On 09/04/14 14:17, Sam Gleske wrote:
> On Tue, Apr 8, 2014 at 11:01 PM, Felipe Vieira <fmv1...@gmail.com
> <mailto:fmv1...@gmail.com>> wrote:
>
>     Dear GNUPG community,
>     I think a lot of unexperienced users would like to know more about
>     the Heartbleed problem found on some of the openssl versions. I
>     have two broad questions and two specific questions:
>     1) Which type of clients have been compromised (consider an
>     ordinary user)?
>     2) Which common applications use openssl and are a potential target?
>
>     2) Are firefox users compromised?
>     3) Are RetroShare users compromised?
>     Thanks in advance.
>
>
> For the most part it is service providers who are affected by the
> bug.  There's a handy website to verbosely explain heartbleed.
>
> http://heartbleed.com/
>
> Affected services include HTTP, email servers (SMTP, POP and IMAP
> protocols), chat servers (XMPP protocol), virtual private networks
> (SSL VPNs), databases (e.g. mysql), and pretty much any service that
> uses openssl TSL/SSL to secure transport of services if they're
> recently patched.
>
> Security notices for popular server distros...
> RHEL - https://access.redhat.com/site/solutions/781793
> Ubuntu - http://www.ubuntu.com/usn/usn-2165-1/
>
> CLIENT
>
> There's not much you can do at this point.  Update your system
> packages and that's about it.
>
> SERVICE PROVIDER
> Essentially you want to take the following steps if you're  service
> provider.
>
> 1. Test for the vulnerability - http://pastebin.com/WmxzjkXJ it is
> also prudent to search for the affected package versions across all
> services.
> 2. If vulnerable patch the OpenSSL version of public front end
> services first.  Patch backend services after the front end is secure.
> 3. Reissue SSL private keys and certificates.  Since the leak exposes
> the private key it is no longer pristine.
>
> For the remaining more thorough steps of what to do see the
> heartbleed.org <http://heartbleed.org> website which has a nice set of
> instructions.
>
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
It is imperative you revoke old keys! Not just reissue!

Regards,
Tristan

-- 

Tristan Santore BSc MBCS
TS4523-RIPE
Network and Infrastructure Operations
InterNexusConnect
Mobile +44-78-55069812
tristan.sant...@internexusconnect.net

Former Thawte Notary
(Please note: Thawte has closed its WoT programme down,
and I am therefore no longer able to accredit trust)

For Fedora related issues, please email me at:
tsant...@fedoraproject.org

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to