The NSA ain't all that clever, but some of the contractors they hire might be.

On 4/8/2014 11:20 AM, Tim Bray wrote:
Yeah, you’re right; e.g. my own tbray.org server is fine because it’s
been up for 1080 days and has openssl 0.9.8.  My estimation of NSA’s
cleverness is a little lower than yours, I bet it was a surprise to
them too.  Someone should ask Snowden ;)

On Tue, Apr 8, 2014 at 7:51 AM, Igor Roshchin <[email protected]> wrote:

Tim,

Thanks a lot for the heads-up.
Apparently, I saw it here before I saw it through the "proper" channels.

Strictly speaking it is not a "zero-day", as it was introduced in the
version 1.0.1, and the earlier versions are not vulnerable.
(I haven't seen any discussion of this yet, but I wouldn't be too
surprised if the NSA had known about this bug way before the disclosure.)

Cheers,

Igor


On 4/7/2014 8:13 PM, Tim Bray wrote:
In the unlikely event that any of you run https-enabled web sites and
haven't visited heartbleed.com today, get thee over there post-haste
and find out what version of OpenSSL you're running and consider
replacing your certs, stat.

I'm not sure I've ever seen a more damaging zero-day.


--
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
the directions.


--
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
the directions.

Reply via email to