On the other hand since this is open source someone is bound to find the
hole. What about proprietary systems?
On Apr 10, 2014 6:37 PM, "fooler mail" <[email protected]> wrote:

> pluggers,
>
> another action needed from you... if those sites  listed in the link
> below that you use their service, then you need to change your
> password...
>
>
> http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/?utm_cid=mash-com-fb-main-link
>
> its time to realize why opensource is not secured as what others
> claims to be... but of course... there are still plenty of
> undiscovered security holes waiting to be discovered by security
> engineers... when this heartbeat outbreak last Monday... I spoke to my
> colleague yesterday as this is one of the projects of malaking brother
> who paid opensource developer working with a specific application to
> insert backdoor codes... ( I have to use other words para hindi makita
> ni  malaking brother scanner)... to my surprise.. he mentioned to me
> that he worked at noviembre sierra alfa previously and he can
> confirmed on that but he wont go into the details... I also said to
> him that I saw one backdoor in Linux kernel until now it is still in
> there... you cant see by a normal cli command but it is there sitting
> innocently...
>
> I made a statement in ph-cyberview a year or so ago that we are not
> safe anymore...  much worse if you are inside china....
>
>
> fooler.
>
> On Wed, Apr 9, 2014 at 3:36 PM, fooler mail <[email protected]> wrote:
> >  hi drexx,
> >
> > google security guy is the one who found the bug and google fixed
> > their sites before sending the info to the community...
> >
> > below is the site to test the bug vulnerability..
> >
> > http://packetstormsecurity.com/files/author/11160/
> >
> > fooler.
> >
> > On Wed, Apr 9, 2014 at 9:06 AM, Drexx Laggui [personal]
> > <[email protected]> wrote:
> >> 09Apr2014 (UTC +8)
> >>
> >> Here's a quick test on your localhost, & you don't even need to be
> root...
> >>
> >>
> >> drexx@MACHINE:~$ echo -e "quit\n" | openssl s_client -connect
> >> google.com:443 -tlsextdebug 2>&1 |  grep 'TLS server extension
> >> "heartbeat" (id=15), len=1'
> >>
> >> TLS server extension "heartbeat" (id=15), len=1
> >>
> >> drexx@MACHINE:~$ date;
> >> Wed Apr  9 21:02:58 PHT 2014
> >>
> >> drexx@MACHINE:~$ uname -a
> >> Linux MACHINE 3.11.0-19-generic #33~precise1-Ubuntu SMP Wed Mar 12
> >> 21:16:27 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
> >>
> >>
> >> Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA
> >> http://www.laggui.com  ( Manila & California )
> >> Computer forensics; Penetration testing; QMS & ISMS developers;
> K-Transfer
> >> PGP fingerprint = 0117 15C5 F3B1 6564 59EA  6013 1308 9A66 41A2 3F9B
> >>
> >>
> >> On Wed, Apr 9, 2014 at 10:42 AM, Rudel Saldivar <
> [email protected]> wrote:
> >>>
> >>> And I may add this link for the exact patch version since different
> package
> >>> revision exist for different versions of Ubuntu -
> >>> http://www.ubuntu.com/usn/usn-2165-1/
> >>>
> >>> Ubuntu 13.10:
> >>>     libssl1.0.0 1.0.1e-3ubuntu1.2
> >>> Ubuntu 12.10:
> >>>     libssl1.0.0 1.0.1c-3ubuntu2.7
> >>> Ubuntu 12.04 LTS:
> >>>     libssl1.0.0 1.0.1-4ubuntu5.12
> >>>
> >>> As for CentOS 6, they haven't release a patch version but the latest
> >>> available in the update repo have the heartbeat feature disable,
> interim
> >>> workaround so upgrade when you can:
> >>> http://www.spinics.net/lists/centos-announce/msg04910.html
> >>> http://www.spinics.net/lists/centos-announce/msg04910.html
> >>>
> >>>
> >>> -----
> >>>
> >>> -[ OpenSource, Open Ideas ]-
> >>>
> >>>
> >>> On Wed, Apr 9, 2014 at 8:42 AM, fooler mail <[email protected]>
> wrote:
> >>>>
> >>>> pluggers,
> >>>>
> >>>> action needed from you if you are not aware with this serious security
> >>>> hole...
> >>>>
> >>>> http://www.openssl.org/news/secadv_20140407.txt
> >>>>
> >>>>  update/patch your openssl package...  create a new private key using
> >>>> updated/patched openssl... create a new CSR based on that new private
> >>>> key and update your https site(s) with a new signed certificate (this
> >>>> includes self-signed certificate as well)
> >> _________________________________________________
> >> Philippine Linux Users' Group (PLUG) Mailing List
> >> http://lists.linux.org.ph/mailman/listinfo/plug
> >> Searchable Archives: http://archives.free.net.ph
> _________________________________________________
> Philippine Linux Users' Group (PLUG) Mailing List
> http://lists.linux.org.ph/mailman/listinfo/plug
> Searchable Archives: http://archives.free.net.ph
>
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to