On Wed, 9 Apr 2014 01:51:54 -0500 (CDT), Jack Ryan wrote in
Post by Jack RyanDoes anyone know?
The openssl heartbleed bug is server-side and enables an attacker to
read memory that potentially contains the secret key associated with the
X.509 certificate the server presents.
It doesn't effect stunnel directly but you should consider the service
you're connecting to as potentially compromised. You can check to see
if they've recently issued a new certificate like this:
Download the server-side certificate
openssl s_client -connect {HOSTNAME}:{PORT} -showcerts
Check the validity dates:
openssl x509 -noout -in {FILENAME} -dates
This doesn't prove they have fixed the problem but, if the cert is older
than 7th April, it's probable that they have not. It's not bombproof
though as other systems besides openssl might be used for the TLS
transaction so their private keys have never been vulnerable.
--
pub 1024D/228761E7 2003-06-04 Steven Crook <***@mixmin.net>
Key fingerprint = 1CD9 95E1 E9CE 80D6 C885 B7EB B471 80D5 2287 61E7
sub 4096R/4ABF07E3 2012-02-11 [expires: 2013-02-10]