Re: [WebDNA] [ot-security] Heartbleed bug

This WebDNA talk-list message is from

2014


It keeps the original formatting.
numero = 111294
interpreted = N
texte = --047d7b414e6007a88f04f6a052df Content-Type: text/plain; charset=ISO-8859-1 I should clarify: after re-reading Donovan's post I see that he probably meant that there is no way to know if your server has been hacked **via the heartbleed bug** which is true currently. But as for general intrusions, a vigilant admin can and should be able to tell. -Dan Strong http://DanStrong.com On Wed, Apr 9, 2014 at 11:03 AM, Dan Strong wrote: > Worth noting that it doesn't affect OpenSSL versions prior to 1.0.1: > http://threatpost.com/openssl-fixes-tls-vulnerability/105300 > > Check your version from command line: > openssl version > > And as for not knowing if you've been hacked, unless the hacker went to > great lengths to cover their tracks, as long as you have a good baseline > knowledge of what goes on in your server(s) and you monitor them regularly > then you can reasonably deduce (not 100% of course) that an intrusion > occurred: > > http://pen-testing.sans.org/resources/downloads > > But good admins already know this ;-) > > -Dan Strong > http://DanStrong.com > > > On Wed, Apr 9, 2014 at 10:40 AM, Donovan Brooke wrote: > >> >> webdna'ers, >> >> This is just a courtesy notice about a significant bug going around, >> which was brought to my attention by Christophe yesterday. >> >> You can read about it on the net: "heartbleed bug" >> >> You can test your server here: http://filippo.io/Heartbleed/ >> >> It apparently affects openssl 1.0.1 through 1.0.1f >> >> You can fix it by: >> >> ##Ubuntu 12.04:------------------- >> aptitude update >> aptitude safe-upgrade >> >> then check your openssl build date: >> openssl version -b >> >> output s/b: 'built on: Mon Apr 7 20:33:29 UTC 2014' >> ----------------------------------------------------- >> >> ##CentOS 6.5:------------------- >> do a 'yum update' >> >> then check your openssl: >> rpm -q openssl >> >> The output should be: >> openssl-1.0.1e-16.el6_5.7.i686 >> ----------------------------------------------------- >> >> >> Lastly, it's a good idea to change your passwords, as there is no way >> that I have heard of that >> an admin can tell if you've been hacked. >> >> Sincerely, >> Donovan >> >> >> >> >> >> >> >> >> --------------------------------------------------------- >> This message is sent to you because you are subscribed to >> the mailing list . >> To unsubscribe, E-mail to: >> archives: http://mail.webdna.us/list/talk@webdna.us >> Bug Reporting: support@webdna.us >> > > --047d7b414e6007a88f04f6a052df Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
I should clarify: after re-reading Donovan's post I se= e that he probably meant that there is no way to know if your server has be= en hacked **via the heartbleed bug** which is true currently. But as for ge= neral intrusions, a vigilant admin can and should be able to tell.



On Wed, Apr 9, 2014 at 11:03 AM, Dan Str= ong <dan@danstrong.com> wrote:
Worth noting that it doesn't affect OpenSSL versions p= rior to 1.0.1:

Check your version from command line:
o= penssl version

And as for not knowing if you'v= e been hacked, unless the hacker went to great lengths to cover their track= s, as long as you have a good baseline knowledge of what goes on in your se= rver(s) and you monitor them regularly then you can reasonably deduce (not = 100% of course) that an intrusion occurred:


But good admins already know this ;-)

<= /font>


On Wed, Apr 9, 2014 at 10:40 AM, Donovan= Brooke <dbrooke@webdna.us> wrote:

webdna'ers,

This is just a courtesy notice about a significant bug going around, which = was brought to my attention by Christophe yesterday.

You can read about it on the net: "heartbleed bug"

You can test your server here: http://filippo.io/Heartbleed/

It apparently affects openssl 1.0.1 through 1.0.1f

You can fix it by:

##Ubuntu 12.04:-------------------
aptitude update
aptitude safe-upgrade

then check your openssl build date:
openssl version -b

output s/b: 'built on: Mon Apr =A07 20:33:29 UTC 2014'
-----------------------------------------------------

##CentOS 6.5:-------------------
do a 'yum update'

then check your openssl:
rpm -q openssl

The output should be:
openssl-1.0.1e-16.el6_5.7.i686
-----------------------------------------------------


Lastly, it's a good idea to change your passwords, as there is no way t= hat I have heard of that
an admin can tell if you've been hacked.

Sincerely,
Donovan








---------------------------------------------------------
This message is sent to you because you are subscribed to
the mailing list <ta= lk@webdna.us>.
To unsubscribe, E-mail to: <talk-leave@webdna.us>
archives: http://mail.webdna.us/list/talk@webdna.us
Bug Reporting: suppo= rt@webdna.us


--047d7b414e6007a88f04f6a052df-- Associated Messages, from the most recent to the oldest:

    
  1. Re: [WebDNA] [ot-security] Heartbleed bug (Stuart Tremain 2014)
  2. Re: [WebDNA] [ot-security] Heartbleed bug (Dan Strong 2014)
  3. Re: [WebDNA] [ot-security] Heartbleed bug (Dan Strong 2014)
  4. [WebDNA] [ot-security] Heartbleed bug (Donovan Brooke 2014)
--047d7b414e6007a88f04f6a052df Content-Type: text/plain; charset=ISO-8859-1 I should clarify: after re-reading Donovan's post I see that he probably meant that there is no way to know if your server has been hacked **via the heartbleed bug** which is true currently. But as for general intrusions, a vigilant admin can and should be able to tell. -Dan Strong http://DanStrong.com On Wed, Apr 9, 2014 at 11:03 AM, Dan Strong wrote: > Worth noting that it doesn't affect OpenSSL versions prior to 1.0.1: > http://threatpost.com/openssl-fixes-tls-vulnerability/105300 > > Check your version from command line: > openssl version > > And as for not knowing if you've been hacked, unless the hacker went to > great lengths to cover their tracks, as long as you have a good baseline > knowledge of what goes on in your server(s) and you monitor them regularly > then you can reasonably deduce (not 100% of course) that an intrusion > occurred: > > http://pen-testing.sans.org/resources/downloads > > But good admins already know this ;-) > > -Dan Strong > http://DanStrong.com > > > On Wed, Apr 9, 2014 at 10:40 AM, Donovan Brooke wrote: > >> >> webdna'ers, >> >> This is just a courtesy notice about a significant bug going around, >> which was brought to my attention by Christophe yesterday. >> >> You can read about it on the net: "heartbleed bug" >> >> You can test your server here: http://filippo.io/Heartbleed/ >> >> It apparently affects openssl 1.0.1 through 1.0.1f >> >> You can fix it by: >> >> ##Ubuntu 12.04:------------------- >> aptitude update >> aptitude safe-upgrade >> >> then check your openssl build date: >> openssl version -b >> >> output s/b: 'built on: Mon Apr 7 20:33:29 UTC 2014' >> ----------------------------------------------------- >> >> ##CentOS 6.5:------------------- >> do a 'yum update' >> >> then check your openssl: >> rpm -q openssl >> >> The output should be: >> openssl-1.0.1e-16.el6_5.7.i686 >> ----------------------------------------------------- >> >> >> Lastly, it's a good idea to change your passwords, as there is no way >> that I have heard of that >> an admin can tell if you've been hacked. >> >> Sincerely, >> Donovan >> >> >> >> >> >> >> >> >> --------------------------------------------------------- >> This message is sent to you because you are subscribed to >> the mailing list . >> To unsubscribe, E-mail to: >> archives: http://mail.webdna.us/list/talk@webdna.us >> Bug Reporting: support@webdna.us >> > > --047d7b414e6007a88f04f6a052df Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
I should clarify: after re-reading Donovan's post I se= e that he probably meant that there is no way to know if your server has be= en hacked **via the heartbleed bug** which is true currently. But as for ge= neral intrusions, a vigilant admin can and should be able to tell.



On Wed, Apr 9, 2014 at 11:03 AM, Dan Str= ong <dan@danstrong.com> wrote:
Worth noting that it doesn't affect OpenSSL versions p= rior to 1.0.1:

Check your version from command line:
o= penssl version

And as for not knowing if you'v= e been hacked, unless the hacker went to great lengths to cover their track= s, as long as you have a good baseline knowledge of what goes on in your se= rver(s) and you monitor them regularly then you can reasonably deduce (not = 100% of course) that an intrusion occurred:


But good admins already know this ;-)

<= /font>


On Wed, Apr 9, 2014 at 10:40 AM, Donovan= Brooke <dbrooke@webdna.us> wrote:

webdna'ers,

This is just a courtesy notice about a significant bug going around, which = was brought to my attention by Christophe yesterday.

You can read about it on the net: "heartbleed bug"

You can test your server here: http://filippo.io/Heartbleed/

It apparently affects openssl 1.0.1 through 1.0.1f

You can fix it by:

##Ubuntu 12.04:-------------------
aptitude update
aptitude safe-upgrade

then check your openssl build date:
openssl version -b

output s/b: 'built on: Mon Apr =A07 20:33:29 UTC 2014'
-----------------------------------------------------

##CentOS 6.5:-------------------
do a 'yum update'

then check your openssl:
rpm -q openssl

The output should be:
openssl-1.0.1e-16.el6_5.7.i686
-----------------------------------------------------


Lastly, it's a good idea to change your passwords, as there is no way t= hat I have heard of that
an admin can tell if you've been hacked.

Sincerely,
Donovan








---------------------------------------------------------
This message is sent to you because you are subscribed to
the mailing list <ta= lk@webdna.us>.
To unsubscribe, E-mail to: <talk-leave@webdna.us>
archives: http://mail.webdna.us/list/talk@webdna.us
Bug Reporting: suppo= rt@webdna.us


--047d7b414e6007a88f04f6a052df-- Dan Strong

DOWNLOAD WEBDNA NOW!

Top Articles:

Talk List

The WebDNA community talk-list is the best place to get some help: several hundred extremely proficient programmers with an excellent knowledge of WebDNA and an excellent spirit will deliver all the tips and tricks you can imagine...

Related Readings:

PSC recommends what date format yr 2000??? (1997) WC2f3 (1997) Multiple Passwords (1997) Saving Text Areas with Orders (1997) CommitDatabase vs. CloseDatabase (2001) Emailer+NetTen [same machine]=? (2000) webcat- multiple selection in input field (1997) docs for WebCatalog2 (1997) emailer w/F2 (1997) Design Help Needed (1998) Projects & Contractors (1997) REDIRECT (2001) Still trying to email... (1998) [WebDNA] Finding variable that holds "DocumentRoot" directory (2010) [OT] I am old. (2003) OK, here goes... (1997) Mime-Version in email header (1997) send mail problem? (1997) WebCat2.0 [format thousands .0f] no go (1997) WebCat2 Append problem (B14Macacgi) (1997)