[ Date Index ]
[ Thread Index ]
[ <= Previous by date /
thread ]
[ Next by date /
thread => ]
Re: [LUG] OpenSSL 1.0.1 "Heartbleed" vulnerability
- To: list@xxxxxxxxxxxxx
- Subject: Re: [LUG] OpenSSL 1.0.1 "Heartbleed" vulnerability
- From: Philip Hudson <phil.hudson@xxxxxxxxx>
- Date: Tue, 8 Apr 2014 14:02:29 +0100
- Delivered-to: dclug@xxxxxxxxxxxxxxxxxxxxx
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=dcglug.org.uk; s=1396810045; h=Sender:Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:List-Unsubscribe:List-Id:Reply-To:Subject:To:Message-ID:Date:From:References:In-Reply-To:MIME-Version; bh=H3V7Zodduncl+I8OSVYQId4WmYFlxdVAgTx1ij/GbZw=; b=Rv1Q+QdHL0ncssOR8tq13FVb6+42mxEdjCLycgIgUT+u00koUrbLcOiLJcFzu15GgScsqMGLzraJHMKRir4m9XT93PYuFippTBTdFIq8wskNWKx51mju+IoSLhXCEqcEUvKQMhM0vTzpISQgjFQHB7fqUgRYC1gGLl5T4YXf3mc=;
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:content-type; bh=65/SWyppEDuqJTVnG/wYTlUm+5v/X2mul8JA8WfI4tw=; b=PyW/ZEAiUqYd0fgKhzTv7XenkQnKWPzpwk1Xf5Uu0Tb1/mqWMihURufPyDBxj83324 ipTAZ7OPxrkYE6YZ6qEGcDy2ySYGeh4aQiMTwU1S3UZUsc6Z6QCGOU5FS44/D/DhEEnG cIAksJeWcmDIoM0yzM7KR3zQg25umUvBsgLb0iNzVPHxh4VEf2VjeovlpfSzLcv7Kzle NdWzJD6OoFbXEfNgWn10kZ/IiVVTU00jyZA9TiC+SH28rbgcvsSmG0xnx8J2S8Wy97th TPYio7jg0PTSi5vxZMwvgW6WrEexcs9jFoD0ppeHhvg8+pYmQvaJP+huOz7Q59k6EBdl hFAg==
On 8 April 2014 13:45, Martijn Grooten <martijn@xxxxxxxxxxxxxxxxxx> wrote:
> If that server runs OpenSSH and if OpenSSH stores
> passwords, key phrases and/or private keys in memory,
Can you give us an example of this, Martijn? Theoretical or existent.
I'm having trouble grasping the concept.
--
Phil Hudson http://hudson-it.no-ip.biz
@UWascalWabbit PGP/GnuPG ID: 0x887DCA63
--
The Mailing List for the Devon & Cornwall LUG
http://mailman.dclug.org.uk/listinfo/list
FAQ: http://www.dcglug.org.uk/listfaq