Coming soon - Get a detailed view of why an account is flagged as spam!
view details

This post has been de-listed

It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.

30
Critical OpenSSL bug (CVE-2014-0160), please update and regenerate your server keys
Post Body

There is a critical bug within OpenBSD's OpenSSL library that is used by pretty much every distribution of linux including Debian, Ubuntu, Arch and CentOS. This bug has been assigned CVE-2014-0160 and technical details can be found at The Heartbleed bug.

This bug has the potential of leaking your private keys and other sensitive information. Please update your OpenSSL to the newest available version (1.0.1e-2 deb7u5 or 1.0.1g on Debian) and regenerate your server keys.

At minimum you should regenerate your server hostkeys. You should probably also regenerate any OpenVPN or self-signed SSL certificates. Below are the steps to regenerate your server keys under Debian. Similar should work across any distro.

apt-get update
apt-get upgrade -y
reboot
/bin/rm /etc/ssh/ssh_host* && dpkg-reconfigure openssh-server
reboot

At Feral Hosting we began implement these fixes last night and have updated our status page to reflect this. Please note the new hostkeys.

This bug is considered critical and you should implement these fixes immediately.

Please upvote for visibility, self-post karma is useless

Edit: spelling

Author
Account Strength
100%
Account Age
13 years
Verified Email
Yes
Verified Flair
No
Total Karma
14,062
Link Karma
951
Comment Karma
13,111
Profile updated: 2 days ago
Posts updated: 4 months ago

Subreddit

Post Details

We try to extract some basic information from the post title. This is not always successful or accurate, please use your best judgement and compare these values to the post title and body for confirmation.
Posted
10 years ago