Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

If I use a Godaddy SSL Certificate on one of my servers for secure application access could this be affected by the Heartbleed bug?

Posted on 2014-04-10
4
Medium Priority
?
463 Views
Last Modified: 2014-04-17
If I use a godaddy certificate to secure a website or application, do I need to rekey the certificate to ensure I'm not affected by the Heartbleed bug?  I've been reading numerous articles, a lot of which contradict each other.  Thanks.
0
Comment
Question by:denver218
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 26

Expert Comment

by:pony10us
ID: 39993024
Probably the best reference to go by is GoDaddy's site itself.

http://support.godaddy.com/godaddy/openssl-and-heartbleed-vulnerabilities/
0
 
LVL 4

Author Comment

by:denver218
ID: 39993030
I've read that.  So if I have 100 different SSL Certificates from godaddy, it sound like they are recommending to rekey all of them.  Is this what you gather from that?
0
 
LVL 26

Accepted Solution

by:
pony10us earned 2000 total points
ID: 39993076
If they are existing certs and housing the sites somewhere else (not hosted by GoDaddy or at a shared location) then yes that is what I get from reading their instructions.
0
 
LVL 4

Author Closing Comment

by:denver218
ID: 40006604
Thanks
0

Featured Post

What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
In this article, we’ll look at how to deploy ProxySQL.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question