<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OpenSSL Archives - MIDAS - Room Booking System | Blog</title>
	<atom:link href="https://mid.as/blog/tag/openssl/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>...Making your facilities work for you!</description>
	<lastBuildDate>Tue, 11 Feb 2025 23:34:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Our Response to &#8220;Heartbleed&#8221;</title>
		<link>https://mid.as/blog/heartbleed/</link>
					<comments>https://mid.as/blog/heartbleed/#respond</comments>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Fri, 11 Apr 2014 08:07:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[heartbleed]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://mid.as/blog/?p=1170</guid>

					<description><![CDATA[<p>As many of you may already be aware, information was released on Tuesday this week about a major Internet vulnerability widely referred to as &#8220;Heartbleed&#8221;. This vulnerability affected a common software library called &#8220;OpenSSL&#8221; which is a cryptography system built to encrypt passwords and other sensitive information on around two-thirds of all websites on the [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/heartbleed/">Our Response to &#8220;Heartbleed&#8221;</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><img decoding="async" style="width: 250px; height: 300px; float: right; margin-left: 20px;" src="//mid.as/blog/wp-content/uploads/2014/04/heartbleed.png" alt="OpenSSL Heartbleed Vulnerability">As many of you may already be aware, information was released on Tuesday this week about a major Internet vulnerability widely referred to as &#8220;Heartbleed&#8221;.</p>



<p>This vulnerability affected a common software library called &#8220;OpenSSL&#8221; which is a cryptography system built to encrypt passwords and other sensitive information on around two-thirds of all websites on the Internet.</p>



<p>Many popular websites, including Twitter, Yahoo!, Gmail and Facebook had been found vulnerable to Heartbleed, which if exploited could potentially reveal the contents of a server&#8217;s memory, including passwords and other sensitive information.</p>



<p>&#8220;<em>Your popular social site, your company&#8217;s site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL</em>&#8220;, <a href="http://heartbleed.com">reveals the website</a> devoted to explaining the bug.</p>



<p>Whilst many of these websites have now this week been updated/patched against Heartbleed, the vulnerability itself has been present in the latest versions of OpenSSL for the past two years, but has only recently come to light and details publicly disclosed this week.</p>



<p>Our MIDAS servers run OpenSSL, however, we have no reason to believe that the vulnerability has been exploited to compromise the integrity or confidentiality of any of our services or of our users&#8217; data. Even so, due to the hard-to-detect nature of the attack, we&#8217;re taking a very broad view of the potential vulnerability and have responded accordingly.</p>



<h2 class="wp-block-heading">What has MIDAS done in response?</h2>



<p>Our MIDAS servers run OpenSSL, and we&#8217;ve been proactive in making sure that our users&#8217; data and accounts are kept safe. Specifically:</p>



<ul class="wp-block-list">
<li>Our servers have been patched.<br>As of Wednesday 9th April 03:33 UTC, all of our servers have been updated to use a newer, protected version of OpenSSL.</li>



<li>We&#8217;ve reset SSL keys and certificates for our public *.mid.as servers.<br>As of Thursday 10th April 21:51 UTC all of our public servers are using newly-generated keys and certificates. Additionally, we&#8217;ve asked AlphaSSL to revoke our old certificates, just to be on the safe side.</li>
</ul>



<h2 class="wp-block-heading">What can you do?</h2>



<p>We have no reason to believe that the Heartbleed vulnerability has been exploited to compromise the integrity of any of our services or of our users&#8217; data. Even so, if we &#8220;host&#8221; your MIDAS and you want to be extra careful, you can change your MIDAS password at any time, once logged in via the &#8220;Change Password&#8221; near the top of your MIDAS screen.</p>



<p>Here&#8217;s some handy tips for creating better passwords:</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:66.66%">
<ul class="wp-block-list">
<li>Avoid using the same password for multiple websites.</li>



<li>Make your passwords at least 8 characters<br>&#8211; In MIDAS, you can enforce a minimum password length for users via MIDAS Admin Options → Manage MIDAS → Security → Minimum Password Length.</li>



<li>Include a mixture of numbers, upper &amp; lowercase letters, and symbols in your password<br>&#8211; MIDAS can randomly generate such passwords for users, via MIDAS Admin Options → Manage Users &amp; Permissions → [select user] → Password → Random.</li>



<li>Avoid complete words.</li>



<li>Avoid common passwords such as &#8220;123456&#8221; and &#8220;password&#8221;.</li>
</ul>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:33.33%"><div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="//mid.as/blog/wp-content/uploads/2014/04/security_settings.jpg" alt="MIDAS Password Security Settings"/><figcaption class="wp-element-caption">MIDAS Password Settings</figcaption></figure>
</div></div>
</div>
<p>The post <a href="https://mid.as/blog/heartbleed/">Our Response to &#8220;Heartbleed&#8221;</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mid.as/blog/heartbleed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching 22/31 queries in 0.004 seconds using Disk

Served from: mid.as @ 2026-04-02 11:07:30 by W3 Total Cache
-->