Talk:Beta test
(Heartbleed bug) |
|||
Line 17: | Line 17: | ||
Just report it and we'll figure it out. | Just report it and we'll figure it out. | ||
[[User:Admin|Admin]] ([[User talk:Admin|talk]]) 12:29, 23 December 2013 (EST) | [[User:Admin|Admin]] ([[User talk:Admin|talk]]) 12:29, 23 December 2013 (EST) | ||
+ | |||
+ | == OpenSSL Heartbleed bug == | ||
+ | On April 7, 2014, it was announced that a bug in the TSL Heartbeat extension of OpenSSL allows for a major exploit which could let an attacker read up to 64KB of server memory used by that process. This exploit left encripted communications, including cookies and passwords sent to this site, potentially vulnerable to viewing by an attacker. This is a major bug that effects a large portion of websites on the internet. We will be researching this issue in the days to come and provide additional information. |
Revision as of 02:59, 9 April 2014
Feedback and bug reports about the beta test of this site go here.
Click the "start a new topic" tab above or click "edit this section" next to an existing topic.
Contents |
Feedback
What is this section for?
This section is for feedback about how this beta website is working. Admin (talk) 12:27, 23 December 2013 (EST)
Bug reports
What's a bug and what's not?
Just report it and we'll figure it out. Admin (talk) 12:29, 23 December 2013 (EST)
OpenSSL Heartbleed bug
On April 7, 2014, it was announced that a bug in the TSL Heartbeat extension of OpenSSL allows for a major exploit which could let an attacker read up to 64KB of server memory used by that process. This exploit left encripted communications, including cookies and passwords sent to this site, potentially vulnerable to viewing by an attacker. This is a major bug that effects a large portion of websites on the internet. We will be researching this issue in the days to come and provide additional information.