Dear colleagues,

Most of you are, by now, aware of the 'Heartbleed' bug which presents serious 
vulnerabilities in the OpenSSL library. This weakness allows one to read the 
memory of an OpenSSL protected system. Nevertheless, not all OpenSSL versions 
are vulnerable. You can find further information on the bug and vulnerable 
versions of OpenSSL on the web at http://heartbleed.com

The 'Heartbleed' bug has been a major concern for AFRINIC over the past week 
and we would like to assure our members and the community that all our systems 
have been thoroughly verified and updated when found to be vulnerable.
We would like to point out that a particular attention was given to the 
MyAFRINIC member portal, our financial systems and to RPKI hosts to ensure that 
the vulnerability was not exploited to obtain privileged information.

Furthermore, we would like to emphasise that, for our members who make use of 
AFRINIC's online payment feature, transactions are forwarded directly to our 
financial provider's gateway so no credit card information could be leaked via 
the MyAFRINIC portal.  Moreover, we have contacted our financial provider and 
have been assured that their systems were safe from that threat.

Regards,
__________
Neriah Sossou
Head IT & Engineering, AFRINIC Ltd.
t: +230 403 51 00 | f: +230 466 6758 | tt: @afrinic | w: www.afrinic.net
facebook.com/afrinic | flickr.com/afrinic | youtube.com/afrinicmedia
___________________________
Join us at AIS14 / AFRINIC20 in Djibouti, 25 May - 6 June 2014. 




Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
announce mailing list
[email protected]
https://lists.afrinic.net/mailman/listinfo.cgi/announce

Reply via email to