On 10 Apr 2014, at 10:38, John Breen <jbr...@isc.upenn.edu> wrote:
> So a quick clarification here...
> 
> Are we saying that a cosign service credential can not be leaked via 
> heartbleed to a 3rd party even if the cosign client service is 
> vulnerable? That the cosign client service credential could only be 
> obtained by using the cosignd server as an attack vector?
> 
> Why is the cosign client credential different than say an SSL 
> certificate as far as it potentially being in memory that might be leaked?

It's not at all!  Since the server is (hopefully) running HTTPS, that would be 
the vector.  mod_cosign would be a vector as well, but only really exposed to 
the connected cosignd.  To clarify: rekeying would be wise.

:wes
------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
_______________________________________________
Cosign-discuss mailing list
Cosign-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/cosign-discuss

Reply via email to