{"id":33,"date":"2015-07-23T10:11:09","date_gmt":"2015-07-23T10:11:09","guid":{"rendered":"http:\/\/www.urolime.com\/blogs\/in\/?p=33"},"modified":"2021-09-21T13:10:05","modified_gmt":"2021-09-21T07:40:05","slug":"heartbleed-poodle-freak-logjam-whats-next","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/","title":{"rendered":"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?"},"content":{"rendered":"<p>OpenSSL is an open-source implementation of the SSL and TLS protocols. It&#8217;s a technology that&#8217;s widely used by almost every websites to encrypt web sessions, even the Apache web server that powers almost half of the websites over the Internet utilizes OpenSSL.<\/p>\n<h2>Heartbleed and Openssl vulnerabilities<\/h2>\n<p>Even with a large number of organizations using OpenSSL, OpenSSL vulnerabilities and security was mostly overlooked until the heartbleed vulnerability which was disclosed in April 2014.<\/p>\n<p>Unlike other vulnerabilities in the past, heartbleed attack can steal the private\/secret key of an SSL certificate without having any privileged access to the server. Keys stolen with the heartbleed vulnerability could be used to decrypt all encrypted communication between the server and client. This led to a lot of panic since any stolen private keys could be used to decrypt communication even after patching the affected openssl version\/server. As a result of this, all certificates(installed on affected servers) had to be re issued with a new private key.<\/p>\n<h2>Audit and resolution::Heartbleed<\/h2>\n<p>Heartbleed vulnerability can be check from various online resources such as <a href=\"http:\/\/safeweb.norton.com\/heartbleed\">http:\/\/safeweb.norton.com\/heartbleed<\/a> .<\/p>\n<p>If the server is found to be vulnerable, upgrade openssl version in the server using the corresponding package management tool, restart all services linked to openssl and re issue SSL certificates(since there is a strong possibility of the private key being stolen). It is strongly recommended to reset all credentials(that could be transferred to the server) since the data transferred during the time the server was left vulnerable can no longer be considered to be secure.<\/p>\n<h2>After Heartbleed<\/h2>\n<p>After the heartbleed vulnerability, various forks of openssl such as BoringSSL from google and LibreSSL(meant to be a drop-in replacement of OpenSSL at some point) from OpenBSD came into existence. With the prominence of OpenSSL after heartbleed, a few more openssl vulnerabilities also surfaced. These include the POODLE(Padding Oracle On Downgraded Legacy Encryption), FREAK and Logjam vulnerabilities which were caused due to vulnerabilities in older protocols(such as SSLv3) and cipher suite.<\/p>\n<h2>POODLE<\/h2>\n<p>With POODLE attack, an attacker could decrypt the content transferred over an SSLv3 connection. POODLE attacks make use of the web browsers&#8217; and servers&#8217; fallback to SSLv3 in case of issues with negotiating a TLS session and the attacker could in turn exploit the vulnerability in SSLv3<\/p>\n<h2>Audit and resolution::POODLE<\/h2>\n<p>POODLE vulnerability can be checked directly from a Linux\/Mac terminal by verifying SSLv3 support with the following command.<br \/>\nopenssl s_client -connect &lt;IP\/Domain_name&gt;:-ssl3<br \/>\n&lt;IP\/Domain_name&gt; = IP address of the server or domain name<br \/>\n= SSL port(default https port is 443)<br \/>\nA host that has SSLv3 disabled will return an error with handshake failure in it.<\/p>\n<p>With the vulnerability being linked to SSLv3, disabling SSLv3 will take care of POODLE. Steps for disabling SSL3 varies depening on the application and can be found from <a href=\"https:\/\/poodle.io\/servers.html\">https:\/\/poodle.io\/servers.html<\/a><\/p>\n<h2>FREAK<\/h2>\n<p>FREAK vulnerability is the result of a bug in TLS clients which causes them to accept export-grade keys(weak 512 bit keys). This in turn helps the attacker to recover the key and decrypt the secure communication.<\/p>\n<h2>Audit and resolution::FREAK<\/h2>\n<p>Freak vulnerability can be verified from <a href=\"https:\/\/tools.keycdn.com\/freak\">https:\/\/tools.keycdn.com\/freak<\/a> .<\/p>\n<p>Updating openssl version in the server to the latest version with the package manager will apply the patch FREAK patch along with all available security patches.<\/p>\n<h2>Logjam<\/h2>\n<p>Logjam attacks are similar to FREAK attacks and affects any server which supports DHE_EXPORT ciphers. Logjam attack allows an attacker to downgrade TLS connections to 512-bit export-grade cryptography which in turn allows the attacker to manipulate the data over the connection.<\/p>\n<h2>Audit and resolution::Logjam<\/h2>\n<p>As with FREAK attacks, logjam attacks also depend on server and client. Logjam vulnerability can be verified from <a href=\"https:\/\/weakdh.org\/sysadmin.html\">https:\/\/weakdh.org\/sysadmin.html<\/a><\/p>\n<p><strong>In order to patch an affected server::<\/strong><br \/>\n1. Generate a 2048 bit DH key and set DH parameters manually<br \/>\n2. Specify supported cipher suites explicitly<\/p>\n<p>The steps mentioned varies depending on the application being used and can be found from <a href=\"https:\/\/weakdh.org\/sysadmin.html\">https:\/\/weakdh.org\/sysadmin.html<\/a><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_33\" class=\"pvc_stats all  \" data-element-id=\"33\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>OpenSSL is an open-source implementation of the SSL and TLS protocols. It&#8217;s a technology that&#8217;s widely used by almost every websites to encrypt web sessions, even the Apache web server that powers almost half of the websites over the Internet utilizes OpenSSL. Heartbleed and Openssl vulnerabilities Even with a large number of organizations using OpenSSL, [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_33\" class=\"pvc_stats all  \" data-element-id=\"33\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":2,"featured_media":60,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-33","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?<\/title>\n<meta name=\"description\" content=\"Even with a large number of organizations using OpenSSL, OpenSSL vulnerabilities and security was mostly overlooked until the heartbleed vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?\" \/>\n<meta property=\"og:description\" content=\"OpenSSL is an open-source implementation of the SSL and TLS protocols. It\u2019s a technology that\u2019s widely used by almost every websites to encrypt web sessions, even the Apache web server that powers almost half of the websites over the Internet utilizes OpenSSL. Heartbleed and Openssl vulnerabilities Even with a large number of organizations using OpenSSL, \u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-23T10:11:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-21T07:40:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png\" \/>\n\t<meta property=\"og:image:width\" content=\"698\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"urolime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"urolime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/\"},\"author\":{\"name\":\"urolime\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/cbae3669d3b8735433292dca75df66a5\"},\"headline\":\"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?\",\"datePublished\":\"2015-07-23T10:11:09+00:00\",\"dateModified\":\"2021-09-21T07:40:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/\"},\"wordCount\":682,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/\",\"name\":\"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png\",\"datePublished\":\"2015-07-23T10:11:09+00:00\",\"dateModified\":\"2021-09-21T07:40:05+00:00\",\"description\":\"Even with a large number of organizations using OpenSSL, OpenSSL vulnerabilities and security was mostly overlooked until the heartbleed vulnerability.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png\",\"width\":698,\"height\":400,\"caption\":\"Heartbleed POODLE FREAK Logjam\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/cbae3669d3b8735433292dca75df66a5\",\"name\":\"urolime\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/author\/urolime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?","description":"Even with a large number of organizations using OpenSSL, OpenSSL vulnerabilities and security was mostly overlooked until the heartbleed vulnerability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/","og_locale":"en_US","og_type":"article","og_title":"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?","og_description":"OpenSSL is an open-source implementation of the SSL and TLS protocols. It\u2019s a technology that\u2019s widely used by almost every websites to encrypt web sessions, even the Apache web server that powers almost half of the websites over the Internet utilizes OpenSSL. Heartbleed and Openssl vulnerabilities Even with a large number of organizations using OpenSSL, \u2026","og_url":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/","og_site_name":"Urolime Blogs","article_published_time":"2015-07-23T10:11:09+00:00","article_modified_time":"2021-09-21T07:40:05+00:00","og_image":[{"width":698,"height":400,"url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png","type":"image\/png"}],"author":"urolime","twitter_card":"summary_large_image","twitter_misc":{"Written by":"urolime","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/"},"author":{"name":"urolime","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/cbae3669d3b8735433292dca75df66a5"},"headline":"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?","datePublished":"2015-07-23T10:11:09+00:00","dateModified":"2021-09-21T07:40:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/"},"wordCount":682,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png","articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/","url":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/","name":"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png","datePublished":"2015-07-23T10:11:09+00:00","dateModified":"2021-09-21T07:40:05+00:00","description":"Even with a large number of organizations using OpenSSL, OpenSSL vulnerabilities and security was mostly overlooked until the heartbleed vulnerability.","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2015\/07\/Heartbleed-POODLE-FREAK-Logjam.png","width":698,"height":400,"caption":"Heartbleed POODLE FREAK Logjam"},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/in\/heartbleed-poodle-freak-logjam-whats-next\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/in\/"},{"@type":"ListItem","position":2,"name":"Heartbleed, POODLE, FREAK, Logjam\u2026. What\u2019s Next?"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/in\/#website","url":"https:\/\/www.urolime.com\/blogs\/in\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/cbae3669d3b8735433292dca75df66a5","name":"urolime","url":"https:\/\/www.urolime.com\/blogs\/in\/author\/urolime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/33","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":13,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/33\/revisions"}],"predecessor-version":[{"id":1788,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/33\/revisions\/1788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media\/60"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media?parent=33"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/categories?post=33"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/tags?post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}