Skip to Content.
Sympa Menu

cacert-sysadm - Re: OpenSSL 'Heartbleed' bug

cacert-sysadm AT lists.cacert.org

Subject: CAcert System Admins discussion list

List archive

Re: OpenSSL 'Heartbleed' bug


Chronological Thread 
  • From: Michael Tänzer <michael.taenzer AT cacert.org>
  • To: cacert-sysadm AT lists.cacert.org, iang AT iang.org
  • Subject: Re: OpenSSL 'Heartbleed' bug
  • Date: Tue, 08 Apr 2014 03:18:29 +0200
  • Openpgp: id=E53B124B

Hi Mendel,

On 08.04.2014 00:10, Mendel Mobach wrote:
> On 07 Apr 2014, at 23:19, ianG
> <iang AT iang.org>
> wrote:
>> http://heartbleed.com/

> We run openssl-older, no problem at www and signer at least. I did
> not check OCSP yet, but OCSP should not run over ssl.

The OCSP server has three certs, two for the OCSP responder itself and
one to allow transport encryption for the OCSP requests. The transport
encryption certificate (serial number 931461 (0xe3685)) could be
affected if the OCSP server runs one of the vulnerable openssl versions.
This does NOT mean that the OCSP server _itself_ is compromised, the
effect could be however that an attacker can decrypt the traffic so that
information about which CAcert certificates a user is validating could
be exposed -> privacy issue.

> If you need to upgrade your openssl, consider at least your ssl stuff
> compromized. Generate new keys.

If the OCSP server runs an affected OpenSSL version please upgrade,
generate a new transport cert and send me the CSR.

--
Thanks,
Michael Tänzer

Attachment: signature.asc
Description: OpenPGP digital signature




Archive powered by MHonArc 2.6.18.

Top of Page