Re: Heartbleed warning - Cyrus admin password leak!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Apr 12, 2014, at 01:17 AM, Ken Murchison wrote:
All,
 
I'm sure you have all heard about the Heartbleed bug by now.  If not, you definitely need to read up on it and take appropriate action.
 
A Cyrus admin (not at CMU) has recently run the check-ssl-heartbleed script against his server which was using one of the effected versions of OpenSSL and was easily able to capture usernames and passwords, including the admin password.
 
Again, please check the versions of OpenSSL on your servers and patch or upgrade them ASAP.
 
Note that if you just upgrade the openssl libraries, but don't reinstall your Cyrus binaries, then the system won't automatically restart daemons.
 
You should manually restart Cyrus after you complete your upgrades.
 
Finally, as Ken mentioned, if you have an SSL-enabled Cyrus listening to the internet, you admin password may have been stolen already.  Upgrading OpenSSL won't stop future login attempts with that stolen password.
 
You still need to change your admin password AFTER you have upgraded OpenSSL.
 
Cheers,
 
Bron.
 
--
Bron Gondwana
brong@xxxxxxxxxxx
 
----
Cyrus Home Page: http://www.cyrusimap.org/
List Archives/Info: http://lists.andrew.cmu.edu/pipermail/info-cyrus/
To Unsubscribe:
https://lists.andrew.cmu.edu/mailman/listinfo/info-cyrus

[Index of Archives]     [Cyrus SASL]     [Squirrel Mail]     [Asterisk PBX]     [Video For Linux]     [Photo]     [Yosemite News]     [gtk]     [KDE]     [Gimp on Windows]     [Steve's Art]

  Powered by Linux