diff options
| author | Xe Iaso <me@christine.website> | 2022-10-28 23:20:14 -0400 |
|---|---|---|
| committer | Xe Iaso <me@christine.website> | 2022-10-28 23:20:14 -0400 |
| commit | 1fdc033c12bd6158e97b56ca293fd1ee3b4f3d2e (patch) | |
| tree | 681515ce171861b0544512cb5564f0b505dfe28b | |
| parent | 336f574220403c840d6b334e41458b8ce7cc9969 (diff) | |
| download | xesite-1fdc033c12bd6158e97b56ca293fd1ee3b4f3d2e.tar.xz xesite-1fdc033c12bd6158e97b56ca293fd1ee3b4f3d2e.zip | |
be more explicit
Signed-off-by: Xe Iaso <me@christine.website>
| -rw-r--r-- | blog/openssl-3.x-secvuln-incoming.markdown | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/blog/openssl-3.x-secvuln-incoming.markdown b/blog/openssl-3.x-secvuln-incoming.markdown index 6be0dc4..34e66d6 100644 --- a/blog/openssl-3.x-secvuln-incoming.markdown +++ b/blog/openssl-3.x-secvuln-incoming.markdown @@ -151,11 +151,11 @@ At this time it is not known if this is a _client_ or _server_ vulnerability. If it is a _server_ vulnerability (one that affects services with OpenSSL being used to encrypt data in-transit), then it is probably best to turn off public-facing daemons, upgrade your packages, and then turn them back on. If -this is a _client_ vulnerability, depending on what kind of data your machines -hold it may still be safe to upgrade your packages over the internet like -normal. If this is a _client_ vulnerability then a lot of things will change -about the response process. You may have to copy the target packages over SSH, -install them manually, and then bring your external facing services back up. +this is a _client_ vulnerability triggered by malicious servers then a lot of +things will change about the response process. You may have to copy the target +packages over SSH, install them manually, and then bring your external facing +services back up. Depending on how much you trust your network, it may be safe +to just install from your distributions package servers. When your distribution tells you the version of the packages that have the vulnerability fixed, record that as your target version of OpenSSL. Ensure every |
