Yeah, you’re right; e.g. my own tbray.org server is fine because it’s
been up for 1080 days and has openssl 0.9.8.  My estimation of NSA’s
cleverness is a little lower than yours, I bet it was a surprise to
them too.  Someone should ask Snowden ;)

On Tue, Apr 8, 2014 at 7:51 AM, Igor Roshchin <[email protected]> wrote:
>
> Tim,
>
> Thanks a lot for the heads-up.
> Apparently, I saw it here before I saw it through the "proper" channels.
>
> Strictly speaking it is not a "zero-day", as it was introduced in the
> version 1.0.1, and the earlier versions are not vulnerable.
> (I haven't seen any discussion of this yet, but I wouldn't be too
> surprised if the NSA had known about this bug way before the disclosure.)
>
> Cheers,
>
> Igor
>
>
> On 4/7/2014 8:13 PM, Tim Bray wrote:
>> In the unlikely event that any of you run https-enabled web sites and
>> haven't visited heartbleed.com today, get thee over there post-haste
>> and find out what version of OpenSSL you're running and consider
>> replacing your certs, stat.
>>
>> I'm not sure I've ever seen a more damaging zero-day.
>>
>
> --
> PDML Pentax-Discuss Mail List
> [email protected]
> http://pdml.net/mailman/listinfo/pdml_pdml.net
> to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
> the directions.

-- 
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
the directions.

Reply via email to