Well if you use Debian or Ubuntu is would suggest looking into that conf, apparently PRNG (Pseudo Random Number Generator) is predictable and installing a patch isn’t good enough to fix this problem. After installing the patch you will need to regenerate your keys.
All OpenSSH and X.509 keys generated on such systems must be considered untrustworthy, regardless of the system on which they are used, even after the update has been applied.
USN-612-1: OpenSSL vulnerability
DSA-1571-1 OpenSSL – Predictable Random Number Generator
Heres an interesting read that I found on APCMag, it’s an interview with Con Kolivas, a Linux kernel developer. Basically Con is talking about how the Linux kernel has lost it’s way in development.
Now this is one handy guide for us admins.
Linux Advanced Routing and Traffic Control