#editorial | Logs for 2016-02-15

« return
[00:35:35] NotSanguine-away is now known as NotSanguine
[01:26:45] NotSanguine is now known as Notsanguine-isright
[01:27:01] Notsanguine-isright is now known as NotSanguine-away\
[01:27:06] NotSanguine-away\ is now known as NotSanguine-away
[02:22:16] -!- nick has quit [Ping timeout: 268 seconds]
[02:36:33] <Bytram> that does it. I'm wiped out... got a long and late day ahead of me tomorrow.
[02:37:03] Bytram is now known as Bytram|away
[02:37:54] <Bytram|away> g'night everyone.
[04:18:16] -!- nick [nick!~nick@Soylent/Staff/Editor/n1] has joined #editorial
[04:18:16] -!- mode/#editorial [+v nick] by SkyNet
[08:53:20] -!- NotSanguine-away has quit [Quit: Nettalk6 - www.ntalk.de]
[12:35:38] -!- Runaway1956 has quit [Quit: Leaving]
[22:47:52] -!- SoyCow19384 [SoyCow19384!~422c73bf@94-77-993-929.c1-8.grg-ubr9.lnh-grg.md.cable.rcn.com] has joined #editorial
[22:48:06] <SoyCow19384> TheMightyBuzzard
[22:48:13] <TheMightyBuzzard> wut?
[22:48:16] <SoyCow19384> https://soylentnews.org
[22:48:17] <snowfire> ^ 03SN comment by [02Anonymous Coward] (02Score:0)
[22:48:24] <SoyCow19384> want to explain spam to gewg
[22:48:42] <TheMightyBuzzard> yup, will do.
[22:48:46] <SoyCow19384> thanks
[22:48:58] <SoyCow19384> hit parent comment to see thread
[23:00:28] <TheMightyBuzzard> taken care of
[23:11:08] <TheMightyBuzzard> oi, eds...
[23:11:45] <SoyCow19384> ?
[23:12:17] <TheMightyBuzzard> http://www.hotforsecurity.com
[23:13:04] <TheMightyBuzzard> i'd say it could qualify for breaking but it's two weeks old.
[23:14:02] <SoyCow19384> last openssl story was in jan
[23:15:03] <SoyCow19384> So, the good news is that it appears that even if a popular application does use a vulnerable version of OpenSSL, it hopefully isn’t at risk from this particular vulnerability. In other words, this flaw in OpenSSL is nothing like as serious as the notorious Heartbleed vulnerability made public in April 2014.
[23:17:04] <TheMightyBuzzard> reads as pretty damned nasty, though limited to servers configured a specific way.
[23:18:40] <SoyCow19384> I think I read about it at El Reg and passed it over
[23:19:23] <TheMightyBuzzard> think ima do up a story on it. doesn't affect us but it might affect some of the community.
[23:26:30] <SoyCow19384> i'll see if I can find an angle or newer story that brings it up to date
[23:27:27] <SoyCow19384> so that we can have two week old news and make it seem fresh
[23:27:50] <TheMightyBuzzard> cheers
[23:28:56] <SoyCow19384> slightly newer but not new enough: http://www.theregister.co.uk
[23:28:56] <snowfire> ^ 03OpenSSL fixes bug, gets dissed by German gov: That's so random ... not • The Register
[23:29:13] -!- Tachyon_ [Tachyon_!Tachyon@hollhb.kolej.mff.cuni.cz] has joined #editorial
[23:31:33] <SoyCow19384> http://www.enterprisetech.com
[23:31:34] <snowfire> ^ 03U.S. Cyber Effort Targets Open Source Software
[23:31:57] <SoyCow19384> this is about 5 days old. Cybersecurity Action Plan. Ctrl+F to see where OpenSSL is mentioned
[23:31:59] -!- Tachyon has quit [Ping timeout: 268 seconds]
[23:32:43] <TheMightyBuzzard> hrm
[23:33:10] <SoyCow19384> alternate source may be preferred, and there's no need to include a Cybersecurity Action Plan story that explicitly mentions OpenSSL in it, like my search found
[23:39:47] <TheMightyBuzzard> eh, the more i think about it the more i think people have probably already patched it by now.