Book now with code EOY2025
yzT wrote: » critical but not difficult to patch, in fact, within hours many patches were available from vendors
SweenMachine wrote: » UGHHHHHHHHHHHHHHHHHHHH I'd like to say this has made my night a disaster. We had to change our security system on our medical records system. OF COURSE they setup the thin clients and touchscreens to be so locked down, that you have to manually put the new certificate into IE... UGHHHHHHH so many calls haha -scott
Qord wrote: » Sans put on nice webcast last night, and it looks like there will be another tonight.https://www.sans.org/webcasts/openssl-heartbleed-vulnerability-98105 Edit: Better link
docrice wrote: » The problem with Heartbleed is that if your traffic was compromised, there are no logs to indicate so. If an organization is determined vulnerable, the consideration for potentially revoking existing certificates, getting new ones issued and installed into servers/load balancers, and ultimately navigating through any change-control processes can be daunting on tight timelines when critical security issues are involved. Add to the fact that some browsers don't do CRL checking so revoked certs, if re-used in the wild, may be blindly accepted. OCSP hopefully works well in place of that.OpenSSL Heartbeat (Heartbleed) Vulnerability (CVE-2014-0160) and its High-Level Mechanics on Vimeo The general advice that's been given is for the next few days while hopefully everyone who's providing SSL-based services (and actually affected by Heartbleed) gets their act together and patches, be wary of logging on and authenticating unless you're sure they're fixed. I'm not sure how ones goes about determining that without actively scanning the service or reading an announcement from them declaring that they're not in a vulnerable state.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!