On Sat, Apr 12, 2014 at 12:57 PM, Rogelio Serrano
<[email protected]> wrote:
>
> The problem will be fixed. Think about it. Openssl is now more secure than
> ever.

yeah as what oracle said.. we have oracle Linux which is unbreakable
and unhackable...

fooler.

>
>
>>
>> On Fri, Apr 11, 2014 at 6:06 PM, Rogelio Serrano
>> <[email protected]> wrote:
>>>
>>>
>>> On 11 Apr 2014 00:54, "fooler mail" <[email protected]> wrote:
>>> >
>>> > big companies have their own security team who assess and protect
>>>
>>> Doesn't always work, does it?
>>>
>>> And when some outsider does find a security hole they threaten to sue the
>>> outsider.
>>>
>>> Most security certifications like iso xxxxx are almost a scam. I bet most
>>> people in this list don't trust them at all. All it's useful for is
>>> marketing.
>>>
>>> And we all know how marketing trumps engineering every time.
>>>
>>> > their proprietary products... from the start of code development..
>>> > they integrated code scanner to see any vulnerabilities in the code
>>> > and other security tools till it reach to a complete product...
>>> >
>>> > their reputation is based not only on the quality of the product but
>>> > on the security side as well...
>>> >
>>>
>>> Even do 178 the FAA standard is so tedious and paperwork heavy thru most
>>> companies waive the damn process.
>>>
>>> > fooler.
>>> >
>>> > On Thu, Apr 10, 2014 at 7:16 AM, Kelsey Hartigan Go
>>> > <[email protected]> wrote:
>>> > > On the other hand since this is open source someone is bound to find
>>> > > the
>>> > > hole. What about proprietary systems?
>>> > >
>>> > > On Apr 10, 2014 6:37 PM, "fooler mail" <[email protected]> wrote:
>>> > >>
>>> > >> pluggers,
>>> > >>
>>> > >> another action needed from you... if those sites  listed in the link
>>> > >> below that you use their service, then you need to change your
>>> > >> password...
>>> > >>
>>> > >>
>>> > >>
>>> > >> http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/?utm_cid=mash-com-fb-main-link
>>> > >>
>>> > >> its time to realize why opensource is not secured as what others
>>> > >> claims to be... but of course... there are still plenty of
>>> > >> undiscovered security holes waiting to be discovered by security
>>> > >> engineers... when this heartbeat outbreak last Monday... I spoke to
>>> > >> my
>>> > >> colleague yesterday as this is one of the projects of malaking
>>> > >> brother
>>> > >> who paid opensource developer working with a specific application to
>>> > >> insert backdoor codes... ( I have to use other words para hindi
>>> > >> makita
>>> > >> ni  malaking brother scanner)... to my surprise.. he mentioned to me
>>> > >> that he worked at noviembre sierra alfa previously and he can
>>> > >> confirmed on that but he wont go into the details... I also said to
>>> > >> him that I saw one backdoor in Linux kernel until now it is still in
>>> > >> there... you cant see by a normal cli command but it is there
>>> > >> sitting
>>> > >> innocently...
>>> > >>
>>> > >> I made a statement in ph-cyberview a year or so ago that we are not
>>> > >> safe anymore...  much worse if you are inside china....
>>> > >>
>>> > >>
>>> > >> fooler.
>>> > >>
>>> > >> On Wed, Apr 9, 2014 at 3:36 PM, fooler mail <[email protected]>
>>> > >> wrote:
>>> > >> >  hi drexx,
>>> > >> >
>>> > >> > google security guy is the one who found the bug and google fixed
>>> > >> > their sites before sending the info to the community...
>>> > >> >
>>> > >> > below is the site to test the bug vulnerability..
>>> > >> >
>>> > >> > http://packetstormsecurity.com/files/author/11160/
>>> > >> >
>>> > >> > fooler.
>>> > >> >
>>> > >> > On Wed, Apr 9, 2014 at 9:06 AM, Drexx Laggui [personal]
>>> > >> > <[email protected]> wrote:
>>> > >> >> 09Apr2014 (UTC +8)
>>> > >> >>
>>> > >> >> Here's a quick test on your localhost, & you don't even need to
>>> > >> >> be
>>> > >> >> root...
>>> > >> >>
>>> > >> >>
>>> > >> >> drexx@MACHINE:~$ echo -e "quit\n" | openssl s_client -connect
>>> > >> >> google.com:443 -tlsextdebug 2>&1 |  grep 'TLS server extension
>>> > >> >> "heartbeat" (id=15), len=1'
>>> > >> >>
>>> > >> >> TLS server extension "heartbeat" (id=15), len=1
>>> > >> >>
>>> > >> >> drexx@MACHINE:~$ date;
>>> > >> >> Wed Apr  9 21:02:58 PHT 2014
>>> > >> >>
>>> > >> >> drexx@MACHINE:~$ uname -a
>>> > >> >> Linux MACHINE 3.11.0-19-generic #33~precise1-Ubuntu SMP Wed Mar
>>> > >> >> 12
>>> > >> >> 21:16:27 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
>>> > >> >>
>>> > >> >>
>>> > >> >> Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI,
>>> > >> >> CSA
>>> > >> >> http://www.laggui.com  ( Manila & California )
>>> > >> >> Computer forensics; Penetration testing; QMS & ISMS developers;
>>> > >> >> K-Transfer
>>> > >> >> PGP fingerprint = 0117 15C5 F3B1 6564 59EA  6013 1308 9A66 41A2
>>> > >> >> 3F9B
>>> > >> >>
>>> > >> >>
>>> > >> >> On Wed, Apr 9, 2014 at 10:42 AM, Rudel Saldivar
>>> > >> >> <[email protected]> wrote:
>>> > >> >>>
>>> > >> >>> And I may add this link for the exact patch version since
>>> > >> >>> different
>>> > >> >>> package
>>> > >> >>> revision exist for different versions of Ubuntu -
>>> > >> >>> http://www.ubuntu.com/usn/usn-2165-1/
>>> > >> >>>
>>> > >> >>> Ubuntu 13.10:
>>> > >> >>>     libssl1.0.0 1.0.1e-3ubuntu1.2
>>> > >> >>> Ubuntu 12.10:
>>> > >> >>>     libssl1.0.0 1.0.1c-3ubuntu2.7
>>> > >> >>> Ubuntu 12.04 LTS:
>>> > >> >>>     libssl1.0.0 1.0.1-4ubuntu5.12
>>> > >> >>>
>>> > >> >>> As for CentOS 6, they haven't release a patch version but the
>>> > >> >>> latest
>>> > >> >>> available in the update repo have the heartbeat feature disable,
>>> > >> >>> interim
>>> > >> >>> workaround so upgrade when you can:
>>> > >> >>> http://www.spinics.net/lists/centos-announce/msg04910.html
>>> > >> >>> http://www.spinics.net/lists/centos-announce/msg04910.html
>>> > >> >>>
>>> > >> >>>
>>> > >> >>> -----
>>> > >> >>>
>>> > >> >>> -[ OpenSource, Open Ideas ]-
>>> > >> >>>
>>> > >> >>>
>>> > >> >>> On Wed, Apr 9, 2014 at 8:42 AM, fooler mail
>>> > >> >>> <[email protected]>
>>> > >> >>> wrote:
>>> > >> >>>>
>>> > >> >>>> pluggers,
>>> > >> >>>>
>>> > >> >>>> action needed from you if you are not aware with this serious
>>> > >> >>>> security
>>> > >> >>>> hole...
>>> > >> >>>>
>>> > >> >>>> http://www.openssl.org/news/secadv_20140407.txt
>>> > >> >>>>
>>> > >> >>>>  update/patch your openssl package...  create a new private key
>>> > >> >>>> using
>>> > >> >>>> updated/patched openssl... create a new CSR based on that new
>>> > >> >>>> private
>>> > >> >>>> key and update your https site(s) with a new signed certificate
>>> > >> >>>> (this
>>> > >> >>>> includes self-signed certificate as well)
>>> > >> >> _________________________________________________
>>> > >> >> Philippine Linux Users' Group (PLUG) Mailing List
>>> > >> >> http://lists.linux.org.ph/mailman/listinfo/plug
>>> > >> >> Searchable Archives: http://archives.free.net.ph
>>> > >> _________________________________________________
>>> > >> Philippine Linux Users' Group (PLUG) Mailing List
>>> > >> http://lists.linux.org.ph/mailman/listinfo/plug
>>> > >> Searchable Archives: http://archives.free.net.ph
>>> > >
>>> > >
>>> > > _________________________________________________
>>> > > Philippine Linux Users' Group (PLUG) Mailing List
>>> > > http://lists.linux.org.ph/mailman/listinfo/plug
>>> > > Searchable Archives: http://archives.free.net.ph
>>> > _________________________________________________
>>> > Philippine Linux Users' Group (PLUG) Mailing List
>>> > http://lists.linux.org.ph/mailman/listinfo/plug
>>> > Searchable Archives: http://archives.free.net.ph
>>>
>>>
>>> _________________________________________________
>>> Philippine Linux Users' Group (PLUG) Mailing List
>>> http://lists.linux.org.ph/mailman/listinfo/plug
>>> Searchable Archives: http://archives.free.net.ph
>>
>>
>>
>>
>> --
>> Paolo Alexis Falcone
>> [email protected]
>> Mobile: +639253005321
>> Mobile: +639178054702
>>
>> _________________________________________________
>> Philippine Linux Users' Group (PLUG) Mailing List
>> http://lists.linux.org.ph/mailman/listinfo/plug
>> Searchable Archives: http://archives.free.net.ph
>
>
> _________________________________________________
> Philippine Linux Users' Group (PLUG) Mailing List
> http://lists.linux.org.ph/mailman/listinfo/plug
> Searchable Archives: http://archives.free.net.ph
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to