Heartbleed warning - Cyrus admin password leak!

Bron Gondwana brong at fastmail.fm
Sat Apr 12 22:55:17 EDT 2014


On Sat, Apr 12, 2014, at 01:17 AM, Ken Murchison wrote:

All,



I'm sure you have all heard about the [1]Heartbleed bug by now.  If
not, you definitely need to read up on it and take appropriate action.



A Cyrus admin (not at CMU) has recently run the [2]check-ssl-heartbleed
script against his server which was using one of the effected versions
of OpenSSL and was easily able to capture usernames and passwords,
including the admin password.



Again, please check the versions of OpenSSL on your servers and patch
or upgrade them ASAP.



Note that if you just upgrade the openssl libraries, but don't
reinstall your Cyrus binaries, then the system won't automatically
restart daemons.



You should manually restart Cyrus after you complete your upgrades.



Finally, as Ken mentioned, if you have an SSL-enabled Cyrus listening
to the internet, you admin password may have been stolen already.
Upgrading OpenSSL won't stop future login attempts with that stolen
password.



You still need to change your admin password AFTER you have upgraded
OpenSSL.



Cheers,



Bron.



--
Bron Gondwana
brong at fastmail.fm

References

1. http://heartbleed.com/
2. https://github.com/noxxi/p5-scripts/blob/master/check-ssl-heartbleed.pl
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.andrew.cmu.edu/pipermail/info-cyrus/attachments/20140413/0a2217bb/attachment.html 


More information about the Info-cyrus mailing list