aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorXe Iaso <me@christine.website>2022-10-28 23:20:14 -0400
committerXe Iaso <me@christine.website>2022-10-28 23:20:14 -0400
commit1fdc033c12bd6158e97b56ca293fd1ee3b4f3d2e (patch)
tree681515ce171861b0544512cb5564f0b505dfe28b
parent336f574220403c840d6b334e41458b8ce7cc9969 (diff)
downloadxesite-1fdc033c12bd6158e97b56ca293fd1ee3b4f3d2e.tar.xz
xesite-1fdc033c12bd6158e97b56ca293fd1ee3b4f3d2e.zip
be more explicit
Signed-off-by: Xe Iaso <me@christine.website>
-rw-r--r--blog/openssl-3.x-secvuln-incoming.markdown10
1 files changed, 5 insertions, 5 deletions
diff --git a/blog/openssl-3.x-secvuln-incoming.markdown b/blog/openssl-3.x-secvuln-incoming.markdown
index 6be0dc4..34e66d6 100644
--- a/blog/openssl-3.x-secvuln-incoming.markdown
+++ b/blog/openssl-3.x-secvuln-incoming.markdown
@@ -151,11 +151,11 @@ At this time it is not known if this is a _client_ or _server_ vulnerability. If
it is a _server_ vulnerability (one that affects services with OpenSSL being
used to encrypt data in-transit), then it is probably best to turn off
public-facing daemons, upgrade your packages, and then turn them back on. If
-this is a _client_ vulnerability, depending on what kind of data your machines
-hold it may still be safe to upgrade your packages over the internet like
-normal. If this is a _client_ vulnerability then a lot of things will change
-about the response process. You may have to copy the target packages over SSH,
-install them manually, and then bring your external facing services back up.
+this is a _client_ vulnerability triggered by malicious servers then a lot of
+things will change about the response process. You may have to copy the target
+packages over SSH, install them manually, and then bring your external facing
+services back up. Depending on how much you trust your network, it may be safe
+to just install from your distributions package servers.
When your distribution tells you the version of the packages that have the
vulnerability fixed, record that as your target version of OpenSSL. Ensure every