9

The recently announced Heartbleed bug in OpenSSL affects many sites (70% of the internet).

There's a website:

http://www.heartbleed.com

There's a web-based test:

http://filippo.io/Heartbleed/

What should I do to protect the sites that I run?

bwDraco
  • 45,747
  • 43
  • 165
  • 205
Matt Cruikshank
  • 239
  • 1
  • 10
  • 6
    Better answered on [sf] - [Heartbleed: What is it and what are options to mitigate it?](http://serverfault.com/q/587329) – Sathyajith Bhat Apr 08 '14 at 15:56
  • 5
    … as well as the StackExchange for security professionals. See http://security.stackexchange.com/questions/55076/ and http://security.stackexchange.com/questions/tagged/heartbleed . – JdeBP Apr 08 '14 at 16:22
  • 4
    Every major SE computer related site now has this question... Probably soon it will be asked even on [cooking.stackexchange.com](http://cooking.stackexchange.com/) :D – VL-80 Apr 08 '14 at 19:10
  • I have added an end-user version of this question at http://superuser.com/questions/739260/what-should-end-users-do-about-the-heartbleed-security-bug (but someone has already downvoted it, without explanation). – danorton Apr 08 '14 at 19:10
  • 1
    @Nikolay, now I'm so tempted to ask it on cooking.se... – Joe Apr 08 '14 at 21:30

3 Answers3

7

You should:

  • Update your system to the latest OpenSSL version
  • Generate new keys and certificates for services relying on OpenSSL and restart them
  • Revoke former certificates
  • Invalidate all established sessions
Executifs
  • 267
  • 2
  • 9
  • I don’t suppose you know of some nice clear instructions for the last three steps, do you? – Paul D. Waite Apr 08 '14 at 17:28
  • Revoking and regenerating production certificates usually involves whichever process your CA has in place. Since that varies from one CA to the next... – Roger Lipscombe Apr 08 '14 at 17:50
  • How to update your system depends on your package manager. Invalidating sessions is application-dependent. As for certificates, you'll have to contact your CA but the first step should be to generate a new key and CSR: `openssl req -nodes -newkey rsa:4096 -keyout post_heartbleed.key -out post_heartbleed.csr`! – Executifs Apr 09 '14 at 08:14
4

Stolen from a reddit comment.

  1. Update your system:

    sudo apt-get update
    sudo apt-get upgrade
    
  2. Reboot the server

  3. openssl version -a to make sure you have the latest version!!

Oliver Salzburg
  • 86,445
  • 63
  • 260
  • 306
Matt Cruikshank
  • 239
  • 1
  • 10
0

More specifically for Ubuntu or Debian in general

/etc/init.d/apache2 stop
aptitude update
dpkg -l \*libssl\*
aptitude safe-upgrade libssl1.0.0
dpkg -l \*libssl\*
/etc/init.d/apache2 start

Ref http://www.ubuntu.com/usn/usn-2165-1/

rleir
  • 113
  • 4