Massimo Lombardo wrote:
Maybe I'm wrong, but I have no idea which components are build behind iTunes (and the iTunes-Store "secure connections"), Airport or iPhoto that also make a "secure connection" to allow to buy Photoprints, Photobooks etc.
I have some doubts along these lines myself because I have not seen anything officially from Apple with regard to this, but it has been widely reported that:
“Apple takes security very seriously. ... key Web-based services were not affected,” an Apple spokesperson told Re/code.
So if this is true it would have to cover iTunes and iPhoto purchases. There are still many unexplained reports of Credit Card fraud involving iTunes, but those date back to way before iTunes was using secure connections, so I can't see any connection. The use of Akamai's network to distribute files could have something to do with this, but I don't see any reason for that network to have access to either user credentials or credit card information, so even though Akamai did have a HeartBleed problem for an extended period, it's not clear that this plays a part in the situation.
I only know, that a reference to openssl was find in the acknowledgments of iTunes.
I don't know what you mean by this. What acknowledgements are you referring to? Please provide a link.
Another problem are the Developer Suites (see Ruby) where you may have installed also other Versions of openSSL. I made a locate for openssl and a locate for the single libs that are used by the openssl 1.0.1 to 1.0.1f and changed this with the 1.0.1g of them ... manually, after a tested compilation from code of 1.0.1g.
Sure is sure.
Not sure I'm following you, but I think you are saying that third party software may install a vulnerable version of OpenSSL on your computer and I agree. I had an application from MacPorts which had done this and it was updated to 1.0.1g the same day it was released, but that required me run the update routine in order to fix it.
But I'm not so good, as Filippo Valsorda (https://filippo.io) that wrote that is deep in cryptography and wrote the first pyton script to test a https connection for heartbleed vulnerability.
Yes, and I applaud his aggressiveness in making that script quickly available to users, but it has been found to be somewhat inadequate: What's worse than Heartbleed? Bugs in Heartbleed detection scripts so I only use Qualys SSL Labs tests now.