From nobody Tue Nov 28 16:15:09 2023 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Sfnby0PB4z528mB for ; Tue, 28 Nov 2023 16:15:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Sfnbx5VtLz3TbZ for ; Tue, 28 Nov 2023 16:15:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1701188109; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=WD8yExQj6K/j49WlZHR59QdYEYA57emiP7+70b40ru0=; b=Waon72KFLXvEhr3+pp8AFjN6Lr9sxCbHpc9FM3zDqMeRmj40QsKzejZlssutYOPPcdTSCh pGKfb8OfvA+KR8BHGB4Ftw44VTgMwvfdDphL8mN074+p1RaadHB/nWf2ix935L0NPGWJc7 tQrNT94YKcnk5Pi90cF4lEEFhErEKBkxCQn9l6D2cqEyWOMduFPrG1G/mgTkA4GrpoEqrO uiQyOz1N8ev6QRdHqDHzJpOL62rctWd3YPuAEbyK6r2eegHo8Fb4iA2KQb5OXItED6hF8U nL8sxbENnapxI8GxcGfZGVjMeHhpJhxPvE8eKsSfYUGKfOFu+ENHJYb4h1EC+w== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1701188109; a=rsa-sha256; cv=none; b=Ed+S0eNwO4M5oJRMNC7dM3srcocsyG17c+6pup8AoALavrs9aPzrMc9bxd/HdWwwSs2e+a 2mnAMZLKW1/1jbDJHzy7QJOcxCGiuNnK51mBTb7SjphzyOFsuV5AhrnbDKrpQQ6uav5NJD yGgFbXjF4AvYtmigW3eeMWhIlDZyPcAWJxA19rmSQLR1KM1acmKbHVnpi+6D+WH1vKRocU KWoxcfvzF+mT33NWCjwOYzySpQyh1YfM0gpbpXGYNzZ/pqTBQmDMWXfKw/4f/qsCCG92fQ nPyWvyUT//iyVx/qUE6KIQNnhNNmYRWyWfdxOQd/9yo6XbJBYJXayYOkQ5xiLg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Sfnbx4bQYzTTW for ; Tue, 28 Nov 2023 16:15:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 3ASGF988090971 for ; Tue, 28 Nov 2023 16:15:09 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 3ASGF92q090970 for ports-bugs@FreeBSD.org; Tue, 28 Nov 2023 16:15:09 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 261555] 410.pkg-audit: suggested patch to improve expiry by handling anticongestion delay better Date: Tue, 28 Nov 2023 16:15:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: wbe@psr.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports-bugs@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D261555 --- Comment #1 from wbe@psr.com --- This patch may not be needed for FreeBSD 14. Although my cursory scan of crontab and periodic tables didn't find who's d= oing it, with 14.0, I'm seeing vuln.xml consistently fetched at 00:30 on the days it's fetched. If you're eliminating anticongestion by fetching vuln.xml at= a consistent time separately from the vulnerability scan at 03:02 - 04:01 as = was the case in 13.2 and earlier, then obviously no anticongestion accommodatio= n is needed. However, if load on your servers is an issue, the patch + fetching at a variable (anticongestion) time later (when periodic runs the security tests) may be better for getting the #days between fetches right than the new meth= od of always fetching at 00:30. -WBE --=20 You are receiving this mail because: You are the assignee for the bug.=