Juniper Contrail is building up an OpenStack fan base.
Packet Pushers wants to know about you. Now, we don’t want to know about you specifically, because that would be creepy. We’re big believers in your privacy for the same reasons we’re believers in our own. But we do want to know about our audience as a whole. Data about our audience helps us figure out […]
The post Listen to Packet Pushers? Take Our 2015 Audience Survey! appeared first on Packet Pushers Podcast and was written by Ethan Banks.
Today is your last chance to sign up for the exclusive ThousandEyes DemoFriday, featuring tips and tricks to using network analytics! Register now!
Today there were multiple vulnerabilities released in OpenSSL, a cryptographic library used by CloudFlare (and most sites on the Internet). There has been advance notice that an announcement would be forthcoming, although the contents of the vulnerabilities were kept closely controlled and shared only with major operating system vendors until this notice.
Based on our analysis of the vulnerabilities and how CloudFlare uses the OpenSSL library, this batch of vulnerabilties primarily affects CloudFlare as a "Denial of Service" possibility (it can cause CloudFlare's proxy servers to crash), rather than as an information disclosure vulnerability. Customer traffic and customer SSL keys continue to be protected.
As is good security practice, we have quickly tested the patched version and begun a push to our production environment, to be completed within the hour. We encourage all customers to upgrade to the latest patched versions of OpenSSL on their own servers, particularly if they are using the 1.0.2 branch of the OpenSSL library.
The individual vulnerabilities included in this announcement are: