OpenSSL leaks server-Keys / The Heartbleed Bug
Raul Hugo
sherlockhugo at gmail.com
Tue Apr 8 22:22:40 UTC 2014
I see this on Linux-Plug list:
"If your operating system uses OpenSSL 1.0.1 its servers are vulnerable.
CentOS and pulled his patch here:
http://lists.centos.org/pipermail/centos-announce/2014-April/020249.html
If you have servers with Ubuntu 12.04 LTS you should take a look at this
discussion:
http://serverfault.com/questions/587574/apache-2-is-still-vulnerable-to-heartbleed-after-update-reboot"
2014-04-08 17:18 GMT-05:00 mex <nginx-forum at nginx.us>:
> Guide to Nginx + SSL + SPDY has been updated with some infos, links and
> tests
> regarding heartbleed
>
> https://www.mare-system.de/guide-to-nginx-ssl-spdy-hsts/#heartbleed
>
>
>
>
> regards,
>
> mex
>
> Posted at Nginx Forum:
> http://forum.nginx.org/read.php?2,249102,249131#msg-249131
>
> _______________________________________________
> nginx mailing list
> nginx at nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
>
--
Un abrazo!
*Raúl Hugo <http://twitter.com/raulhugo>*
*Miembro Asociadohttp://apesol.org.pe <http://apesol.org.pe/>SysAdmin Cel.
#961-710-096 Linux Registered User #482081 - http://counter.li.org/
<http://counter.li.org/>P Antes de imprimir este e-mail piense bien si es
necesario hacerlo*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nginx.org/pipermail/nginx/attachments/20140408/9e629be5/attachment.html>
More information about the nginx
mailing list