Bear in mind that there is no way to tell if you've been compromised or not. If 
you can, it's worth erring on the side of caution. 

Phil Pennock <lopsa-t...@spodhuis.org> wrote:

>If you're running OpenSSL 1.0.1 in any Internet-facing services, then
>you'll want to:
>
> (1) Read the advisories
> (2) Deploy emergency updates (either 1.0.1g or with heartbeats disabled)
> (3) Figure out if you want to do key/cert rotation on assumption of
>     compromise
>
>Short version: length-checking flaw in TLS Heartbeats allows for 64kB of
>memory disclosure, and the researchers have proven that they can use
>this to exfiltrate the certificate's private key, and that this leaves
>no audit log.  Affects all releases of OpenSSL 1.0.1 prior to today's
>"g" release.
>
>http://www.openssl.org/news/vulnerabilities.html#2014-0160
>http://heartbleed.com/
>
>-Phil
>
>_______________________________________________
>Tech mailing list
>Tech@lists.lopsa.org
>https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
>This list provided by the League of Professional System Administrators
> http://lopsa.org/
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to