wave
rectangle square backgroundrectangle square backgroundrectangle square backgroundrectangle square backgroundrectangle square backgroundrectangle square backgroundNews

Update: Heartbleed Vulnerability

Posted: April 8, 20142 min read

Update: As of Friday, April 11th at 8pm EST, DigitalOcean completed its audit of distribution images and 1-click applications . All images have been updated or patched to protect against the Heartbleed OpenSSL vulnerability.

As many of you are now aware, yesterday the CVE-2014-0160 vulnerability, better known as the "Heartbleed bug", in the OpenSSL Project was disclosed. This is a serious vulnerability that will affect many websites and applications on the internet. As the researchers have said:

"Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication."

What have we done?

As soon as this vulnerability was disclosed to us, we immediately began the process of patching our internal systems to use the latest secured version of OpenSSL and updating our mirrors. By noon today, all our infrastructure was updated and our certificates reissued, securing our internal and external facing assets and revoking our old certs.

What should you do?

We advise our customers to follow the steps that we have taken for our own systems (where applicable) to secure your own droplets. At this point, we have no reason to believe that any credentials have been compromised, but to be on the safe side we recommend you change your DigitalOcean.com and Droplet passwords. Using the same password elsewhere (ill-advised in any case) may lead to your password being rendered unsafe again.

We also recommend you make a few precautions as a part of your normal workflow:

  • Use a password manager that allows you to create strong passwords that are unique for every service you use.
  • Enable two-factor-authentication for any critical infrastructure services you use.
  • Periodically roll over your DigitalOcean API keys. This means that you will have to re-issue your API key via the DigitalOcean.com control panel for any applications configured to use your old key.

We are in the process of updating all of our installation images so that any new servers will be patched against this vulnerability from the time of deployment.

For more information about how to update your existing servers and protect yourself against this vulnerability, check out this article.

Share

TwitterFacebookLinkedInHackerNews

Optimize your streaming business

Download our guide to learn how streaming businesses can optimize their architecture to save costs.

Download now

Related Articles

Currents research 2019
news

Currents research 2019

December 11, 20193 min read

Faster and More Accessible: The New digitalocean.com
news

Faster and More Accessible: The New digitalocean.com

November 28, 20193 min read

An Introduction to Design Operations
news

An Introduction to Design Operations

October 28, 20193 min read

Sea floor left
Sea floor middle
Sea floor right