From owner-freebsd-questions@FreeBSD.ORG Tue Apr 8 17:33:14 2014 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id CD602C05 for ; Tue, 8 Apr 2014 17:33:14 +0000 (UTC) Received: from mx2.enfer-du-nord.net (mx2.enfer-du-nord.net [91.121.41.56]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 9009E1B1C for ; Tue, 8 Apr 2014 17:33:13 +0000 (UTC) Received: from sulu.fritz.box (p5DDC2FE3.dip0.t-ipconnect.de [93.220.47.227]) by mx2.enfer-du-nord.net (Postfix) with ESMTPSA id 3g3Fsf4sRrzRXB for ; Tue, 8 Apr 2014 19:26:46 +0200 (CEST) To: From: Michael Grimm Subject: Re: OpenSSL TLS Heartbeat Security Issue In-Reply-To: <53440667.8060203@qeng-ho.org> References: <20140408134425.Horde.azH0NUU2X8TUmV9kVtS2MA2@d2ux.org> <53440667.8060203@qeng-ho.org> Date: Tue, 8 Apr 2014 19:26:45 +0200 User-Agent: slrn/pre1.0.2-8/mm/ao (Darwin) Message-Id: <20140408172645.58B38165B369@sulu.fritz.box> X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Apr 2014 17:33:14 -0000 Arthur Chance wrote: > http://lists.freebsd.org/pipermail/freebsd-security/2014-April/007404.html > the latest port (1.0.1_10) has the fix. Does one need to recompile all ports that depend on that openssl port? Or, would it be sufficient to restart all relevant server processes after upgrading to 1.0.1_10? Regards, Michael