From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pd0-f172.google.com (mail-pd0-f172.google.com [209.85.192.172]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by huchra.bufferbloat.net (Postfix) with ESMTPS id ED75A21F28A for ; Tue, 8 Apr 2014 10:01:47 -0700 (PDT) Received: by mail-pd0-f172.google.com with SMTP id p10so1273245pdj.3 for ; Tue, 08 Apr 2014 10:01:47 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:date:from:to:cc:subject:message-id:in-reply-to :references:mime-version:content-type:content-transfer-encoding; bh=MefwshHPnDM8D55P1rl3vu3WD+alZcU6e0TXhW/tQiw=; b=StUBHZL1t1cnkP+czaBKYl0CvuXzFLU0g90jYXa0i2amd+ji1ueWtDHm46h/7bqOhZ WmFiIVvawc1WnI3+DBXn1DGjWw7TJWH4P/k5NHmji4fxG0iBuwT5zb5hV70GFZRWHkOL uDk7LgKujTiDf5gyaC8MlfMt4joNP+7dnKQiPzBtkSsZP7wtXM4ZXGIRnEO9JBrjHefa Cai6wlmBKd9/Yo9hF3gR/4Ac4zY4xGYCcLoxjoQLNm29SyEJecNvJ8W+fnOuV0YR4wur gpy1G7wtOVDBYgGfptd2JRpnD0pt3kLw257578pon9pbc+etE45ESl0omyC5Fj7wKIiw 5z5A== X-Gm-Message-State: ALoCoQmCDvmNjmhtJAowuXQQybZDAoH6zdMF3oOWTUeY13WaHlYQEhj9RjnffEgAGPQwVG9KLVZb X-Received: by 10.68.254.5 with SMTP id ae5mr5842059pbd.83.1396976507099; Tue, 08 Apr 2014 10:01:47 -0700 (PDT) Received: from nehalam.linuxnetplumber.net (static-50-53-83-51.bvtn.or.frontiernet.net. [50.53.83.51]) by mx.google.com with ESMTPSA id fg12sm12778113pac.28.2014.04.08.10.01.46 for (version=TLSv1.2 cipher=RC4-SHA bits=128/128); Tue, 08 Apr 2014 10:01:46 -0700 (PDT) Date: Tue, 8 Apr 2014 10:01:40 -0700 From: Stephen Hemminger To: Dave Taht Message-ID: <20140408100140.0245fed5@nehalam.linuxnetplumber.net> In-Reply-To: References: X-Mailer: Claws Mail 3.9.3 (GTK+ 2.24.22; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Cc: "cerowrt-devel@lists.bufferbloat.net" Subject: Re: [Cerowrt-devel] CVE-2014-0160 : heartbleed CVE on openssl - http://heartbleed.com/ X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Apr 2014 17:01:48 -0000 On Mon, 7 Apr 2014 18:38:58 -0700 Dave Taht wrote: > This one looks pretty nasty. >=20 > see http://lwn.net/Articles/593683/ for more details. >=20 > The headache and cost of updating all the gear I maintain is insanely hig= h. >=20 > Some of my OSes are so old as to no longer have updates, others have ssl = certs > that I can now no longer trust for email or imap, still others work on > the vpn... and I only have a few dozen machines to fix, personally. Actually, not as bad as it looks. The old OS's did not get more recent versions of OpenSSL which have the bug. So in this case lazy vendors win ou= t. =46rom heartbleed.com: Some operating system distributions that have shipped with potentially vuln= erable OpenSSL version: Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4 Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11 CentOS 6.5, OpenSSL 1.0.1e-15 Fedora 18, OpenSSL 1.0.1e-4 OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 201= 2) FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013 NetBSD 5.0.2 (OpenSSL 1.0.1e) OpenSUSE 12.2 (OpenSSL 1.0.1c) Operating system distribution with versions that are not vulnerable: Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14 SUSE Linux Enterprise Server FreeBSD 8.4 - OpenSSL 0.9.8y 5 Feb 2013 FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013 FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC)