Right you are. I did just run it against OR port and it tells it
rejected early CCS. So it must be web server related problem.
Thanks!
On 06/23/2014 08:28 AM, andr...@reichster.de wrote:
...
> but you could check against different ports with the tripwire python
> script [1] to check if its a we
And i completely ignored that this is just testing for heartbleed and
not the latest openssl cve.
so just ignore my previous mail :)
but you could check against different ports with the tripwire python
script [1] to check if its a web-server issue or not.
i just ran it against my ORPort and i
Not exactly a direct openSSL-Test, but you could check your specific
OR-Port (or any other port you want to check) and see if it's a
web-server related problem or not.
i find this site quite useful:
https://filippo.io/Heartbleed/
if you are checking you OR-Port tick the: "Advanced (might cause
Yes, both Qualys and Tripwire tests are testing a web server's HTTPS port.
Yes, I do run mod_pagespeed on the web server. Alas, I get the same
result when I disable it and restart Apache. It is however an
interesting direction to investigate, since now I am thinking of
examining other modules as w
At least the qualys online test is only testing port 443 - could it be
that you run your web-server on this port?
If you run your web-server with e.g. mod-spdy you also have to update
mod-spdy because it is built with its own openssl.
This was a problem on my server too (not fedora or Centos tough
Basically, I am left to conclude that (1) the latest update on
Fedora/Centos does not patch CCS Injection vulnerability or (2) the test
is wrong--correction, both Tripwire and Qualys tests are wrong or (3)
between a Fedora and two Centos machines, one of which is really just a
test machine, all are
And now I have tried a reboot. No change. Weird ...
On 06/20/2014 12:32 PM, cbr...@hush.com wrote:
> Agreed. I had a few other issues and went the reboot route.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cg
Yes, I tried below steps, other than 'yum ps'.
On 06/21/2014 02:00 PM, Martin Bukatovič wrote:
...
> You have probably figured this out already (you just needs to restart
> the tor daemon), but you may find the following handy (Fedora, CentOS,
> RHEL specific):
>
> To find out if your openssl p
On 06/20/2014 06:47 AM, Tora Tora Tora wrote:
> Regretfully, I have to shutdown my two middle relays (not too big, you
> won't even notice it :-D), since I am unable to resolve issues with the
> latest OpenSSL bug.
>
> I was able to find upgraded packages for Centos and Fedora that are
> supposed
Agreed. I had a few other issues and went the reboot route.
On 06/20/2014 at 10:42 AM, "Steve Snyder" wrote:You don't have to
reboot the server. Just do a "lsof | grep DEL" (and maybe "lsof |
grep delete") and restart those services that are using upgraded
libraries.
That said, there have been
You don't have to reboot the server. Just do a "lsof | grep DEL" (and maybe
"lsof | grep delete") and restart those services that are using upgraded
libraries.
That said, there have been a couple of kernel updates in recent weeks (the
latest being yesterday), so it is advisable to bite the bul
Sorry, I wasn't specific. I am running the latest Centos 6.5, build tor
from source (0.2.5.4), have restarted all applications and confirmed the
library used with 'lsof'. Since it is running other services, I have not
tried to reboot yet.
On 06/20/2014 07:45 AM, Steve Snyder wrote:
>
>
> On 06/
Yes, restarted the applications and verified with 'lsof'
On 06/20/2014 04:12 AM, Simon Hanna wrote:
...
> Did you restart all applications that are using openssl? If not, they
> continue to use the old librariers. Best way is to just do a complete
> restart..
___
On 06/20/2014 12:47 AM, Tora Tora Tora wrote:
[snip]
If someone can suggest a resolution that works, I might be able to keep
them running, otherwise I see no point in running vulnerable relays
until I figure things out.
Suggestion #1: upgrade to current version of your OS and apply all
updat
On Fri, Jun 20, 2014 at 6:47 AM, Tora Tora Tora wrote:
> Regretfully, I have to shutdown my two middle relays (not too big, you
> won't even notice it :-D), since I am unable to resolve issues with the
> latest OpenSSL bug.
>
> I was able to find upgraded packages for Centos and Fedora that are
>
Regretfully, I have to shutdown my two middle relays (not too big, you
won't even notice it :-D), since I am unable to resolve issues with the
latest OpenSSL bug.
I was able to find upgraded packages for Centos and Fedora that are
supposed to address CVE-2014-0224 vulnerability (the change log cla
16 matches
Mail list logo