-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi William,

/usr/sbin/openssl is the binary to organize your keys and
certificats. When your server key is created this program
is used. You can also create requests to a certification authority to
sign your key (e.g. Thawte, or other).
ASAIK there is no exploit for that. The worm uses the apache ssl
module which is statically linked to the openssl libraries (they are
included at compile time).The ssltest and openssl.cnf files
belong to the binary.

For a summery on the worm see:
http://www.securiteam.com/unixfocus/5PP0B2A8AA.html

So you can leave the files alone or upgrade to OpenSSL 0.9.6g
anyway.

- - Gerrit

On Friday, September 20, 2002, at 10:37 AM, Ian McCall wrote:
>>
>
>> Is this a Raq3??
>
> It's a Raq 4.
>
>
>> When I looked at our Raq3 they had about 3 symlinks in
>> the /usr/lib I think. You won't be able to just do a OpenSSL
>> compile. You need to build next to apache.
>
>
> It's these extraneous files lying around that are worrying me - I 
> don't know
> what's using them. Fixing the symlink or copying some files around is 
> easy
> enough, the trouble is that I don't know why they're actually -there-, 
> or what
> upgrade mechanism broke the links, or whether putting 0.9.6g in might 
> break
> anything.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (Darwin)

iD8DBQE9iwzNrnXlma6evXURAgdHAJ4+L0j5p6x45A9NhkxvwxLhjwCg8ACgoYpj
fTmEXyLwQFwlJQFXCrREvHs=
=QIZ+
-----END PGP SIGNATURE-----

_______________________________________________
cobalt-developers mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-developers

Reply via email to