Home > Uncategorized > heartbleed

heartbleed

Enough word already on all channels, here’s a short one-liner to check which procs are still using the vulnerable old libs after the upgrade:
sudo lsof -n | grep ssl | grep DEL

Oh, and if you want to test wether a site is still vulnerable: https://gist.github.com/takeshixx/10107280

Time to revoke all those lingering server certs . . .

Categories: Uncategorized Tags:
  1. April 8th, 2014 at 23:16 | #1

    [master]# python hb-test.py nrtm.org Connecting…
    Sending Client Hello…
    Waiting for Server Hello…
    … received message: type = 22, ver = 0302, length = 66
    … received message: type = 22, ver = 0302, length = 1076
    … received message: type = 22, ver = 0302, length = 331
    … received message: type = 22, ver = 0302, length = 4
    Sending heartbeat request…
    Unexpected EOF receiving record header – server closed connection
    No heartbeat response received, server likely not vulnerable

  1. No trackbacks yet.