From owner-freebsd-questions@FreeBSD.ORG Tue Apr 8 12:29:16 2014 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 5A10EDD1 for ; Tue, 8 Apr 2014 12:29:16 +0000 (UTC) Received: from mail-we0-x229.google.com (mail-we0-x229.google.com [IPv6:2a00:1450:400c:c03::229]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E70701AB5 for ; Tue, 8 Apr 2014 12:29:15 +0000 (UTC) Received: by mail-we0-f169.google.com with SMTP id w62so875969wes.0 for ; Tue, 08 Apr 2014 05:29:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=5mF6UjEM6sImhnoarDjTw3Rr/w7XFJGeE2pelvSScIg=; b=ZNGAE+Yv08qbM7SiWlg3A3pyTMC8Goy+ZBBp0txXpHcB8DD0JXS4OqLDMAJgRVP0Dc D/RIrmSuSfLZZ/koNJBMWuX4kbYNnOCfptf7FacB6AGrVPGI6Q/P7lXFkO17NSFF6AIg oQAChaUbYYViZkY+Q7LKmK+i2yUbQnfAQd8IBwtukd59hMFb6n50/NrbM4HmT8PHUIct +yaGq6nVENkRYpZxtJ4CzsbK09DFsAqK3cyCvSr1Z8rLnUrOXtmRX6oT9DE5alKFjP9b fhoJ8ZOoCcWwhGhf+JxUlPLFiaPWxDxvrEaqqTqrG6MS3W38nraPc8++bqDp5p7hYaRw I4CQ== MIME-Version: 1.0 X-Received: by 10.194.87.163 with SMTP id az3mr2418123wjb.63.1396960153896; Tue, 08 Apr 2014 05:29:13 -0700 (PDT) Received: by 10.195.9.6 with HTTP; Tue, 8 Apr 2014 05:29:13 -0700 (PDT) In-Reply-To: <5343E28E.3070905@staticsafe.ca> References: <20140408134425.Horde.azH0NUU2X8TUmV9kVtS2MA2@d2ux.org> <5343E28E.3070905@staticsafe.ca> Date: Tue, 8 Apr 2014 09:29:13 -0300 Message-ID: Subject: Re: OpenSSL TLS Heartbeat Security Issue From: =?ISO-8859-1?Q?Matheus_Weber_da_Concei=E7=E3o?= To: staticsafe Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.17 Cc: freebsd-questions@freebsd.org, Matthias Petermann X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Apr 2014 12:29:16 -0000 # uname -a && openssl version FreeBSD labxyz 10.0-RELEASE FreeBSD 10.0-RELEASE #0 r264140: Mon Apr 7 11:21:50 BRT 2014 root@labxyz:/usr/obj/usr/src/sys/LABXYZ amd64 OpenSSL 1.0.1e-freebsd 11 Feb 2013 Looks like a vulnerable OpenSSL, or the freebsd version was compiled without heartbleed support? On Tue, Apr 8, 2014 at 8:50 AM, staticsafe wrote: > On 4/8/2014 07:44, Matthias Petermann wrote: > > Hello, > > > > anyone able to comment on the impact of: > > > > http://heartbleed.com/ > > > > to recent versions of FreeBSD? > > > > Thanks & kind regards, > > Matthias > > > > [root@ferrovax ~]# uname -a && openssl version > FreeBSD ferrovax.asininetech.com 9.2-RELEASE-p3 FreeBSD 9.2-RELEASE-p3 > #0: Sat Jan 11 03:25:02 UTC 2014 > root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64 > OpenSSL 0.9.8y 5 Feb 2013 > > openssl from base, not affected. > -- > staticsafe > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to " > freebsd-questions-unsubscribe@freebsd.org" > --=20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D Matheus Weber da Concei=E7=E3o