Severe Bash vulnerability affects Unix-based systems including Linux and Mac OSX

On 25.09.2014 a severe internet security alert was issued for many Linux/Mac systems. stSoftware immediately patched all our cloud hosted servers in response to this alert.

We advise individuals or organisations with Unix-based systems they will need to patch all internet facing Linux/Mac servers immediately.

See Severe Bash vulnerability affects Unix-based systems including Linux and Mac OSX for more information on how to manage this internet security issue.

We recommend internet users subscribe

Important notice about the Heartbleed bug for stSoftware customers



The Heartbleed Bug is a recently discovered vulnerability in the OpenSSL cryptographic software library used by many of the world’s web servers to secure information using TLS. If the web site is vulnerable then a hacker could expose 64k of the server's memory without any trace in the server's logs. The server's memory exposed could include the server's private encryption key or other information such as usernames and passwords. 

How to view current active sessions for a user?



By clicking on the "Welcome user name" you will be shown your user set up, with the list of current sessions.

If you see an IP address that is unfamiliar to you, we suggest you change your password immediately to secure your account against unauthorized access. Your current IP address is displayed below the table. In most cases, we guess the location by matching your IP address to a broad geographical location. The location and IP mappings might not always be accurate, especially in cases

Block hack attempts from all foreign & unknown locations.

The file /etc/hosts.deny on Unix/Linux can block login attempts based on counties. The below is a simple host.deny file to block all countries but your own ( in my case Australia), sure this is not the whole answer to securing a system but it sure cuts down the number of hack attempts.

sudo vi /etc/hosts.allow

# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
# We will block *all*