Slackware This Forum is for the discussion of Slackware Linux.
|
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
|
04-07-2014, 10:50 PM
|
#1
|
Member
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 208
Rep:
|
Heartbleed
I'm freaking out with this heartbleed bug (see here).
Eagerly waiting for a patch to come out for Slackware.
Thanks in advance to all the developers!
|
|
|
04-07-2014, 10:55 PM
|
#2
|
Rogue Class
Registered: Sep 2006
Location: OR, USA
Distribution: Slackware64-15.0
Posts: 376
Rep: 
|
Last edited by BenCollver; 04-07-2014 at 10:57 PM.
Reason: Correcting the URL
|
|
|
04-07-2014, 11:01 PM
|
#3
|
Rogue Class
Registered: Sep 2006
Location: OR, USA
Distribution: Slackware64-15.0
Posts: 376
Rep: 
|
My apologies. The OpenSSL patch came out 8 hours ago, not the Slackware patch.
|
|
|
04-07-2014, 11:02 PM
|
#4
|
Member
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 208
Original Poster
Rep:
|
Yes I know, I'm building a temporary package with the 1.0.1g source and the source package. Unfortunately the build fails at some point, though it is only for the documentation part (which I am disabling).
But not knowing all the implications (ie which other packages to rebuild), I will be much more confident when all PV's official patches are released.
|
|
|
04-07-2014, 11:38 PM
|
#5
|
Member
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 208
Original Poster
Rep:
|
I've successfully built openssl-1.0.1g-x86_64-1_slack14.1.txz and openssl-solibs-1.0.1g-x86_64-1_slack14.1.txz using the source package for openssl-1.0.1f. All it took was to remove the previous tarball (openssl-1.0.1f.tar.gz) and drop in the new one openssl-1.0.1g .tar.gz
I'd put it on a server for others to download, but right now I do not want to ssh into any server not yet patched... at least my client is already clean.
Now get all new passwords, ssl keys... what a nightmare!
|
|
|
04-07-2014, 11:46 PM
|
#6
|
LQ Guru
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,465
|
AFAIK pretty much everything in Slackware linking the openssl libraries does it with the dynamic ones, so you should be safe upgrading the openssl and openssl-solibs packages.
FYI, waiting for the official packages, I tried here building from slackware64-current's and slackware64-14.1's sources just substituting the tarball file (well, I got also the signature) and everything seems to have went fine (no problems with docs building like metageek reported).
|
|
1 members found this post helpful.
|
04-07-2014, 11:53 PM
|
#7
|
Member
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 208
Original Poster
Rep:
|
Quote:
Originally Posted by ponce
AFAIK pretty much everything in Slackware linking the openssl libraries does it with the dynamic ones, so you should be safe upgrading the openssl and openssl-solibs packages.
|
Thanks for the info, this sounds good. I did manage to build now that I used the source package in the 14.1 patch folder (rather than the one on the original 14.1 source).
|
|
|
04-07-2014, 11:54 PM
|
#8
|
Member
Registered: Sep 2011
Posts: 925
|
Another example that the newest version isn't always the best version. Slackware 13.37 and below are not affected, because they use OpenSSL 0.9.8y.
|
|
3 members found this post helpful.
|
04-08-2014, 12:04 AM
|
#9
|
LQ Guru
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,465
|
Quote:
Originally Posted by ponce
AFAIK pretty much everything in Slackware linking the openssl libraries does it with the dynamic ones, so you should be safe upgrading the openssl and openssl-solibs packages.
|
well, to avoid misunderstanding I have to specify (for the ones that haven't read mancha's post or the dedicated site) that when I said "you should be safe" I meant on the software side: like the reporters say, every certificate (server-side and client-side) is potentially compromised and must be regenerated and so, still potentially, are passwords trasmitted on services using openssl...
Last edited by ponce; 04-08-2014 at 12:13 AM.
|
|
1 members found this post helpful.
|
04-08-2014, 12:18 AM
|
#10
|
Member
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 208
Original Poster
Rep:
|
Yes, all passwords, and ssl keys need to be reset, and this is only on the clients. Servers have further problems with certificates. And all the goodies they keep might already have been taken (password DBs, SSNs, credit card numbers, bitcoins, the whole lot).
Before updating passwords and ssl keys I am not loggin in to any site of importance (ie banks, etc). I'm physically copying the updated packages using USB memory stick, not daring using ssh (since machines receiving them through ssh would not have been patched yet).
|
|
|
04-08-2014, 12:26 AM
|
#11
|
Rogue Class
Registered: Sep 2006
Location: OR, USA
Distribution: Slackware64-15.0
Posts: 376
Rep: 
|
After the upgrade, here is a check for processes that are still using the old version of SSL.
lsof -n | grep ssl | grep DEL
|
|
2 members found this post helpful.
|
04-08-2014, 12:56 AM
|
#12
|
LQ Guru
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,465
|
regarding that, consider that /usr/lib$LIBDIRSUFFIX/libssl3.so, provided by the mozilla-nss package, is not openssl...
|
|
|
04-08-2014, 05:21 AM
|
#13
|
Senior Member
Registered: Nov 2013
Location: Brazil
Distribution: Slackware
Posts: 1,223
Rep: 
|
I tried upgrading it, the build failed :/
|
|
|
04-08-2014, 06:09 AM
|
#14
|
Senior Member
Registered: Jul 2004
Location: Jogja, Indonesia
Distribution: Slackware-Current
Posts: 4,849
|
You can also rebuilt the current version but add this parameter so that heartbeats module will not be built: -DOPENSSL_NO_HEARTBEATS
|
|
|
04-08-2014, 09:43 AM
|
#15
|
Senior Member
Registered: Jan 2011
Location: Oslo, Norway
Distribution: Slackware
Posts: 2,559
|
Quote:
Originally Posted by moisespedro
I tried upgrading it, the build failed :/
|
Worked for me. Try this sequence:
Code:
$ cd /tmp
$ wget -R "openssl-1.0.1f.*" -nH --cut-dirs=3 -rl2 ftp://mirrors1.kernel.org/slackware/slackware-14.1/patches/source/openssl/
$ wget -P source/openssl https://www.openssl.org/source/openssl-1.0.1g.tar.gz
$ su -
# cd /tmp/source/openssl
# sh openssl.SlackBuild
At the end you should find two packages in your /tmp directory: openssl-1.0.1g and openssl-solibs-1.0.1g.
Last edited by ruario; 04-08-2014 at 09:48 AM.
Reason: Added final sentence
|
|
1 members found this post helpful.
|
All times are GMT -5. The time now is 06:09 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|