I've already updated my servers with the patches.
Do I need to regenerate any private keys with respect to OpenSSH? I know that I have to regenerate any SSL certificates.
EDIT: I didn't word this accurately enough. I know the vulnerability is in openssl, but I was asking how this impacts on openssh, and whether I need to re-generate the openssh host keys.
The vulnerability does not affect
openssh
it affectsopenssl
.Which is a library used by many services - including
openssh
.At this point in time it seems clear that
openssh
is not affected by this vulnerability, because OpenSSH uses the SSH protocol, not the vulnerable TLS protocol. It is unlikely that your ssh private key is in memory and readable by a process that is vulnerable - not impossible but unlikely.Of course you must still update your
openssl
version.Note that if you updated
openssl
you also need to restart all services which are using it.That includes software like VPN server, webserver, mail server, load balancer, ...
So it seems that SSH is unaffected:
Source: ask ubuntu: How to patch CVE-2014-0160 in OpenSSL?
OpenSSH doesn't use the heartbeat extension, so OpenSSH isn't affected. Your Keys should be safe as long as no OpenSSL process which make use of heartbeat had them in their memory, but that is usually very unlikely.
So if you are/need to be a bit paranoid replace them, if not you can sleep relatively well without doing so.
In difference from what others have said here Schneier says yes.
It is not that ssh (any type) was directly affected, but that ssh keys may be stored in memory and the memory can be accessed. This goes for just about anything else stored in memory that is considered secret.