Re: [WebDNA] [ot-security] Heartbleed bug

This WebDNA talk-list message is from

2014


It keeps the original formatting.
numero = 111294
interpreted = N
texte = --047d7b414e6007a88f04f6a052df Content-Type: text/plain; charset=ISO-8859-1 I should clarify: after re-reading Donovan's post I see that he probably meant that there is no way to know if your server has been hacked **via the heartbleed bug** which is true currently. But as for general intrusions, a vigilant admin can and should be able to tell. -Dan Strong http://DanStrong.com On Wed, Apr 9, 2014 at 11:03 AM, Dan Strong wrote: > Worth noting that it doesn't affect OpenSSL versions prior to 1.0.1: > http://threatpost.com/openssl-fixes-tls-vulnerability/105300 > > Check your version from command line: > openssl version > > And as for not knowing if you've been hacked, unless the hacker went to > great lengths to cover their tracks, as long as you have a good baseline > knowledge of what goes on in your server(s) and you monitor them regularly > then you can reasonably deduce (not 100% of course) that an intrusion > occurred: > > http://pen-testing.sans.org/resources/downloads > > But good admins already know this ;-) > > -Dan Strong > http://DanStrong.com > > > On Wed, Apr 9, 2014 at 10:40 AM, Donovan Brooke wrote: > >> >> webdna'ers, >> >> This is just a courtesy notice about a significant bug going around, >> which was brought to my attention by Christophe yesterday. >> >> You can read about it on the net: "heartbleed bug" >> >> You can test your server here: http://filippo.io/Heartbleed/ >> >> It apparently affects openssl 1.0.1 through 1.0.1f >> >> You can fix it by: >> >> ##Ubuntu 12.04:------------------- >> aptitude update >> aptitude safe-upgrade >> >> then check your openssl build date: >> openssl version -b >> >> output s/b: 'built on: Mon Apr 7 20:33:29 UTC 2014' >> ----------------------------------------------------- >> >> ##CentOS 6.5:------------------- >> do a 'yum update' >> >> then check your openssl: >> rpm -q openssl >> >> The output should be: >> openssl-1.0.1e-16.el6_5.7.i686 >> ----------------------------------------------------- >> >> >> Lastly, it's a good idea to change your passwords, as there is no way >> that I have heard of that >> an admin can tell if you've been hacked. >> >> Sincerely, >> Donovan >> >> >> >> >> >> >> >> >> --------------------------------------------------------- >> This message is sent to you because you are subscribed to >> the mailing list . >> To unsubscribe, E-mail to: >> archives: http://mail.webdna.us/list/talk@webdna.us >> Bug Reporting: support@webdna.us >> > > --047d7b414e6007a88f04f6a052df Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
I should clarify: after re-reading Donovan's post I se= e that he probably meant that there is no way to know if your server has be= en hacked **via the heartbleed bug** which is true currently. But as for ge= neral intrusions, a vigilant admin can and should be able to tell.



On Wed, Apr 9, 2014 at 11:03 AM, Dan Str= ong <dan@danstrong.com> wrote:
Worth noting that it doesn't affect OpenSSL versions p= rior to 1.0.1:

Check your version from command line:
o= penssl version

And as for not knowing if you'v= e been hacked, unless the hacker went to great lengths to cover their track= s, as long as you have a good baseline knowledge of what goes on in your se= rver(s) and you monitor them regularly then you can reasonably deduce (not = 100% of course) that an intrusion occurred:


But good admins already know this ;-)

<= /font>


On Wed, Apr 9, 2014 at 10:40 AM, Donovan= Brooke <dbrooke@webdna.us> wrote:

webdna'ers,

This is just a courtesy notice about a significant bug going around, which = was brought to my attention by Christophe yesterday.

You can read about it on the net: "heartbleed bug"

You can test your server here: http://filippo.io/Heartbleed/

It apparently affects openssl 1.0.1 through 1.0.1f

You can fix it by:

##Ubuntu 12.04:-------------------
aptitude update
aptitude safe-upgrade

then check your openssl build date:
openssl version -b

output s/b: 'built on: Mon Apr =A07 20:33:29 UTC 2014'
-----------------------------------------------------

##CentOS 6.5:-------------------
do a 'yum update'

then check your openssl:
rpm -q openssl

The output should be:
openssl-1.0.1e-16.el6_5.7.i686
-----------------------------------------------------


Lastly, it's a good idea to change your passwords, as there is no way t= hat I have heard of that
an admin can tell if you've been hacked.

Sincerely,
Donovan








---------------------------------------------------------
This message is sent to you because you are subscribed to
the mailing list <ta= lk@webdna.us>.
To unsubscribe, E-mail to: <talk-leave@webdna.us>
archives: http://mail.webdna.us/list/talk@webdna.us
Bug Reporting: suppo= rt@webdna.us


--047d7b414e6007a88f04f6a052df-- Associated Messages, from the most recent to the oldest:

    
  1. Re: [WebDNA] [ot-security] Heartbleed bug (Stuart Tremain 2014)
  2. Re: [WebDNA] [ot-security] Heartbleed bug (Dan Strong 2014)
  3. Re: [WebDNA] [ot-security] Heartbleed bug (Dan Strong 2014)
  4. [WebDNA] [ot-security] Heartbleed bug (Donovan Brooke 2014)
--047d7b414e6007a88f04f6a052df Content-Type: text/plain; charset=ISO-8859-1 I should clarify: after re-reading Donovan's post I see that he probably meant that there is no way to know if your server has been hacked **via the heartbleed bug** which is true currently. But as for general intrusions, a vigilant admin can and should be able to tell. -Dan Strong http://DanStrong.com On Wed, Apr 9, 2014 at 11:03 AM, Dan Strong wrote: > Worth noting that it doesn't affect OpenSSL versions prior to 1.0.1: > http://threatpost.com/openssl-fixes-tls-vulnerability/105300 > > Check your version from command line: > openssl version > > And as for not knowing if you've been hacked, unless the hacker went to > great lengths to cover their tracks, as long as you have a good baseline > knowledge of what goes on in your server(s) and you monitor them regularly > then you can reasonably deduce (not 100% of course) that an intrusion > occurred: > > http://pen-testing.sans.org/resources/downloads > > But good admins already know this ;-) > > -Dan Strong > http://DanStrong.com > > > On Wed, Apr 9, 2014 at 10:40 AM, Donovan Brooke wrote: > >> >> webdna'ers, >> >> This is just a courtesy notice about a significant bug going around, >> which was brought to my attention by Christophe yesterday. >> >> You can read about it on the net: "heartbleed bug" >> >> You can test your server here: http://filippo.io/Heartbleed/ >> >> It apparently affects openssl 1.0.1 through 1.0.1f >> >> You can fix it by: >> >> ##Ubuntu 12.04:------------------- >> aptitude update >> aptitude safe-upgrade >> >> then check your openssl build date: >> openssl version -b >> >> output s/b: 'built on: Mon Apr 7 20:33:29 UTC 2014' >> ----------------------------------------------------- >> >> ##CentOS 6.5:------------------- >> do a 'yum update' >> >> then check your openssl: >> rpm -q openssl >> >> The output should be: >> openssl-1.0.1e-16.el6_5.7.i686 >> ----------------------------------------------------- >> >> >> Lastly, it's a good idea to change your passwords, as there is no way >> that I have heard of that >> an admin can tell if you've been hacked. >> >> Sincerely, >> Donovan >> >> >> >> >> >> >> >> >> --------------------------------------------------------- >> This message is sent to you because you are subscribed to >> the mailing list . >> To unsubscribe, E-mail to: >> archives: http://mail.webdna.us/list/talk@webdna.us >> Bug Reporting: support@webdna.us >> > > --047d7b414e6007a88f04f6a052df Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
I should clarify: after re-reading Donovan's post I se= e that he probably meant that there is no way to know if your server has be= en hacked **via the heartbleed bug** which is true currently. But as for ge= neral intrusions, a vigilant admin can and should be able to tell.



On Wed, Apr 9, 2014 at 11:03 AM, Dan Str= ong <dan@danstrong.com> wrote:
Worth noting that it doesn't affect OpenSSL versions p= rior to 1.0.1:

Check your version from command line:
o= penssl version

And as for not knowing if you'v= e been hacked, unless the hacker went to great lengths to cover their track= s, as long as you have a good baseline knowledge of what goes on in your se= rver(s) and you monitor them regularly then you can reasonably deduce (not = 100% of course) that an intrusion occurred:


But good admins already know this ;-)

<= /font>


On Wed, Apr 9, 2014 at 10:40 AM, Donovan= Brooke <dbrooke@webdna.us> wrote:

webdna'ers,

This is just a courtesy notice about a significant bug going around, which = was brought to my attention by Christophe yesterday.

You can read about it on the net: "heartbleed bug"

You can test your server here: http://filippo.io/Heartbleed/

It apparently affects openssl 1.0.1 through 1.0.1f

You can fix it by:

##Ubuntu 12.04:-------------------
aptitude update
aptitude safe-upgrade

then check your openssl build date:
openssl version -b

output s/b: 'built on: Mon Apr =A07 20:33:29 UTC 2014'
-----------------------------------------------------

##CentOS 6.5:-------------------
do a 'yum update'

then check your openssl:
rpm -q openssl

The output should be:
openssl-1.0.1e-16.el6_5.7.i686
-----------------------------------------------------


Lastly, it's a good idea to change your passwords, as there is no way t= hat I have heard of that
an admin can tell if you've been hacked.

Sincerely,
Donovan








---------------------------------------------------------
This message is sent to you because you are subscribed to
the mailing list <ta= lk@webdna.us>.
To unsubscribe, E-mail to: <talk-leave@webdna.us>
archives: http://mail.webdna.us/list/talk@webdna.us
Bug Reporting: suppo= rt@webdna.us


--047d7b414e6007a88f04f6a052df-- Dan Strong

DOWNLOAD WEBDNA NOW!

Top Articles:

Talk List

The WebDNA community talk-list is the best place to get some help: several hundred extremely proficient programmers with an excellent knowledge of WebDNA and an excellent spirit will deliver all the tips and tricks you can imagine...

Related Readings:

Feature Request (2003) Problems with [Applescript] (1997) RE: Re:Signal Raised (1997) Browser Info.txt (1997) RE: OK, here goes... (1997) server side includes & webcatalog (2000) Bug Report, maybe (1997) much help needed NEWBIE alert (2000) [WebDNA] talklist archives don't search/find recent posts? (2008) Digest for 4/18/97 (1997) page redirect in webDNA (1997) RE: Can a database get stomped by simultaneous access? (1997) absolute path (*) - how does it work? (2007) Emailer setup (1997) Adding insurance (2003) Fun with Dates - revisited (1997) Can this be done? (1997) RE: [isfolder] and [filename] (1997) Too many database headers? (2003) [WebDNA] 3-5 GB of native WebDNA db in RAM?, else MySQL w/WebDNA [SQL] tags, else skip WebDNA altogether? (2009)