It recently came to light that there was a serious programming error within OpenSSL, endangering encryption keys and data of SSL connections on the Internet. This allows anyone to read out the memory of vulnerable servers. Specifically, this means an attacker can read keys, passwords and other private information. There is more information about the bug at https://heartbleed.com.
Many services other than HTTPS use SSL; e-mail, VPN and other services. It is extremely important that these services are also secured as soon as possible. This blog post covers our response and the action we would recommend VPS and dedicated server customers take.
Our response
All Heart Internet infrastructure and shared web hosting servers (Starter Pro, Home Pro, Business Pro and Reseller Pro) were patched on Tuesday morning as soon as the vulnerability was announced. We have also reissued our own SSL certificates to secure our customers' data.
We are currently setting up a bulk reissue process, once in place we will automatically reissue and install all shared web hosting certificates; shared hosting customers do not need to do anything.
All VPS, Hybrid Server and dedicated server customers should check if they are affected
Windows servers – Review any applications that have been installed as they may be bundled with OpenSSL libraries. (Our standard build has no vulnerable applications installed).
Linux servers – Inspect the installed OpenSSL library. The OpenSSL version can be viewed via the command line with the following command: openssl version-a
Centos users can check the “built on:” date is on or after April 8 2014 for confirmation they are running a patched version.
However this is not meaningful alone, since the distributions do not necessarily adjust the version number of the update and you will have to double check the installed package via other means if a vulnerable version is displayed.
Vulnerable systems if unpatched: CentOS-6, Debian-7, Fedora, Ubuntu, FreeBSD
Not vulnerable systems: CentOS-5, Debian-6, Suse-11, Windows Server
For clarity here is a list of OpenSSL branches:
- OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable
- Centos6 – Openssl-1.0.1e-15 is vulnerable
- Centos6 – Openssl-1.0.1e-16.el6_5.4 is vulnerable
- Centos6 – Openssl-1.0.1e-16.el6_5.7 is NOT vulnerable
- OpenSSL 1.0.1g is NOT vulnerable
- OpenSSL 1.0.0 branch is NOT vulnerable
- OpenSSL 0.9.8 branch is NOT vulnerable
If you are running a vulnerable OpenSSL version then we recommend that you patch your servers and restart any services utilising OpenSSL libraries.
For most distributions of Linux security updates are already available:
- Debian / Ubuntu: apt-get update; apt-get -y install openssl libssl1.0.0
- Fedora / CentOS: yum -y update openssl
All affected VPS & Dedicated server customers with SSL certificates
Customers with Heart Internet issued SSL certificates will be contacted either by ourselves or our Certificate Authority in due course and at this point you will be able to request a certificate revoke and reissue from us.
Customers with independently sourced SSL certificates should consider requesting a revoke and reissue from their certificate vendor and may be directly contacted by their Certificate Authority in due course.
Edit 11/04/13
Problems with sending emails after SSL update:
Due to the Heartbleed bug we have had to update all of our own SSLs including on our shared mail servers. We are seeing Mac users reporting they are getting errors such as “Invalid Certificate Error” or “Invalid SSL” when trying to send mail. If you are seeing this error please do the following and you should then be able to send mail as expected:
- Go to Applications
- In the utilities folder click on the icon for keychain access
- In this application find the mail server that you are using and right click and click “delete”
This should then allow you to connect to the mail server correctly.

thanks -useful info
Thank you! Just patched my Hybrid CentOS Box I have with you.
I will await the re-issue of my SSL certificate.
Thanks for the update
Thanks for the update. Would you recommend that all our clients change their passwords in case of any breach?
Hi Darren,
Yes, we’d recommend that your clients change their passwords in this case.
Cheers,
Rob
Thanks for the info – updated centos 6 without a problem
How soon will certificates be updated on shared hosting servers? Ive not been able to send email so was wondering when this will be fixed.
Do hostpay customers on shared hosting need to take any action if they have an SSL e.g. will they get an e-mail to the admin@ address which needs action?
Hi Jonny,
HostPay customers should change their passwords but shouldn’t have to take any action beyond this.
Cheers,
Rob
Hi Kevin,
These certificates will be updated as soon as possible. If you’re having an ongoing issue with your email, you can contact our support team and they’ll be able to take a look at this for you.
Cheers,
Rob
Thanks for this! For anyone copying and pasting to check your version you just need to add a space between version and -a … openssl version -a 🙂
I have openssl version 1.0.0-fips. Do i still need to re-issue SSL certs?
In your edit for today you mention how to fix the email issues for MAC. My emails are not sending today and I think this is the problem. How do you do this process but on a windows computer?
Hi Callum,
If you raise a ticket, our support team will be happy to take a look at this for you.
Cheers,
Rob
Hi Andy,
You shouldn’t be vulnerable on that version and, therefore, shouldn’t need to re-issue certificates.
Cheers,
Rob
Hi,
I’ve just updated the system on behalf of one of your customers (VPS). They had an SSL cert issued by you, but we’ve decided to procure one from AlphaSSL directly this time. I’ve updated OpenSSL and configured the new certificate in Plesk as per AlphaSSL and Plesk’s own instructions by going to Manage IP addresses and assigning the new certificate to the dedicated IP address. Restarting apache and running various external SSL checker tools confirm the Heartbleed bug is gone. But the certificate still expires in three months, which leads me to believe the installation of the new cert has not been entirely successful. Looking around on the server, for the life of me I can’t find where you may have stored the original SSL cert. It’s not the default one in Plesk, as that’s just the Panel’s self-signed certificate.
So questions:
Where did you configure the Heart-issued certificate? How do we override this with a new one, considering the Plesk route does not seem to have worked?
Hi Johan,
If you raise a ticket with our support team, they’ll be happy to investigate this for you.
Cheers,
Rob