Sean O'Connor wrote:
> Remember that if this effects you, you should also manually regenerate any
> self-signed SSL certs and public authentication key pairs created by
> effected systems.
> -Sean
> _______________________________________________
> Mid-Hudson Valley Linux Users Group                  http://mhvlug.org        
>      
> http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug                           
> Upcoming Meetings (6pm - 8pm)                         MHVLS Auditorium        
>           
>   Jun 4 - Sqeak! and eToys
>   Jul 2 - KVM (Tenative)
>   Aug 6 - Zenos
>   Sep 3 - TBD

The Ubuntu updates came with a neat tool that checks all your user keys 
to see if they are suspect as well, ssl-vulnkey. You can do the same 
thing by sshing to a fixed ubuntu box with the blacklist setup, but this 
is a bit simpler.
_______________________________________________
Mid-Hudson Valley Linux Users Group                  http://mhvlug.org          
   
http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug                           
Upcoming Meetings (6pm - 8pm)                         MHVLS Auditorium          
        
  Jun 4 - Sqeak! and eToys
  Jul 2 - KVM (Tenative)
  Aug 6 - Zenos
  Sep 3 - TBD

Reply via email to