Gentoo Archives: gentoo-security

From: Matthias Niethammer <matthias.niethammer@×××××.com>
To: gentoo-security@l.g.o
Subject: Re: [gentoo-security] Regeneration of gpg keys after HeartBleed
Date: Thu, 10 Apr 2014 23:46:45
Message-Id: CAFfC8aZZi_zR+E_BnJSVANYC+AFqxfnJzbwmp-dU9_fiOX6HhA@mail.gmail.com
In Reply to: Re: [gentoo-security] Regeneration of gpg keys after HeartBleed by Chris Frederick
1 Hi Chris & List,
2
3 f.y.i.: the post you linked got retracted by the author because as he
4 states missread the code interpreted it in a wrong way.
5
6 Best regards,
7 Matthias Niethammer
8
9
10
11 2014-04-09 21:21 GMT+02:00 Chris Frederick <cdf123@××××××.net>:
12
13 > On 04/09/14 12:01, Luis Ressel wrote:
14 >
15 >> On Wed, 09 Apr 2014 18:39:41 +0200
16 >> Jo <saos@××××××.net> wrote:
17 >>
18 >> I'm a bit concerned about the signing keys of the portage tree
19 >>> releases, I know that gpg is not the same as openssl but keeping in
20 >>> mind that SSH, VPN, HTTPS keys might be compromised for two years,
21 >>> don't you think it's a healthy measure to generate a new pair of keys?
22 >>>
23 >>
24 >> SSL certifcates and credentials transmitted via SSL on affected servers
25 >> should be renewed, but other than that, there's not that much to worry
26 >> about as some people think.
27 >>
28 >
29 > It's worth a trip to http://blog.erratasec.com/
30 > 2014/04/why-heartbleed-doesnt-leak-private-key.html
31 >
32 > It's not impossible that ssl keys could be compromised, but in most cases
33 > it shouldn't happen.
34 >
35 > Chris
36 >
37 >