Re: [WebDNA] [ot-security] Heartbleed bug

This WebDNA talk-list message is from

2014


It keeps the original formatting.
numero = 111294
interpreted = N
texte = --047d7b414e6007a88f04f6a052df Content-Type: text/plain; charset=ISO-8859-1 I should clarify: after re-reading Donovan's post I see that he probably meant that there is no way to know if your server has been hacked **via the heartbleed bug** which is true currently. But as for general intrusions, a vigilant admin can and should be able to tell. -Dan Strong http://DanStrong.com On Wed, Apr 9, 2014 at 11:03 AM, Dan Strong wrote: > Worth noting that it doesn't affect OpenSSL versions prior to 1.0.1: > http://threatpost.com/openssl-fixes-tls-vulnerability/105300 > > Check your version from command line: > openssl version > > And as for not knowing if you've been hacked, unless the hacker went to > great lengths to cover their tracks, as long as you have a good baseline > knowledge of what goes on in your server(s) and you monitor them regularly > then you can reasonably deduce (not 100% of course) that an intrusion > occurred: > > http://pen-testing.sans.org/resources/downloads > > But good admins already know this ;-) > > -Dan Strong > http://DanStrong.com > > > On Wed, Apr 9, 2014 at 10:40 AM, Donovan Brooke wrote: > >> >> webdna'ers, >> >> This is just a courtesy notice about a significant bug going around, >> which was brought to my attention by Christophe yesterday. >> >> You can read about it on the net: "heartbleed bug" >> >> You can test your server here: http://filippo.io/Heartbleed/ >> >> It apparently affects openssl 1.0.1 through 1.0.1f >> >> You can fix it by: >> >> ##Ubuntu 12.04:------------------- >> aptitude update >> aptitude safe-upgrade >> >> then check your openssl build date: >> openssl version -b >> >> output s/b: 'built on: Mon Apr 7 20:33:29 UTC 2014' >> ----------------------------------------------------- >> >> ##CentOS 6.5:------------------- >> do a 'yum update' >> >> then check your openssl: >> rpm -q openssl >> >> The output should be: >> openssl-1.0.1e-16.el6_5.7.i686 >> ----------------------------------------------------- >> >> >> Lastly, it's a good idea to change your passwords, as there is no way >> that I have heard of that >> an admin can tell if you've been hacked. >> >> Sincerely, >> Donovan >> >> >> >> >> >> >> >> >> --------------------------------------------------------- >> This message is sent to you because you are subscribed to >> the mailing list . >> To unsubscribe, E-mail to: >> archives: http://mail.webdna.us/list/talk@webdna.us >> Bug Reporting: support@webdna.us >> > > --047d7b414e6007a88f04f6a052df Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
I should clarify: after re-reading Donovan's post I se= e that he probably meant that there is no way to know if your server has be= en hacked **via the heartbleed bug** which is true currently. But as for ge= neral intrusions, a vigilant admin can and should be able to tell.



On Wed, Apr 9, 2014 at 11:03 AM, Dan Str= ong <dan@danstrong.com> wrote:
Worth noting that it doesn't affect OpenSSL versions p= rior to 1.0.1:

Check your version from command line:
o= penssl version

And as for not knowing if you'v= e been hacked, unless the hacker went to great lengths to cover their track= s, as long as you have a good baseline knowledge of what goes on in your se= rver(s) and you monitor them regularly then you can reasonably deduce (not = 100% of course) that an intrusion occurred:


But good admins already know this ;-)

<= /font>


On Wed, Apr 9, 2014 at 10:40 AM, Donovan= Brooke <dbrooke@webdna.us> wrote:

webdna'ers,

This is just a courtesy notice about a significant bug going around, which = was brought to my attention by Christophe yesterday.

You can read about it on the net: "heartbleed bug"

You can test your server here: http://filippo.io/Heartbleed/

It apparently affects openssl 1.0.1 through 1.0.1f

You can fix it by:

##Ubuntu 12.04:-------------------
aptitude update
aptitude safe-upgrade

then check your openssl build date:
openssl version -b

output s/b: 'built on: Mon Apr =A07 20:33:29 UTC 2014'
-----------------------------------------------------

##CentOS 6.5:-------------------
do a 'yum update'

then check your openssl:
rpm -q openssl

The output should be:
openssl-1.0.1e-16.el6_5.7.i686
-----------------------------------------------------


Lastly, it's a good idea to change your passwords, as there is no way t= hat I have heard of that
an admin can tell if you've been hacked.

Sincerely,
Donovan








---------------------------------------------------------
This message is sent to you because you are subscribed to
the mailing list <ta= lk@webdna.us>.
To unsubscribe, E-mail to: <talk-leave@webdna.us>
archives: http://mail.webdna.us/list/talk@webdna.us
Bug Reporting: suppo= rt@webdna.us


--047d7b414e6007a88f04f6a052df-- Associated Messages, from the most recent to the oldest:

    
  1. Re: [WebDNA] [ot-security] Heartbleed bug (Stuart Tremain 2014)
  2. Re: [WebDNA] [ot-security] Heartbleed bug (Dan Strong 2014)
  3. Re: [WebDNA] [ot-security] Heartbleed bug (Dan Strong 2014)
  4. [WebDNA] [ot-security] Heartbleed bug (Donovan Brooke 2014)
--047d7b414e6007a88f04f6a052df Content-Type: text/plain; charset=ISO-8859-1 I should clarify: after re-reading Donovan's post I see that he probably meant that there is no way to know if your server has been hacked **via the heartbleed bug** which is true currently. But as for general intrusions, a vigilant admin can and should be able to tell. -Dan Strong http://DanStrong.com On Wed, Apr 9, 2014 at 11:03 AM, Dan Strong wrote: > Worth noting that it doesn't affect OpenSSL versions prior to 1.0.1: > http://threatpost.com/openssl-fixes-tls-vulnerability/105300 > > Check your version from command line: > openssl version > > And as for not knowing if you've been hacked, unless the hacker went to > great lengths to cover their tracks, as long as you have a good baseline > knowledge of what goes on in your server(s) and you monitor them regularly > then you can reasonably deduce (not 100% of course) that an intrusion > occurred: > > http://pen-testing.sans.org/resources/downloads > > But good admins already know this ;-) > > -Dan Strong > http://DanStrong.com > > > On Wed, Apr 9, 2014 at 10:40 AM, Donovan Brooke wrote: > >> >> webdna'ers, >> >> This is just a courtesy notice about a significant bug going around, >> which was brought to my attention by Christophe yesterday. >> >> You can read about it on the net: "heartbleed bug" >> >> You can test your server here: http://filippo.io/Heartbleed/ >> >> It apparently affects openssl 1.0.1 through 1.0.1f >> >> You can fix it by: >> >> ##Ubuntu 12.04:------------------- >> aptitude update >> aptitude safe-upgrade >> >> then check your openssl build date: >> openssl version -b >> >> output s/b: 'built on: Mon Apr 7 20:33:29 UTC 2014' >> ----------------------------------------------------- >> >> ##CentOS 6.5:------------------- >> do a 'yum update' >> >> then check your openssl: >> rpm -q openssl >> >> The output should be: >> openssl-1.0.1e-16.el6_5.7.i686 >> ----------------------------------------------------- >> >> >> Lastly, it's a good idea to change your passwords, as there is no way >> that I have heard of that >> an admin can tell if you've been hacked. >> >> Sincerely, >> Donovan >> >> >> >> >> >> >> >> >> --------------------------------------------------------- >> This message is sent to you because you are subscribed to >> the mailing list . >> To unsubscribe, E-mail to: >> archives: http://mail.webdna.us/list/talk@webdna.us >> Bug Reporting: support@webdna.us >> > > --047d7b414e6007a88f04f6a052df Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
I should clarify: after re-reading Donovan's post I se= e that he probably meant that there is no way to know if your server has be= en hacked **via the heartbleed bug** which is true currently. But as for ge= neral intrusions, a vigilant admin can and should be able to tell.



On Wed, Apr 9, 2014 at 11:03 AM, Dan Str= ong <dan@danstrong.com> wrote:
Worth noting that it doesn't affect OpenSSL versions p= rior to 1.0.1:

Check your version from command line:
o= penssl version

And as for not knowing if you'v= e been hacked, unless the hacker went to great lengths to cover their track= s, as long as you have a good baseline knowledge of what goes on in your se= rver(s) and you monitor them regularly then you can reasonably deduce (not = 100% of course) that an intrusion occurred:


But good admins already know this ;-)

<= /font>


On Wed, Apr 9, 2014 at 10:40 AM, Donovan= Brooke <dbrooke@webdna.us> wrote:

webdna'ers,

This is just a courtesy notice about a significant bug going around, which = was brought to my attention by Christophe yesterday.

You can read about it on the net: "heartbleed bug"

You can test your server here: http://filippo.io/Heartbleed/

It apparently affects openssl 1.0.1 through 1.0.1f

You can fix it by:

##Ubuntu 12.04:-------------------
aptitude update
aptitude safe-upgrade

then check your openssl build date:
openssl version -b

output s/b: 'built on: Mon Apr =A07 20:33:29 UTC 2014'
-----------------------------------------------------

##CentOS 6.5:-------------------
do a 'yum update'

then check your openssl:
rpm -q openssl

The output should be:
openssl-1.0.1e-16.el6_5.7.i686
-----------------------------------------------------


Lastly, it's a good idea to change your passwords, as there is no way t= hat I have heard of that
an admin can tell if you've been hacked.

Sincerely,
Donovan








---------------------------------------------------------
This message is sent to you because you are subscribed to
the mailing list <ta= lk@webdna.us>.
To unsubscribe, E-mail to: <talk-leave@webdna.us>
archives: http://mail.webdna.us/list/talk@webdna.us
Bug Reporting: suppo= rt@webdna.us


--047d7b414e6007a88f04f6a052df-- Dan Strong

DOWNLOAD WEBDNA NOW!

Top Articles:

Talk List

The WebDNA community talk-list is the best place to get some help: several hundred extremely proficient programmers with an excellent knowledge of WebDNA and an excellent spirit will deliver all the tips and tricks you can imagine...

Related Readings:

[taxrate] question (1997) WebCat2 - many [carts] on one template page? (1997) WebCat2 Append problem (B14Macacgi) (1997) Limiting user access to .tmpl files (1997) Setting up the server (1997) is sku a REQUIRED field on NT (1997) Nested vs conditional (1997) [ot] g5 xserve drives (2004) Autherizenet Directconnect woes! (2002) any suggestions for creating a multi-lingual site? (1999) comparison to Lasso 6 or 7 (2004) showif and cart (1998) [WebDNA] Dreamweather Glossary (2009) WCS Newbie question (1997) Line Feed Character Appended (1998) Problems with webcat 2.01 for NT (1997) unable to launch acgi in WebCat (1997) What is the default seed for the encrypt context? (2000) upgrading (1997) [OT] Hacked IIS/FTP (2002)