看板FB_security
標 題Re: FreeBSD's heartbleed response
發信站NCTU CS FreeBSD Server (Wed Apr 9 04:17:45 2014)
轉信站ptt!csnews.cs.nctu!news.cednctu!FreeBSD.cs.nctu!.POSTED!freebsd.org!ow
Unless I misunderstood earlier emails, the heartbeat extension os ALREADY disabled in base, therefore FreeBSD base isn't vulnerable and the only problem is people who installed a newer OpenSSL from ports.
Cheers,
Merijn
----- Reply message -----
From: "Nathan Dorfman" <
[email protected]>
To: "Mike Tancsa" <
[email protected]>
Cc: <
[email protected]>
Subject: FreeBSD's heartbleed response
Date: Tue, Apr 8, 2014 20:05
Someone please correct me if I'm wrong, but I think simply adding
-DOPENSSL_NO_HEARTBEATS to crypto/openssl/Makefile (and recompiling!) is
sufficient to remove the vulnerability from the base system.
-nd.
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"