cacert-sysadm AT lists.cacert.org
Subject: CAcert System Admins discussion list
List archive
- From: Michael Tänzer <michael.taenzer AT cacert.org>
- To: cacert-sysadm AT lists.cacert.org, iang AT iang.org
- Subject: Re: OpenSSL 'Heartbleed' bug
- Date: Tue, 08 Apr 2014 03:18:29 +0200
- Openpgp: id=E53B124B
Hi Mendel,
On 08.04.2014 00:10, Mendel Mobach wrote:
> On 07 Apr 2014, at 23:19, ianG
> <iang AT iang.org>
> wrote:
>> http://heartbleed.com/
> We run openssl-older, no problem at www and signer at least. I did
> not check OCSP yet, but OCSP should not run over ssl.
The OCSP server has three certs, two for the OCSP responder itself and
one to allow transport encryption for the OCSP requests. The transport
encryption certificate (serial number 931461 (0xe3685)) could be
affected if the OCSP server runs one of the vulnerable openssl versions.
This does NOT mean that the OCSP server _itself_ is compromised, the
effect could be however that an attacker can decrypt the traffic so that
information about which CAcert certificates a user is validating could
be exposed -> privacy issue.
> If you need to upgrade your openssl, consider at least your ssl stuff
> compromized. Generate new keys.
If the OCSP server runs an affected OpenSSL version please upgrade,
generate a new transport cert and send me the CSR.
--
Thanks,
Michael Tänzer
Attachment:
signature.asc
Description: OpenPGP digital signature
- OpenSSL 'Heartbleed' bug, ianG, 04/07/2014
- Re: OpenSSL 'Heartbleed' bug, Mendel Mobach, 04/07/2014
- Re: OpenSSL 'Heartbleed' bug, Michael Tänzer, 04/08/2014
- Re: OpenSSL 'Heartbleed' bug, Wytze van der Raay, 04/08/2014
- Re: OpenSSL 'Heartbleed' bug, Mendel Mobach, 04/07/2014
Archive powered by MHonArc 2.6.18.