On Mon, 07 Apr 2014 21:36:28 -0400, Nick Sabalausky <[email protected]> wrote:

On 4/7/2014 7:28 PM, w0rp wrote:
http://heartbleed.com/

This bug has been getting around. The bug was caused by missing bounds
checking.

I'm glad to be using a language with bounds checking.

Whelp, time for that server system upgrade I've been putting off for far too long...


In theory, patching openSSL doesn't solve the problem, because someone could have previously used the vulnerability to get your private key.

So technically you need to also get a new cert. This is what my password-generation vendor (lastpass.com) is recommending:

1. Generate a new password for your most critical sites.
2. But only after they get a cert dated after today!

I don't think many people understand this aspect.

Hopefully, this vulnerability was not known by hackers before it was announced. Even if it was, there is quite a window of opportunity for them as the patched sites roll out.

-Steve

Reply via email to