[tor-relays] New SSL keys for new OpenSSL version?
no.thing_to-hide at cryptopathie.eu
no.thing_to-hide at cryptopathie.eu
Mon Jun 16 20:49:57 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Tor!
I run an internal Tor relay on Debian Wheezy. Today the OpenSSL
version was updated to 1.0.1e-2+deb7u11 . Do I need to delete the old
SSL keys like after the Heartbleed bug?
Thanks and best regards
Anton
- --
no.thing_to-hide at cryptopathie dot eu
0x30C3CDF0, RSA 2048, 24 Mar 2014
0FF8 A811 8857 1B7E 195B 649E CC26 E1A5 30C3 CDF0
Bitmessage (no metadata): BM-2cXixKZaqzJmTfz6ojiyLzmKg2JbzDnApC
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJTn1hxAAoJEMwm4aUww83weJAH/jYHtjrhrFrGnVdjrKPlN/TR
w9NZcvRd0GrNDbZGGwemVam+OmFdHTDEeWZ73fgb/DvrGT8Iej8hD09/vD37xn9p
GYhLabsKW06j8oRz7fiVDlWVOWND8QHW+UImnwKcIlvgp9a2EaSyBGVshIGppqMW
wGgc8ZhoXvo5fAe/M630PHi6e/oGDJZIilSTIDmttV8M9cTEmsxah64oHZiJqVqc
ierCAlAlsbkYH7fs7/QgJw0QolnhtcIZ5ALgijT+Z4EGH5oJBFnA20lvni1qLp1T
O/RUTuF8qLAUWFBLgrF1Ng5zDlyPEaVUK5SO1pM6dzvDwvSWOlrapmfCd3b07DI=
=OslV
-----END PGP SIGNATURE-----
More information about the tor-relays
mailing list