ExpressVPN and Heartbleed

1 min read

We’d like to give some more insight into how we dealt with the Heartbleed security bug that affected most of the Internet last week.

The key points are:

  1. For any of our systems using OpenSSL, we patched those servers on the same day as when the issue was announced.
  2. Confirmation that our webservers are patched:
  3. As a pre-caution, we re-keyed server certificates and briefly disconnected all connected users to apply the patch on affected systems
  4. Our OpenVPN servers use tls-auth, which helps prevent man-in-the-middle attacks and mitigated some of the Heartbleed risks even before the patch.

Here is a more detailed technical explanation of Heartbleed that also shows how difficult it was to exploit Heartbleed to steal private keys.

In summary, we reacted quickly to protect our customers and ensure our systems are not susceptible to Heartbleed attacks.

The devs are the backbone of ExpressVPN and occasionally contribute their otherworldly wisdom to the blog.