TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: SSL Certs need to be revoked, right?

7 pointsby bodhiabout 11 years ago
So, Heartbleed. But it&#x27;s not enough just to generate new certificates, right? You actually need to get the CA to <i>revoke</i> the old one, otherwise the (possibly stolen) original private key <i>is still valid</i>?<p>Or have I lost it?

4 comments

computerabout 11 years ago
Yes. If you run something sensitive, you should also consider:<p>- Invalidating any open sessions (i.e. cookies), since those could have been stolen.<p>- Force password changes for all users (since those could have been intercepted in memory)<p>- Change internal passwords.
glimcatabout 11 years ago
Anything that was in memory was potentially leaked in a way that can&#x27;t be traced. Certs, SSH keys, user passwords, database passwords...<p>Oh, and if an admin logged in at any time during the window in which you were vulnerable to Heartbleed, or if any similar credential ended up in memory in any way during that period - consider yourself rooted.<p>Heartbleed is a &quot;burn down the server, redeploy, restore database backups, expire all credentials&quot; event, not just an &quot;apt-get update, done&quot; problem. And it hit over 2&#x2F;3rds of HTTPS websites (ideally: anything with passwords, then some).
pritambaralabout 11 years ago
Yes.<p>You haven&#x27;t lost it.
arcdigitalabout 11 years ago
When you have a CA rekey a cert, they will revoke the old one. (This doesn&#x27;t apply if you are using your own CA, I&#x27;m only talking about commercial ones like Globalsign, Geotrust, Comodo, etc...)
评论 #7558542 未加载