Chris,
From what I read, this is primarily an operating system issue. I don't
know about Solaris, but Debian based machines, like Ubuntu, have a
patch.
I took a look and I was still running 0.9.8 (I think like Steffan is)
which isn't vulnerable -- yet, so I updated to 1.0, then applied the
patch dated yesterday. Then I restarted the whole server since I don't
know all the services I am using that access the SSL -- probably a bunch
of them.
I'm not skilled enough to run python scripts.
------ Original Message ------
From: "Chris Ferebee" HIDDEN@ebee.net>
To: surgemailHIDDEN@etwinsite.com
Sent: 4/8/2014 5:20:26 PM
Subject: Spam:***********, Re: Spam:*********, Re: [SurgeMail List]
CVE-2014-0160 a. k. a.Heartbleed
>Steffen,
>
>AFAICS SurgeMail is statically linked to OpenSSL, at least on OS X and
>Solaris x64, cf. also the release note on version 6.6b-9. (Experimental
>Windows build with OpenSSL 1.0.1f.)
>
>But every platform appears to have a different version, presumably
>whatever is well-supported. I tested SurgeMail 6.6a on OS X 10.6.8 and
>SmartOS. The OS X build was not vulnerable, the Solaris x64 one was.
>
>Best,
>Chris
>
>Am 08.04.2014 um 22:11 schrieb Steffen HIDDEN@n@land10.nl>:
>
>>
>> Current OpenSSL version of Surgemail is 0.9.8r.
>>
>> OpenSSL 0.9.8 branch is NOT vulnerable.
>>
>> Steffen
>>
>>
>> On Tuesday 08/04/2014 at 21:59, Peter Dyke wrote:
>>> Interestingly enough, when using the self-signed cert,
>>>
>>> SurgeMail Version 6.5b-13, Built Oct 17 2013 08:35:02, Platform
>>>Linux_64
>>>
>>> simply does not run the Heartbleed test script, instead returns
>>>
>>> dial tcp 143.*.*.*:443: connection refused
>>>
>>> (IP address redacted)
>>>
>>>
>>> On 4/8/2014 12:29 PM, Chris Ferebee wrote:
>>>>
>>>> It’s a doozy all right. There’s a nice overview at
>>>>
>>>>
>>>><https://maclemon.at/blog/2014/04/07/openssl-heartbeat-cve-2014-0160/>
>>>>
>>>> with links to some sample exploits as python scripts. You can run
>>>>them (non-destructively) against your SurgeMail server to see what
>>>>they turn up. I saw a bunch of sensitive information when I tried it
>>>>earlier today. It is perfectly possible that this can be exploited
>>>>to divulge your SSL private keys. We will all need to revoke our
>>>>certificates and order new ones once we’re patched. It might be
>>>>appropriate to issue new mail passwords.
>>>>
>>>> If you can install your certs on your load-balancer and proxy the
>>>>SSL traffic, yes, that seems like it would help, as long as your
>>>>load-balancer is not vulnerable.
>>>>
>>>> Best,
>>>> Chris
>>>>
>>>> Am 08.04.2014 um 21:00 schrieb Frank Bulk
>>>>HIDDEN@mypremieronline.com>:
>>>>
>>>>>
>>>>> When I reviewed the issue last night I wasn't overly concerned,
>>>>>thinking this was more MiTM attack, but after reviewing
>>>>>http://heartbleed.com/ more carefully, it seems like they could
>>>>>potentially walk through memory in 64 kilobyte chunks and retrieve
>>>>>other content.
>>>>>
>>>>> Can we get some new binaries yet today?
>>>>>
>>>>> Is the temporary mitigation to use SSL from the load-balancer in
>>>>>front of our two Surgemail servers?
>>>>>
>>>>> Regards,
>>>>>
>>>>> Frank
>>>>>
>>>>> -----Original Message-----
>>>>> From: Chris Ferebee [mailtoHIDDEN@ebee.net]
>>>>> Sent: Tuesday, April 08, 2014 6:46 AM
>>>>> To: surgemailHIDDEN@etwinsite.com
>>>>> Subject: [SurgeMail List] CVE-2014-0160 a. k. a. Heartbleed
>>>>>
>>>>> ChrisP, Marijn,
>>>>>
>>>>> When you have a moment, could you please let us know what the
>>>>>status of SurgeMail is WRT the CVE-2014-0160 a. k. a. Heartbleed
>>>>>SSL exploit?
>>>>>
>>>>> I have a server running SurgeMail 6.6a on a version of SmartOS
>>>>>(Solaris x64) with OpenSSL 1.0.1e installed, and it is vulnerable
>>>>>as per
>>>>>
>>>>> <http://filippo.io/Heartbleed/>
>>>>>
>>>>> and other example exploits. A different server running SurgeMail
>>>>>6.6a on OS X 10.6.8 (which includes OpenSSL 0.9.8y) is not
>>>>>vulnerable.
>>>>>
>>>>> However, as far as I can tell, SurgeMail does not dynamically link
>>>>>OpenSSL from the host platform in either case and therefore
>>>>>presumably comes with its own, statically linked version.
>>>>>
>>>>> Therefore, it appears that we urgently need a fixed version of
>>>>>SurgeMail, e. g. 6.6a, in my case for Solaris x64, presumably also
>>>>>for some of the other platforms. Do you have an ETA for that yet?
>>>>>
>>>>> Best,
>>>>> Chris
>>>>>
>>>>>
>>>>>
>>>>>
>>>
>>>
>>
>>
>>
>>
>
---
This email is free from viruses and malware because avast! Antivirus protection is active.
http://www.avast.com
|