> In case of the last remaining 7 servers (= every 5th server) the test
> showed an exploit opportunity related to CVE-2014-0224 [4], which can
> be eliminated by simply updating the OpenSSL package on these systems.
> As I'm not that much deep in the topic I'm not sure about the impact
> of this issue on the security of hkps connections. Perhaps anyone can

_Every_ SSL encrypted traffic of these servers can be decoded by
an eavesdropper after silently eliciting the secret key.

> give an advise here. Could this be a threat and should be also checked
> before including servers to the hkps pool?

Definitely yes.

Gabor

_______________________________________________
Sks-devel mailing list
[email protected]
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to