-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 04/11/2014 04:19 PM, Hazel wrote:
> 
> On 7 Apr 2014 21:42, "Phil Pennock" <lopsa-t...@spodhuis.org 
> <mailto:lopsa-t...@spodhuis.org>> wrote:
>> 
>> If you're running OpenSSL 1.0.1 in any Internet-facing services,
>> then you'll want to:
>> 
>> (1) Read the advisories (2) Deploy emergency updates (either
>> 1.0.1g or with heartbeats disabled) (3) Figure out if you want to
>> do key/cert rotation on assumption of compromise
>> 
>> Short version: length-checking flaw in TLS Heartbeats allows for
>> 64kB of memory disclosure, and the researchers have proven that
>> they can use this to exfiltrate the certificate's private key,
>> and that this leaves no audit log.  Affects all releases of
>> OpenSSL 1.0.1 prior to today's "g" release.

Re: private keys — "It ain't necessarily so" [1]

> http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html
>
>  "The U.S. National Security Agency knew for at least two years
> about a flaw in the way that many websites send sensitive
> information, now dubbed the Heartbleed bug, and regularly used it
> to gather critical intelligence, two people familiar with the
> matter said."
> 
> Hahahaha...


"Two people"? *Anyone* can now say they new it for two years.

Much too much panic lately…

Šarūnas

- ----------------------------------------------------------------------
1.
http://blog.cloudflare.com/answering-the-critical-question-can-you-get-private-ssl-keys-using-heartbleed

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iEYEARECAAYFAlNIW/kACgkQVVkpJ1MUn+YApwCgiNSBSrG+/QHP5y1gmbjYJwi4
dpIAn2mn78yxl6uqKZH06t4LPxbsJEX9
=PCMF
-----END PGP SIGNATURE-----
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to