From owner-freebsd-security@FreeBSD.ORG Thu Apr 10 12:03:04 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id E4C87AA8 for ; Thu, 10 Apr 2014 12:03:04 +0000 (UTC) Received: from mail.carlostrub.ch (319.ch [88.198.108.251]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A221E1A0A for ; Thu, 10 Apr 2014 12:03:04 +0000 (UTC) Received: from c-st.net (localhost [127.0.0.1]) (Authenticated sender: cs@carlostrub.ch) by mail.carlostrub.ch (Postfix) with ESMTPA id 0F0AF18CC29; Thu, 10 Apr 2014 14:03:01 +0200 (CEST) Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:06.openssl X-Powered-BY: OTRS - Open Ticket Request System (http://otrs.org/) X-Mailer: OTRS Mail Service (3.3.5) Date: Thu, 10 Apr 2014 14:03:00 +0200 Message-ID: <1397131380.350083.338453171.113568.2@c-st.net> To: clopez@softlayer.com Organization: Carlo Strub From: Carlo Strub In-Reply-To: References: <20140409084809.GA2661@lena.kiev> <201404082334.s38NYDxr098590@freefall.freebsd.org> <201404090821.s398LMg7020616@mech-cluster241.men.bris.ac.uk> <1397124609.974780.949873937.113568.2@c-st.net> Cc: freebsd-security@freebsd.org, mexas@bris.ac.uk X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Apr 2014 12:03:05 -0000 10/04/2014 12:58 - Cyrus Lopez wrote: >=20 >=20 > >>=20 > >> SSH is not affected. > >>=20 > >=20 > > SSH is indeed not affected, but I guess you should still consider the s= ecret sshd key on your otherwise affected server as burnt, as it might have= been in the memory too while an attacker was inspecting it via heartbleed.= Better recreate the secret ssh key and all other secret keys on your serve= r as well. But, again, the OpenSSH protocol/software per se are not affecte= d. >=20 >=20 > This is incorrect. The heartbleed exploit would have only returned portio= ns of > memory that were under the control of OpenSSL, not general memory used by= other > processes on the system. >=20 >=20 >=20 >=20 Thanks for the update. I wasn't aware of that.=