OpenSSL leaks server-Keys / The Heartbleed Bug

Raul Hugo sherlockhugo at gmail.com
Tue Apr 8 22:22:40 UTC 2014


I see this on Linux-Plug list:

"If your operating system uses OpenSSL 1.0.1 its servers are vulnerable.

CentOS and pulled his patch here:

http://lists.centos.org/pipermail/centos-announce/2014-April/020249.html

If you have servers with Ubuntu 12.04 LTS you should take a look at this
discussion:

http://serverfault.com/questions/587574/apache-2-is-still-vulnerable-to-heartbleed-after-update-reboot"


2014-04-08 17:18 GMT-05:00 mex <nginx-forum at nginx.us>:

> Guide to Nginx + SSL + SPDY has been updated with some infos, links and
> tests
> regarding heartbleed
>
> https://www.mare-system.de/guide-to-nginx-ssl-spdy-hsts/#heartbleed
>
>
>
>
> regards,
>
> mex
>
> Posted at Nginx Forum:
> http://forum.nginx.org/read.php?2,249102,249131#msg-249131
>
> _______________________________________________
> nginx mailing list
> nginx at nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
>



-- 
Un abrazo!


*Raúl Hugo <http://twitter.com/raulhugo>*


*Miembro Asociadohttp://apesol.org.pe <http://apesol.org.pe/>SysAdmin Cel.
#961-710-096  Linux Registered User #482081 - http://counter.li.org/
<http://counter.li.org/>P Antes de imprimir este e-mail piense bien si es
necesario hacerlo*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nginx.org/pipermail/nginx/attachments/20140408/9e629be5/attachment.html>


More information about the nginx mailing list