To harden your environment, ensure that openssl is up to date and does not include the heartbleed exploit.
1. Run rpm -q openssl from the Terminal to check what version of openssl is currently installed on the Mobility Suite. The expected result should appear in the following format:
2. If the Terminal output displays anything below openssl-1.0.1e-16.el6_5.7.x86_64, then the following command will need to be run for openssl to be upgraded:
yum -y update openssl
3. Run the rpm -q openssl command again from the Terminal to check the installed openssl package version again. Ensure that the version displayed appears higher than openssl-1.0.1e-16.el6_5.7.x86_64. An example of an update to date version of the openssl package is as follows:
Open the ports necessary for Mobility Suite's proper function:
A script which performs these steps automatically and modifies iptables to allow all the ports necessary for use with Mobility Suite has been attached to this article. The script's permissions may need to be modified before it can be run after it has been uncompressed. In order to uncompress, qualify the script for use, and execute it the following commands need to be run from the Terminal in the directory where the script is located: