Critical Heartbleed Fix for SSL

OpenSSL heartbleed bug allows hackers to untraceably read server traffic and some server memory. This implementation mistake leads to the leak of memory information from the server to the client and from the client to the server.

For my Ruby on Rails application deployed on AWS, the minimal steps I took to upgrade fixed OpenSSL version given below –

1) Update OpenSSL to 1.0.1g

download source from here http://www.openssl.org/source/openssl-1.0.1g.tar.gz
tar -zxf openssl-1.0.1g.tar.gz 
cd openssl-1.0.1g
./config
make
make test
make install

openssl version

if this will show older version then do below steps

ln -s /usr/local/ssl/bin/openssl /usr/bin/openssl

2) Recompile/reinstall ruby with new openssl version

3) Recompile/reinstall libriaries or gems those are related to openssl

4) Reboot the server

5) Regenerate new private key and csr to generate new SSL certificate

6) Change server access keys and passwords

7) Change API keys, passwords, tokens

8) Cahnge session secret key for cookie based session store

9) Restart the web and app servers

10) You can ask your application users to change their password