Yes. That is my understanding.
We could put our web store back on line with the old certificate, but it is theoretically possible* that someone has been able to find the private key. Right now, we are playing it safe. It it takes several days for our re-issued certificate to get signed, well...

—Barry

*But unlikely considering that any hackers have several million other honeypots to hack.


On 10 Apr 2014, at 10:20, Joshua Thorp wrote:

according to 
[https://www.schneier.com/blog/archives/2014/04/heartbleed.html](https://www.schneier.com/blog/archives/2014/04/heartbleed.html)
[http://security.stackexchange.com/questions/55382/heartbleed-read-only-the-next-64k-and-hyping-the-threat](http://security.stackexchange.com/questions/55382/heartbleed-read-only-the-next-64k-and-hyping-the-threat)


apparently the bug gives access to 64K chunk of ram on the server.  The private key might be in that chunk,  but probably won’t be…  however you will get different chunks over time so if you wait long enough you might end up with a chunk that has a private key or someone’s password.


—joshua
 

On Apr 10, 2014, at 10:05 AM, Owen Densmore <[[email protected]](mailto:[email protected])> wrote:

Hi Barry.  How would the private keys be exposed?  The pub/priv computation is done locally, right?

============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to