Tags: OpenSSL

key-openssl.jpg

OpenSSL
In this tutorial, Carla Schroder explains how to protect your Postfix/Dovecot mail server with OpenSSL.

OpenSSL For Apache and Dovecot: Part 2

Last week, as part of our meandering OpenSSL series, we learned how to configure Apache to use OpenSSL and to force all sessions to use HTTPS. Today, we'll protect our Postfix/Dovecot mail server with OpenSSL. The examples build on the previous tutorials; see the Resources section at the end for...
Read 0 Comments

openssl.jpg

OpenSSL
In this two-part series, Carla Schroder shows how to create your own OpenSSL certificates and how to configure Apache and Dovecot to use them.

OpenSSL For Apache and Dovecot

At long last, my wonderful readers, here is your promised OpenSSL how-to for Apache, and next week you get SSL for Dovecot. In this two-part series, we'll learn how to create our own OpenSSL certificates and how to configure Apache and Dovecot to use them. The examples here build on these tutorials...
Read 0 Comments

openssl_heartbleed.png

Rich Salz & Tim Hudson from the OpenSSL project talking about "OpenSSL After Heartbleed" at LinuxCon Europe in Berlin.

OpenSSL after Heartbleed

Despite being a library that most people outside of the technology industry have never heard of, the Heartbleed bug in OpenSSL caught the attention of the mainstream press when it was uncovered in April 2014 because so many websites were vulnerable to theft of sensitive server and user data. At...
Read 0 Comments

Secure the Internet: Core Infrastructure Initiative's Aim

VIDEO: Nicko van Someren, CTO of the Linux Foundation, discusses how the CII is moving forward to make open-source software more secure. In the aftermath of the Heartbleed vulnerability's emergence in 2014, the Linux Foundation created the Core Infrastructure Initiative (CII)to help prevent that...
Read 0 Comments

OpenSSL Patches Two High-Severity Flaws

OpenSSL has released versions 1.0.2h and 1.0.1t of its open source cryptographic library, fixing multiple security vulnerabilities that can lead to traffic being decrypted, denial-of-service attacks, and arbitrary code execution. One of the high-severity vulnerabilities is actually a hybrid of two...
Read 0 Comments
Click Here!