Libreswan and Heartbleed: Difference between revisions
Jump to navigation
Jump to search
Matt Rogers (talk | contribs) (Created page with "== Is Libreswan vulnerable to the OpenSSL "Heartbleed" exploit? == Unlike some open source VPN software, Libreswan does not utilize the OpenSSL library. The pluto daemon uses ...") |
Paul Wouters (talk | contribs) No edit summary |
||
(3 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
== Is Libreswan vulnerable to the OpenSSL "Heartbleed" exploit? == | == Is Libreswan vulnerable to the OpenSSL "Heartbleed" exploit? == | ||
Libreswan is '''NOT''' vulnerable to the openssl vulnerability CVE-2014-0160 known as Heartbleed. | |||
Libreswan is an implementation of IPsec IKEv1 and IKEv2 keying protocols. These protocols do not use TLS to establish VPN connections. VPN services and products based on TLS are often called "SSL VPNs". Libreswan is an IKE/IPsec based VPN. | |||
Libreswan does not use openssl for IKE/IPsec. Libreswan does use libcurl which itself uses openssl for establishing connections for OCSP and CRL URLs, but it does not provide a server for OCSP/CRL and is therefor not vulnerable there either. |
Latest revision as of 21:03, 10 April 2014
Is Libreswan vulnerable to the OpenSSL "Heartbleed" exploit?
Libreswan is NOT vulnerable to the openssl vulnerability CVE-2014-0160 known as Heartbleed.
Libreswan is an implementation of IPsec IKEv1 and IKEv2 keying protocols. These protocols do not use TLS to establish VPN connections. VPN services and products based on TLS are often called "SSL VPNs". Libreswan is an IKE/IPsec based VPN.
Libreswan does not use openssl for IKE/IPsec. Libreswan does use libcurl which itself uses openssl for establishing connections for OCSP and CRL URLs, but it does not provide a server for OCSP/CRL and is therefor not vulnerable there either.