall and makes for a more consistent environment.
-
I know that, but how will this affect security-wise? A lot of packages will be present there, while in the past they were not… and not even needed for operation.
-
I know that, but how will this affect security-wise? A lot of packages will be present there, while in the past they were not… and not even needed for operation.
We still don't include a compiler or a compiler environment, and the sort of things we include aren't earth-shattering in terms of security, though we do need to be more careful of what is getting pulled in as dependencies. Before, we had an explicit list of things to copy in, now we take whatever a package claims to need. We have found in some cases that build dependencies were not listed as such, so they were taken as run dependencies as well, so things get added to the pile that aren't really necessary. So we need may need to fix certain ports to behave. As we find them, the image size will go down.
Like right now we're chasing down why perl is in the base system when it shouldn't be, turns out two different ports are claiming it is needed, but we may have to fiddle with some options to pare that down.
Looking at things from the FreeBSD base that are there now that were not there before, mostly it's a few libraries and binaries that we excluded. I don't see anything that wouldn't be useful in some circumstance or another off the top of my head. Some of the libraries we include now will make some packages happier as well.
As with any case when more is added in there is a potential for a security issue, but for the things we're looking at here the impact will be largely minimal.
-
I know that, but how will this affect security-wise? A lot of packages will be present there, while in the past they were not… and not even needed for operation.
We have found in some cases that build dependencies were not listed as such, so they were taken as run dependencies as well, so things get added to the pile that aren't really necessary.
Thanks for the detailed answer.
The qoute above is the reason why I was asking. I see this all the time in Linux too, seems that package devs usually mark as dependencies stuff "just to make sure" without properly checking if it's really needed or not.