As a curious hobbiest, I'm a bit confused about something...
Heartbleed has prompted much discussion about the need to change passwords and reissue/revoke SSL certs, but it seems to me that there's at least one more potential level of evil here. If secure comms have, potentially, been compromised for years, it seems likely that at least some systems have been compromised using sniffed admin credentials. Acting to preserve root access once it's been gained seems like a logical next step, assuming a stealthy root-kit style compromise is available to the attackers.
Can we really trust the OS currently installed on systems which were setup prior to application of the heartbleed bug patch and which use CPanel etc for administration? If SSL reissuance/revocation is considered prudent as a reaction to this bug, shouldn't OS re-installation also be indicated?
Heartbleed has prompted much discussion about the need to change passwords and reissue/revoke SSL certs, but it seems to me that there's at least one more potential level of evil here. If secure comms have, potentially, been compromised for years, it seems likely that at least some systems have been compromised using sniffed admin credentials. Acting to preserve root access once it's been gained seems like a logical next step, assuming a stealthy root-kit style compromise is available to the attackers.
Can we really trust the OS currently installed on systems which were setup prior to application of the heartbleed bug patch and which use CPanel etc for administration? If SSL reissuance/revocation is considered prudent as a reaction to this bug, shouldn't OS re-installation also be indicated?
Last edited by a moderator: