{"id":3279,"date":"2014-06-05T21:21:38","date_gmt":"2014-06-06T01:21:38","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/support\/2014\/06\/05\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/"},"modified":"2021-08-16T23:01:29","modified_gmt":"2021-08-17T03:01:29","slug":"openssl-1-0-1-and-1-0-2-beta1-security-upgrades","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/","title":{"rendered":"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades"},"content":{"rendered":"<p>Back on April 7th there was something called the <a href=\"\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\" target=\"_blank\" rel=\"noopener\">Heartbleed Open SSL bug<\/a> that caused some security issues for servers running certain versions of OpenSSL.<\/p>\n<p>There was a new <a href=\"https:\/\/www.openssl.org\/news\/secadv_20140605.txt\" target=\"_blank\" rel=\"noopener\">OpenSSL security advisory<\/a> posted earlier today disclosing seven additional security flaws found in <strong>OpenSSL 1.0.1<\/strong> and <strong>OpenSSL 1.0.2-beta1<\/strong>. There was also a new <strong>OpenSSL 1.0.1h<\/strong> patch made available today as well.<\/p>\n<p class=\"alert alert-success\">All InMotion Hosting server&#8217;s have been reviewed and any vulnerable versions are in the process of being patched. Customer&#8217;s might have noticed a few second duration of unavailability in their services today as they were restarted to apply the security patches.<\/p>\n<h2>OpenSSL 1.0.1 and 1.0.2-beta1 vulnerabilities<\/h2>\n<p><button class=\"btn btn-success collapsed\" data-target=\"#viewdetails\" data-toggle=\"collapse\" style=\"width: 100%; box-shadow: 4px 4px 6px #000;\">OpenSSL SSL\/TLS MITM vulnerability (CVE-2014-0224)<\/button><\/p>\n<div class=\"collapse-group\">\n<div class=\"collapse\" id=\"viewdetails\" style=\"height: 0px;\">\n<div>\n<p style=\"background-color: #F0F0F0; padding: 10px;\"><em>An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL\/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.<\/p>\n<p>  The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><button class=\"btn btn-success collapsed\" data-target=\"#viewdetails2\" data-toggle=\"collapse\" style=\"width: 100%; box-shadow: 4px 4px 6px #000; margin-top: 5px;\">OpenSSL DTLS recursion flaw (CVE-2014-0221)<\/button><\/p>\n<div class=\"collapse-group\">\n<div class=\"collapse\" id=\"viewdetails2\" style=\"height: 0px;\">\n<div>\n<p style=\"background-color: #F0F0F0; padding: 10px;\"><em>By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack.<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><button class=\"btn btn-success collapsed\" data-target=\"#viewdetails3\" data-toggle=\"collapse\" style=\"width: 100%; box-shadow: 4px 4px 6px #000; margin-top: 5px;\">OpenSSL DTLS invalid fragment vulnerability (CVE-2014-0195)<\/button><\/p>\n<div class=\"collapse-group\">\n<div class=\"collapse\" id=\"viewdetails3\" style=\"height: 0px;\">\n<div>\n<p style=\"background-color: #F0F0F0; padding: 10px;\"><em>A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server.<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><button class=\"btn btn-success collapsed\" data-target=\"#viewdetails4\" data-toggle=\"collapse\" style=\"width: 100%; box-shadow: 4px 4px 6px #000; margin-top: 5px;\">OpenSSL SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (CVE-2014-0198)<\/button><\/p>\n<div class=\"collapse-group\">\n<div class=\"collapse\" id=\"viewdetails4\" style=\"height: 0px;\">\n<div>\n<p style=\"background-color: #F0F0F0; padding: 10px;\"><em>A flaw in the do_ssl3_write function can allow remote attackers to cause a denial of service via a NULL pointer dereference. This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><button class=\"btn btn-success collapsed\" data-target=\"#viewdetails5\" data-toggle=\"collapse\" style=\"width: 100%; box-shadow: 4px 4px 6px #000; margin-top: 5px;\">OpenSSL SSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298)<\/button><\/p>\n<div class=\"collapse-group\">\n<div class=\"collapse\" id=\"viewdetails5\" style=\"height: 0px;\">\n<div>\n<p style=\"background-color: #F0F0F0; padding: 10px;\"><em>A race condition in the ssl3_read_bytes function can allow remote attackers to inject data across sessions or cause a denial of service. This flaw only affects multithreaded applications using OpenSSL 1.0.0 and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><button class=\"btn btn-success collapsed\" data-target=\"#viewdetails6\" data-toggle=\"collapse\" style=\"width: 100%; box-shadow: 4px 4px 6px #000; margin-top: 5px;\">OpenSSL Anonymous ECDH denial of service (CVE-2014-3470)<\/button><\/p>\n<div class=\"collapse-group\">\n<div class=\"collapse\" id=\"viewdetails6\" style=\"height: 0px;\">\n<div>\n<p style=\"background-color: #F0F0F0; padding: 10px;\"><em>OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack.<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h3>Vulnerable versions of OpenSSL<\/h3>\n<table class=\"article_table\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>openssl 1.0.1<\/td>\n<td>openssl 1.0.1:beta1<\/td>\n<td>openssl 1.0.1:beta2<\/td>\n<td>openssl 1.0.1:beta3<\/td>\n<td>openssl 1.0.1:a<\/td>\n<\/tr>\n<tr>\n<td>openssl 1.0.1:b<\/td>\n<td>openssl 1.0.1:c<\/td>\n<td>openssl 1.0.1:d<\/td>\n<td>openssl 1.0.1:e<\/td>\n<td>openssl 1.0.1:f<\/td>\n<\/tr>\n<tr>\n<td>openssl 1.0.2-beta1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Recommended upgrade paths for OpenSSL<\/h3>\n<table class=\"article_table\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<th>Current OpenSSL version<\/th>\n<th>Should you upgrade?<\/th>\n<th>Updated OpenSSL version<\/th>\n<\/tr>\n<tr>\n<td style=\"background-color: #E4D568;\">openssl 0.9.8<\/td>\n<td style=\"background-color: #E4D568;\">Recommended<\/td>\n<td style=\"background-color: #E4D568;\">openssl 0.9.8za<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #E4D568;\">openssl 1.0.0<\/td>\n<td style=\"background-color: #E4D568;\">Recommended<\/td>\n<td style=\"background-color: #E4D568;\">openssl 1.0.0m<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #E46868;\">openssl 1.0.1<\/td>\n<td style=\"background-color: #E46868;\">Required<\/td>\n<td style=\"background-color: #E46868;\">openssl 1.0.1h<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Back on April 7th there was something called the Heartbleed Open SSL bug that caused some security issues for servers running certain versions of OpenSSL. There was a new OpenSSL security advisory posted earlier today disclosing seven additional security flaws found in OpenSSL 1.0.1 and OpenSSL 1.0.2-beta1. There was also a new OpenSSL 1.0.1h patch<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/\"> Read More ><\/a><\/p>\n","protected":false},"author":57014,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4312,4299],"tags":[],"class_list":["post-3279","post","type-post","status-publish","format-standard","hentry","category-ssl","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades | InMotion Hosting<\/title>\n<meta name=\"description\" content=\"There have been security flaws found in OpenSSL 1.0.1 and OpenSSL 1.0.2-beta1. A new OpenSSL 1.0.1h patch was made available and vulnerable versions should be patched.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"There have been security flaws found in OpenSSL 1.0.1 and OpenSSL 1.0.2-beta1. A new OpenSSL 1.0.1h patch was made available and vulnerable versions should be patched.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Support Center\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-06T01:21:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-17T03:01:29+00:00\" \/>\n<meta name=\"author\" content=\"InMotion Hosting Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/InMotionHosting\" \/>\n<meta name=\"twitter:site\" content=\"@InMotionHosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/\"},\"author\":{\"name\":\"InMotion Hosting Contributor\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\"},\"headline\":\"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades\",\"datePublished\":\"2014-06-06T01:21:38+00:00\",\"dateModified\":\"2021-08-17T03:01:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/\"},\"wordCount\":467,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"articleSection\":[\"Secure Socket Layer (SSL)\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/\",\"name\":\"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades | InMotion Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\"},\"datePublished\":\"2014-06-06T01:21:38+00:00\",\"dateModified\":\"2021-08-17T03:01:29+00:00\",\"description\":\"There have been security flaws found in OpenSSL 1.0.1 and OpenSSL 1.0.2-beta1. A new OpenSSL 1.0.1h patch was made available and vulnerable versions should be patched.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inmotionhosting.com\/support\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"name\":\"InMotion Hosting Support Center\",\"description\":\"Web Hosting Support &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\",\"name\":\"InMotion Hosting\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"width\":696,\"height\":696,\"caption\":\"InMotion Hosting\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/inmotionhosting\/\",\"https:\/\/x.com\/InMotionHosting\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\",\"name\":\"InMotion Hosting Contributor\",\"description\":\"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/inmotion-hosting\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting\"],\"url\":\"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades | InMotion Hosting","description":"There have been security flaws found in OpenSSL 1.0.1 and OpenSSL 1.0.2-beta1. A new OpenSSL 1.0.1h patch was made available and vulnerable versions should be patched.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/","og_locale":"en_US","og_type":"article","og_title":"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades | InMotion Hosting","og_description":"There have been security flaws found in OpenSSL 1.0.1 and OpenSSL 1.0.2-beta1. A new OpenSSL 1.0.1h patch was made available and vulnerable versions should be patched.","og_url":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/","og_site_name":"InMotion Hosting Support Center","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting\/","article_published_time":"2014-06-06T01:21:38+00:00","article_modified_time":"2021-08-17T03:01:29+00:00","author":"InMotion Hosting Contributor","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/InMotionHosting","twitter_site":"@InMotionHosting","twitter_misc":{"Written by":"InMotion Hosting Contributor","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/"},"author":{"name":"InMotion Hosting Contributor","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644"},"headline":"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades","datePublished":"2014-06-06T01:21:38+00:00","dateModified":"2021-08-17T03:01:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/"},"wordCount":467,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"articleSection":["Secure Socket Layer (SSL)","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/","url":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/","name":"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#website"},"datePublished":"2014-06-06T01:21:38+00:00","dateModified":"2021-08-17T03:01:29+00:00","description":"There have been security flaws found in OpenSSL 1.0.1 and OpenSSL 1.0.2-beta1. A new OpenSSL 1.0.1h patch was made available and vulnerable versions should be patched.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/openssl-1-0-1-and-1-0-2-beta1-security-upgrades\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/support\/"},{"@type":"ListItem","position":2,"name":"OpenSSL 1.0.1 and 1.0.2-beta1 security upgrades"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/support\/#website","url":"https:\/\/www.inmotionhosting.com\/support\/","name":"InMotion Hosting Support Center","description":"Web Hosting Support &amp; Tutorials","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/support\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/support\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","width":696,"height":696,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting\/","https:\/\/x.com\/InMotionHosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644","name":"InMotion Hosting Contributor","description":"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!","sameAs":["https:\/\/www.linkedin.com\/company\/inmotion-hosting\/","https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting"],"url":"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":null,"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/3279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/users\/57014"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/comments?post=3279"}],"version-history":[{"count":2,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/3279\/revisions"}],"predecessor-version":[{"id":84253,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/3279\/revisions\/84253"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/media?parent=3279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/categories?post=3279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/tags?post=3279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}