|
发表于 2014-4-11 11:56:36
|
显示全部楼层
我也收到 很多邮件 都提示 openssl漏洞
6 p6 f. C l+ ^1 z2 b都要求修改密码等4 x; m: y7 S: d& f/ l- M
Few tips that may assist you with this vulnerability: u" G' f4 k9 \9 c0 d
1. If you have a secured website with SSL, you may go to the following URL: https://lastpass.com/heartbleed/ or https://www.ssllabs.com/ssltest/ to check whether your site is vulnerable to this heartbleed.
3 ^( e I& }" r
: ~' ^" ~7 X9 p O2. If you have a 科学上网 that is using the TLS/DTLS implementation, you should upgrade your OPenSSL with the 科学上网 hardware vendor and generate a new key. Cisco ASA 科学上网 is not affected by this heartbleed. If you are using linux variance, you need to update the OpenSSL to version 1.0.0 via the distribution security repositories.
! F5 L9 W. i* Q# P- C; ^. j9 p: Y" p, K
3. If you are using SSH keys to gain access to your server, then you are OK |
|