Sean O'Connor wrote: > Remember that if this effects you, you should also manually regenerate any > self-signed SSL certs and public authentication key pairs created by > effected systems. > -Sean > _______________________________________________ > Mid-Hudson Valley Linux Users Group http://mhvlug.org > > http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug > Upcoming Meetings (6pm - 8pm) MHVLS Auditorium > > Jun 4 - Sqeak! and eToys > Jul 2 - KVM (Tenative) > Aug 6 - Zenos > Sep 3 - TBD
The Ubuntu updates came with a neat tool that checks all your user keys to see if they are suspect as well, ssl-vulnkey. You can do the same thing by sshing to a fixed ubuntu box with the blacklist setup, but this is a bit simpler. _______________________________________________ Mid-Hudson Valley Linux Users Group http://mhvlug.org http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug Upcoming Meetings (6pm - 8pm) MHVLS Auditorium Jun 4 - Sqeak! and eToys Jul 2 - KVM (Tenative) Aug 6 - Zenos Sep 3 - TBD
