On April 11, 2014 9:12:29 AM EDT, "Vojtěch Zeisek" <vojtech.zeisek@opensuse.org> wrote:
Dne Pá 11. dubna 2014 09:04:42, Greg Freemyer napsal(a):
On April 11, 2014 8:25:31 AM EDT, Per Jessen <per@computer.org> wrote:
Greg Freemyer wrote:
On April 11, 2014 6:45:54 AM EDT, "Vojtěch Zeisek"
<vojtech.zeisek@opensuse.org> wrote:
Dear openSUSE on-line friend, how do You test Your servers to ensure they weren't compromised? I have to say I have no idea at all... :-/ Good luck, Vojtěch
It's not easy: Try this: http://filippo.io/Heartbleed/
There is also a command-line version.
You answered a different question.
E.g.
You answered "how can I tell if I am currently vulnerable?"
I think the question was "how can I tell if I was compromised in the 2 years between this bug / vulnerability being introduced and today?"
Yes, thank You. As I expected, there is no easy way how to find out if my server was attacked or not... I use denyhosts and fail2ban to block attackers randomly trying random combinations of username and password...
Since each bite at the able only got a small amount of random ram, that may have been the best secondary defense for this. To get around that a bad guy would have had to of used a botnet to hit you from 1000's of unique IPs. That is hard to coordinate, but certainly not impossible. Hopefully there weren't a huge number of botnets up and running the last couple of years attacking computers via this vulnerability. Greg -- Sent from my Android phone with K-9 Mail. Please excuse my brevity. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org