TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Many sites reusing Heartbleed-compromised private keys

50 点作者 eliot_sykes大约 11 年前

5 条评论

abritishguy大约 11 年前
You should not be responsible for website security if you don&#x27;t understand the absolute basics of SSL certificates.<p>It would be helpful if the CA (or reseller) confirmed (dispay a warning) that you really want to reissue with the same private key and explain the implications of doing so.<p>When reissuing a certificate the default behaviour should be to revoke the old one after some specified time has elapsed - that is what reissuing is for and what distinguishes it from simply buying a new certificate.
mobiplayer大约 11 年前
This.<p>The problem is that many people in the industry doesn&#x27;t really understand the basics. How come is there a leak of your certificate, if that&#x27;s the public key you&#x27;re showing to every single client that connects to your SSL enabled site?<p>I&#x27;ve even seen sysads advising on forums about reissuing certs after Heartbleed, but no word about the keys.
评论 #7744561 未加载
评论 #7743347 未加载
pronoiac大约 11 年前
Ugh. I think it would be better if revocation covered the public key instead of the serial number. (I&#x27;ll ignore CRL bandwidth costs and the questionable usefulness of revocations.)
评论 #7747314 未加载
nodata大约 11 年前
i.e. they re-used the same CSR without realising that the CSR references the old compromised key.
unreal37大约 11 年前
The odds of this being a real issue that will affect anyone are in the tiny fractions of a percent range.