Dear colleagues, Most of you are, by now, aware of the 'Heartbleed' bug which presents serious vulnerabilities in the OpenSSL library. This weakness allows one to read the memory of an OpenSSL protected system. Nevertheless, not all OpenSSL versions are vulnerable. You can find further information on the bug and vulnerable versions of OpenSSL on the web at http://heartbleed.com
The 'Heartbleed' bug has been a major concern for AFRINIC over the past week and we would like to assure our members and the community that all our systems have been thoroughly verified and updated when found to be vulnerable. We would like to point out that a particular attention was given to the MyAFRINIC member portal, our financial systems and to RPKI hosts to ensure that the vulnerability was not exploited to obtain privileged information. Furthermore, we would like to emphasise that, for our members who make use of AFRINIC's online payment feature, transactions are forwarded directly to our financial provider's gateway so no credit card information could be leaked via the MyAFRINIC portal. Moreover, we have contacted our financial provider and have been assured that their systems were safe from that threat. Regards, __________ Neriah Sossou Head IT & Engineering, AFRINIC Ltd. t: +230 403 51 00 | f: +230 466 6758 | tt: @afrinic | w: www.afrinic.net facebook.com/afrinic | flickr.com/afrinic | youtube.com/afrinicmedia ___________________________ Join us at AIS14 / AFRINIC20 in Djibouti, 25 May - 6 June 2014.
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ announce mailing list [email protected] https://lists.afrinic.net/mailman/listinfo.cgi/announce
