On 4/8/2014 7:47 AM, Adriaan de Jong wrote:
Using the tls-auth option should protect against this vulnerability (assuming 
that your tls-auth key is not known to the attacker).

If you're not using tls-auth and are using a vulnerable version of OpenSSL, you 
should definitely upgrade to OpenSSL 1.0.1g.

Note that you should also replace both server and client private keys, as these 
can be read by an attacker.

Perhaps a dumb question, but if the server instance is linked against an older version of openssl (9.8.x), but the client is compiled and linked against the vulnerable version, is it still an issue for both sides, or is the client going to leak private information ?

        ---Mike


--
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, m...@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/

Reply via email to