Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Tequila

Senior member
Oct 24, 1999
882
11
76
If you were running a vulnerable version of OpenSSL and haven't re-keyed your certs yet, you're doing it wrong.

There is no way to possibly tell if someone compromised your server and has your key, the only safe option is to get rid of the old ones.

Hey guys, there's even more to this than just patching OpenSSL and obtaining a new certificate. The final step is to revoke the potentially compromised previous certificate. If a nefarious website compromises a certificate and the certificate is revoked your browser will still not know about it if you visit that nefarious website by accident because there is an option in your browser that checks for revoked certificate that is disabled by default.

In FF for example, go to options -> advanced -> validation. In the option "When an OCSP server connection fails, treat the certificate as invalid" is not checked by default. Check that option on! There is a little more overhead involved but at this point I think it is well worth it.