Last edited:
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
done and done!
yum update for 3 centos boxes, another box is using 0.9 which is not affected
pfsense system has ip restriction for SSL ports anyways so not affect but will update pfsense.
This also affects Routers, OpenVPN has a new version out as well.
This will be A LOT of work for some people in I.T
Also don't think only port 443, any service that uses SSL with OpenSSL, even IIS which by default uses MS SSL system but can have install openSSL modules.
Alternatively you can enable "TLS Authentication" of packets in the OpenVPN server settings instance if it isnt already. You will need to redeploy configs for users to connect.
Unfortunately, I don't know much about networking. I read an article today that said this thing is now infecting people's routers. Is there a way to check my router?
Actually how is this attacked exactly, they don't mention that part very clearly. Ex: what port/service is the attacker connecting on, or what is the attacker doing exactly, that causes it to reveal 64k of memory?
Ex: If I have a server that uses a vulnerable version of OpenSSL but there's no HTTPS and only OpenVPN on a non standard UDP port, is it still directly at risk and do I still need to redo the certs? Right now that's my only machine that has a bad version but my distro does not have a yum update for it. I really don't want to have to do it from source as that will probably just install another package side by side and screw things up.
I turned off OpenVPN for now to be safe though.
[root@vpnsrv ~]# openssl version
OpenSSL 1.0.1e-fips 11 Feb 2013
[root@vpnsrv ~]# rpm -q openssl
openssl-1.0.1e-16.el6_5.7.x86_64
[root@vpnsrv ~]#