-----Original Message-----
From: Davide Brini [mailto:dave...@gmx.com] 
Sent: dinsdag 8 april 2014 13:26
To: openvpn-devel@lists.sourceforge.net
Subject: Re: [Openvpn-devel] Heartbleed

> On Tue, 08 Apr 2014 11:08:59 +0200, Tore Anderson <t...@fud.no> wrote:

> > I'm guessing that everyone has seen http://heartbleed.com/ by now.
> > 
> > My question is simple: Could anyone confirm whether or not OpenVPN is 
> > vulnerable (when linked to a vulnerable version of OpenSSL)?


> This is James' reply on the devel list:


> Using the tls-auth option should protect against this vulnerability (assuming 
> that your tls-auth key is not known to the attacker).

> If you're not using tls-auth and are using a vulnerable version of OpenSSL, 
> you should definitely upgrade to OpenSSL 1.0.1g.

Note that you should also replace both server and client private keys, as these 
can be read by an attacker.

Reply via email to