Friday, April 11, 2014

Heartbleed Bug Fixes

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Things I had to do to fix it:

0. Update my Open SSL (which I did yesterday)

1. $ rvm implode         Ignore this message: 
Failed to completely remove /home/jen/.rvm -- You will have to do so manually.
Note you may need to manually remove /etc/rvmrc and ~/.rvmrc if they exist still.
Please check all .bashrc .bash_profile .profile and .zshrc for RVM source lines and delete or comment out if this was a Per-User installation.
Also make sure to remove `rvm` group if this was a system installation.
Finally it might help to relogin / restart if you want to have fresh environment (like for installing RVM again).
2. remove ssh secrets 
    remove all authorizations from github security
    $ rm ~/.ssh/id_rsa ~/.ssh/id_rsa.pub

3. Remove all ssh keys from Github and
    any other permissions in Security and Applications section


4. regenerate ssh keys
    $ ssh-keygen -t rsa -C <"myname@email.com">
Generating public/private rsa key pair.Enter file in which to save the key (/home/jen/.ssh/id_rsa): (hit Enter/Return for default)
Enter passphrase (empty for no passphrase): (hit Enter/Return for default or add pswd)
Enter same passphrase again: (hit Enter/Return for default or add pswd again)
Your identification has been saved in /home/jen/.ssh/id_rsa.Your public key has been saved in /home/jen/.ssh/id_rsa.pub.The key fingerprint is: blah blah blah
5. get rid of ruby on computer

6. get a password manager for ubuntu

KeePassX saves many different information e.g. user names, passwords, urls, attachments and comments in one single database. For a better management user-defined titles and icons can be specified for each single entry. Furthermore the entries are sorted in groups, which are customizable as well. The integrated search function allows to search in a single group or the complete database.
KeePassX offers a little utility for secure password generation. The password generator is very customizable, fast and easy to use. Especially someone who generates passwords frequently will appreciate this feature.

Task for today:

K is pushing a branch I need to download it and test it

No comments:

Post a Comment