Changes between Version 2 and Version 3 of openssl_vulnerability_2008-05
- Timestamp:
- May 14, 2008, 5:53:06 PM (17 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
openssl_vulnerability_2008-05
v2 v3 1 1 = OpenSSL Vulnerability Discovered = 2 2 3 A security problem was discovered this week affecting May First/People Link servers. 3 '''Header only for email section''' 4 5 Dear May First/People Link members, 6 7 We are sending this message to all members due to an unusual security problem. 8 9 '''End of Header for email section''' 10 11 This week, a security problem was discovered in the Debian operating system that affects May First/People Link servers. 4 12 5 13 We are in the process of updating all of servers to ensure that are not vulnerable. As a result of our updates, some users may experience error messages that you did not see before. … … 9 17 The ''only'' members who will be affected are members that: 10 18 11 * Use [wiki:sftp Secure FTP] or [wiki:secure_shell secure shell (ssh)] to connect to our servers19 * Use [wiki:sftp Secure FTP] or [wiki:secure_shell secure shell (ssh)] to connect to either `malcolm.mayfirst.org` or `mandela.mayfirst.org` (`viewsic.mayfirst.org` and `chavez.mayfirst.org` are not affected). 12 20 * Use our offsite backup system 13 21 14 22 == Secure Shell/Secure FTP users == 15 23 16 If you use Secure FTP or secure shell, you will get a message indicating that the host key has changed. Please see our [wiki:ssl_host_key_changed host key changed] help file to avoid getting that message in the future. 24 If you use Secure FTP or secure shell, you will get a message indicating that the host key has changed along the lines of: 25 26 WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! 27 28 Please see our [wiki:ssl_host_key_changed host key changed] help file to avoid getting that message in the future. 17 29 18 30 If you are using our offsite backup system - you will also get the [wiki:ssl_host_key_changed host key changed error] - but it will happen during your automated backup process, causing your automated backup to fail until you follow the directions and import the proper new host key. … … 20 32 == More Information == 21 33 34 Host keys are random bits of text that are unique to every server. The randomness of the keys allows us to have a secure, encrypted connection between you and the server. Due to a bug in the software used to generate our host keys, they were not generated in a way that was random enough. In other words, the range of bits used to create the keys was limited to a guessable number. To fix the problem, we had to re-generated all the affected keys. 35 22 36 Please see the [http://wiki.debian.org/SSLkeys Debian wiki page] for a full explanation of the security problem.