“The bug, which is officially referenced as CVE-2014-0160, makes it possible for attackers to recover up to 64 kilobytes of memory from the server or client computer running a vulnerable OpenSSL version.” […]
Critical crypto bug in OpenSSL opens 2/3 of the Web to eavesdropping [merged]
OpenSSL also ships in a wide variety of operating systems and applications, including the Debian Wheezy, Ubuntu, CENTOS, Fedora, OpenBSD, FreeBSD, and OpenSUSE distributions of Linux.Fixed in Ubuntu [url=https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.12]12.04[/url], [url=https://launchpad.net/ubuntu/+source/openssl/1.0.1c-3ubuntu2.7]12.10[/url], [url=https://launchpad.net/ubuntu/saucy/+source/openssl/1.0.1e-3ubuntu1.2]13.10[/url] and [url=https://launchpad.net/ubuntu/trusty/+source/openssl/1.0.1f-1ubuntu2]14.04[/url].
DSA-2896-1 openssl – security update: Debian Security Advisory
All users are urged to upgrade their openssl packages (especially libssl1.0.0) and restart applications as soon as possible
Since this exploit leaves no trace, people should change their private keys and replace their tls certificates as well. If people know your keys even though you patched openssl, then its no use.
SSL Labs Test for the Heartbleed Attack (SSL Labs)
Why the Web Needs Perfect Forward Secrecy More Than Ever (EFF)
Patching The Heartbleed OpenSSL Vulnerability (Sucuri Security)
Comodo Advises Customers and Partners to Patch Systems to Run the Latest Version of OpenSSL in Light of ‘Heartbleed’ Vulnerability.
link eff from jowa explain that clearly
presto _ bingo : Thx JoWa.
The Heartbleed Hit List: The Passwords You Need to Change Right Now (Mashable)
“Some Internet companies that were vulnerable to the bug have already updated their servers with a security patch to fix the issue. This means you’ll need to go in and change your passwords immediately for these sites.”
Official Page http://heartbleed.com/
‘HeartBleed Checker’ https://lastpass.com/heartbleed/
Chrome heartbleed extention https://chrome.google.com/webstore/detail/chromebleed/eeoekjnjgppnaegdjbcafdggilajhpic
Revocation checking is in the news again because of a large number of revocations resulting from precautionary rotations for servers affected by the OpenSSL heartbeat bug. However, revocation checking is a complex topic and there's a fair amount of misinformation around. In short, it doesn't work and you are no more secure by switching it on. […][url=https://www.imperialviolet.org/2014/04/19/revchecking.html]No, don't enable revocation checking[/url] (Adam Langley)
Don’t know if that really fits here…
For Firefox users there is an addon called cipherfox, which allows you to at least disable RC 4 encryption for all sites.
Kind regards, REBOL.
The latest version of Cipherfox (3.7.2) obviously has a bug (i.e. parsing error).
Until fixed, i’d rather recommend to continue using version 3.7.1 which you can get here:
Kind regards, REBOL.