Welcome, Guest. Please login or register.

Author Topic: Heartbleed  (Read 2727 times)

Description:

0 Members and 1 Guest are viewing this topic.

Offline slaapliedje

  • Lifetime Member
  • Hero Member
  • *****
  • Join Date: Oct 2010
  • Posts: 843
  • Country: 00
  • Thanked: 1 times
    • Show all replies
Re: Heartbleed
« on: April 10, 2014, 02:20:25 PM »
The versions in question that are vulnerable are versions 1.0.0 - 1.0.1f (they fixed it in 1.0.1g).  So if you're running Debian Squeeze, or something older that is using 0.9.8* then you're safe from heartbleed.  

I am running something newer, and have already patched my stuff, fortunately I only had a few servers that needed it.  Reissuing SSL keys is annoying as well, but I did that.

slaapliedje
A4000D: Mediator 4000Di; Voodoo 3, ZorRAM 128MB, 10/100mb Ethernet, Spider 2. Cyberstorm PPC 060/50 604e/420.
 

Offline slaapliedje

  • Lifetime Member
  • Hero Member
  • *****
  • Join Date: Oct 2010
  • Posts: 843
  • Country: 00
  • Thanked: 1 times
    • Show all replies
Re: Heartbleed
« Reply #1 on: April 10, 2014, 02:57:41 PM »
It also has to do with whether or not the service in question uses a heartbeat.  So things like Apache are vulnerable, but OpenSSH is not.  At least from what I've been reading.  So yeah, clients wouldn't really be affected.  I wouldn't be 100% sure about that, but I can be fairly certain that OpenSSL for the Amiga shouldn't be affected, I don't think it's been updated in quite some time.

slaapliedje
A4000D: Mediator 4000Di; Voodoo 3, ZorRAM 128MB, 10/100mb Ethernet, Spider 2. Cyberstorm PPC 060/50 604e/420.