The Heartbleed bug allows a remote attacker to read chunks of memory
from a vulnerable TLS CLIENT PROCESS (e.g., smtp(8)) or TLS SERVER
PROCESS (e.g., smtpd(8)).  OpenSSL versions prior to 1.0.1 don't
have the hearbeat feature and have never been affected by this bug.

You can use forward secrecy to mitigate the impact of TLS server
private key compromise.  
http://www.postfix.org/FORWARD_SECRECY_README.html

        Wietse

Reply via email to