omni catcher look, caught vikingvpn attacking pia on reddit about heartbleed in 2014

http://www.reddit.com/r/VPN/comments/22jzu1/so_is_pia_safe_from_the_heartbleed_bug/

YouknowimthemanVikingVPN Admin 2 points3 points4 points (13 children)

sorry, this has been archived and can no longer be voted on

 i am the OP of this thread. DO not remove it

No.

Their custom OpenVPN client for Windows will need to be updated to close the security hole, as it contains a vulnerable version of OpenSSL.

The open-source version of the client has been updated to version 2.3.2 I004 to close the vulnerability..

realrasenganPIA employee 11 points12 points13 points (10 children)

sorry, this has been archived and can no longer be voted on

No.

Dear /u/Youknowimtheman,

Please stop spreading FUD. While you are right that our custom client uses an unpatched version of OpenSSL, this is not an issue at all. The only way this can actually be exploited is if, for some reason, a user decides to reverse engineer our client in order to connect to a malicious server other than our own. All of our servers themselves have been patched. As a competing provider within our industry, you should be more careful with the defamatory comments you make. PIA is safe from the heartbleed bug.

Thanks,

rasengan..

 

 

 

 

Comments

  • YouknowimthemanVikingVPN Admin 4 points5 points6 points (2 children)
    sorry, this has been archived and can no longer be voted on

    Someone asked a question about the client. I answered the question about the client (correctly). They posted clarification about how the impact of the vulnerability affects their systems.

    It was (wrongly) asserted that our website certs needed to be updated.

    PIA has not been very transparent about what they are doing. If the only thing they did was update OpenSSL and fix the website CA, the VPN servers that were vulnerable for two years are still running the same keys and certs, which means the claim that they are safe from Heartbeat is patently false. .

Sign In or Register to comment.