Debian/Ubuntu OpenSSL Vulneribility

Well if you use Debian or Ubuntu is would suggest looking into that conf, apparently PRNG (Pseudo Random Number Generator) is predictable and installing a patch isn’t good enough to fix this problem. After installing the patch you will need to regenerate your keys.

All OpenSSH and X.509 keys generated on such systems must be considered untrustworthy, regardless of the system on which they are used, even after the update has been applied.

USN-612-1: OpenSSL vulnerability
DSA-1571-1 OpenSSL – Predictable Random Number Generator

Leave a Reply

Your email address will not be published. Required fields are marked *

CommentLuv badge