Aftermath of the Heartbleed SSL vulnerability
With the recent discovery of the "Heartbleed" SSL vulnerability [1], the following actions have been taken for the EdgeBSD infrastructure:
Sorry for the inconvenience.
[1] https://heartbleed.com/
[2] https://www.edgebsd.org/
[3] https://www.edgebsd.org/edgebsd/user/reset
- new sets for EdgeBSD-6 are available for every architecture supported so far except evbarm and evbmips
- the vulnerable machines have been patched
- the impacted services were restarted
- the SSL certificate for www.edgebsd.org was re-generated [2]
- the sessions were cleared for www.edgebsd.org
- every password for www.edgebsd.org was reset (please use the recovery feature [3])
Sorry for the inconvenience.
[1] https://heartbleed.com/
[2] https://www.edgebsd.org/
[3] https://www.edgebsd.org/edgebsd/user/reset