Exactly, OpenSSH depends on OpenSSL, but should never use the buggy code.

Some details in the answer here:
http://superuser.com/questions/739349/does-heartbleed-affect-ssh-keys


On 04/10/2014 07:00 PM, Randolph Maaßen wrote:
> The Heartbleed bug is in the Heartbeat function of TSL (a second keep
> alive). OpenSSL does not use TLS for transport security, it uses its
> own Protokoll for security.
> 
> 2014-04-10 12:51 GMT+02:00 Nilesh Govindrajan <m...@nileshgr.com>:
>> On Thu, Apr 10, 2014 at 4:22 PM, Matthew Finkel
>> <matthew.fin...@gmail.com> wrote:
>>> On Thu, Apr 10, 2014 at 05:53:44PM +0800, J?n Zahornadsk? wrote:
>>>> On 04/10/2014 05:03 PM, Adam Carter wrote:
>>>>>
>>>>>     What surprises me here is OpenSSH. It's not supposed to use OpenSSL
>>>>>     but Debian update process suggests to restart it after updating
>>>>>     OpenSSL to a fixed version. Is it an overkill on their part? It
>>>>>     might confuse admins.
>>>>>
>>>>>
>>>>> adam@proxy ~ $ ldd /usr/sbin/sshd
>>>>>     linux-vdso.so.1 (0x00007fffb068e000)
>>>>>     libwrap.so.0 => /lib64/libwrap.so.0 (0x00007f68db1e6000)
>>>>>     libpam.so.0 => /lib64/libpam.so.0 (0x00007f68dafd8000)
>>>>>     libcrypto.so.1.0.0 => /usr/lib64/libcrypto.so.1.0.0 
>>>>> (0x00007f68dabf5000)
>>>>>     libutil.so.1 => /lib64/libutil.so.1 (0x00007f68da9f2000)
>>>>>     libz.so.1 => /lib64/libz.so.1 (0x00007f68da7db000)
>>>>>     libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00007f68da5a4000)
>>>>>     libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f68da387000)
>>>>>     libc.so.6 => /lib64/libc.so.6 (0x00007f68d9fd7000)
>>>>>     libgcc_s.so.1 =>
>>>>> /usr/lib/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1 (0x00007f68d9dc0000)
>>>>>     libdl.so.2 => /lib64/libdl.so.2 (0x00007f68d9bbc000)
>>>>>     /lib64/ld-linux-x86-64.so.2 (0x00007f68db3f1000)
>>>>> adam@proxy ~ $ qfile /usr/lib64/libcrypto.so.1.0.0
>>>>> dev-libs/openssl (/usr/lib64/libcrypto.so.1.0.0)
>>>>> adam@proxy ~ $
>>>>>
>>>>> So OpenSSH clearly IS using OpenSSL, and you need to restart sshd after
>>>>> upgrading OpenSSL.
>>>>
>>>> As far as I know, it doesn't use it for the communication itself, just
>>>> some key generations, so it shouldn't be affected by this bug. But I
>>>> guess better safe than sorry...
>>>>
>>>
>>> Right. heartbleed does not directly affect openssh, but openssh uses
>>> openssl and it's good practice to keep the shared libraries on-disk and
>>> the shared libraries in-memory in sync.
>>>
>>
>>
>> How is OpenSSH not affected?
>>
> 
> 
> 


Reply via email to