In the wake of the recent Heartbleed Bug another series of OpenSSL vulnerabilities have been found. Whilst the Heartbleed bug was relatively easy to exploit, the latest batch of bugs are not. However if successfully exploited, there is potential for eavesdropping and traffic manipulation (CVE-2014-0224) as well as running arbitrary code on the vulnerable client or server (CVE-2014-0195)
Loadbalancer.org releases patch for the Openssl heartbleed vulnerability CVE-2014-0160
Vulnerability Description The bug is in OpenSSL’s implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). When it is exploited it leads to the leak of memory contents from the server to the client and from the client to the server. For more details, please refer to: http://heartbleed.com/ 1) Updating the Hardware & Virtual Appliance Appliance Software Versions Affected : v7.5, v7.5.1, v7.5.2, v7.5.3, v7.5.4 Hotfix Details : The hotfix includes a recompiled version of OpenSSL with the compile option “-DOPENSSL_NO_HEARTBEATS” which mitigates the vulnerability
Load Balancing Exchange 2013
You Can Learn More About the LoadBalancer.org’s Product Line By Going to www.LoadBalancerSolutions.com/LoadBalancer-org The original article/video can be found at Load Balancing Exchange 2013
Load Balancing Exchange 2010
You Can Learn More About the LoadBalancer.org’s Product Line By Going to www.LoadBalancerSolutions.com/LoadBalancer-org The original article/video can be found at Load Balancing Exchange 2010
Load Balancing RSA SecurID
You Can Learn More About the LoadBalancer.org’s Product Line By Going to www.LoadBalancerSolutions.com/LoadBalancer-org The original article/video can be found at Load Balancing RSA SecurID
Cluster recovery… with NO service disruption
You Can Learn More About the LoadBalancer.org’s Product Line By Going to www.LoadBalancerSolutions.com/LoadBalancer-org The original article/video can be found at Cluster recovery… with NO service disruption
Why did my Loadbancer just fail the PCI compliance test?
Let me first say that I’m not really a fan of PCI scanners. It’s not so much that I’m anti security scanners but rather that scanning for vulnerabilities based on only the version number a package returns seems rather simplistic to me. However, what should I do if my PCI scanner reports that the Apache version running the WebUI on my appliance is too old?
3 Ways To Send HAProxy Health Check Email Alerts
To follow up to Aarons blog on HAProxy emails alerts using logwatch I was looking into different ways to achieve the same results. Now the ideal way to monitor the health of the real servers is to to have a dedicated monitoring system in place such as Nagios( It even has a HAProxy plugin )
10 reasons to choose Loadbalancer.org…
Anyone who knows Loadbalancer.org knows we’re a truly unique company, free from corporate constraints and wholly focused on more than just customer service excellence. Our main problem is communicating this message to the unfortunate few who are unaware of exactly what it is that makes Loadbalancer.org so special. So here I am going to attempt to convey the unparalleled Loadbalancer.org ideology by outlining 10 reasons why we really are such a unique company… 1) Excellent, personalized, technical support Our direct sales and support model means that there’s no need for customers to go through resellers or other outsourced agents (like many of our competitors).
Load balancing UDP on EC2
I had been tasked with finding a way to load balance UDP on AWS. Normally we would use ipvsadm in at layer 4 DR but because of the limitations in ec2 this is not possible so another method was needed