Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style

debian0001

Senior member
Jun 8, 2012
465
0
76
I played with this and was able to find logins for some obscure sites so this is pretty crazy haha...
 

Elixer

Lifer
May 7, 2002
10,376
762
126
Hmm... wonder if they will revoke all certs now ?
This was a pretty bad bug.
 

Lifted

Diamond Member
Nov 30, 2004
5,752
2
0
Don't worry, only systems using OpenSSL 1.0.1 and 1.0.2beta are affected by this.

All Microsoft IIS servers are safe.
 

Crusty

Lifer
Sep 30, 2001
12,684
2
81
Hmm... wonder if they will revoke all certs now ?
This was a pretty bad bug.

If you were running a vulnerable version of OpenSSL and haven't re-keyed your certs yet, you're doing it wrong.

There is no way to possibly tell if someone compromised your server and has your key, the only safe option is to get rid of the old ones.
 

palswim

Golden Member
Nov 23, 2003
1,049
0
71
www.palswim.net
Does base DD-WRT or OpenVPN use OpenSSL? I may need to patch my own systems.

I already found out that I am running OpenSSL 1.0.1g on my XBian system, though I don't think I'm running any vulnerable services externally.
 

code65536

Golden Member
Mar 7, 2006
1,006
0
76
The NSA must be LOVING this. Or perhaps they are the ones that introduced the vuln two years ago, and have been exploiting it ever since.

Nah, they're probably regretting that they hadn't found this earlier. The NSA revelations have led to increased scrutiny over security libraries, and that's how this was found.

The code containing this bug was authored by the person who co-authored the TLS heartbeat RFC, and he's a German, so all signs point to this being accidental, possibly the result of C being written by someone who probably doesn't work with C a lot (most computer scientists are so used to working with more abstract languages that they forget just how low-level something like C is).
 

palswim

Golden Member
Nov 23, 2003
1,049
0
71
www.palswim.net
Does base DD-WRT or OpenVPN use OpenSSL? I may need to patch my own systems.

Although I'm having trouble locating the version of OpenSSL on my DD-WRT router, the Heartbleed site (see the "What versions of the OpenSSL are affected?" section) indicates that my router would only have this bug if it were using OpenSSL versions released after December 2011. Thankfully, I've been too lazy to update since 2010!
 

code65536

Golden Member
Mar 7, 2006
1,006
0
76
Does base DD-WRT or OpenVPN use OpenSSL? I may need to patch my own systems.

I already found out that I am running OpenSSL 1.0.1g on my XBian system, though I don't think I'm running any vulnerable services externally.

Heartbeat was added to OpenSSL on New Year's Eve 2011, a minute before midnight (German time), so basically, anything from 2011 is safe by default.

DD-WRT started using the vulnerable code on 2012/04/29. Any DD-WRT build after (and including) 19163 has the flaw, and any build after (and including) 23882 has the fix.
 
Last edited:

hardhat

Senior member
Dec 4, 2011
425
115
116
Hmm...

I am logged into steam right now, and the name of my copy of South Park: STOT has been changed to "Valve please reset all partner logins because heartbleed". Does this indicate a vulnerability on valve's server side, or on my pc? What can I do to protect from data and account loss?
 

John Connor

Lifer
Nov 30, 2012
22,840
617
121
Are you guys talking about DD-WRT refering to the OpenVPN? Because I have DD-WRT, but I use SSH.
 

code65536

Golden Member
Mar 7, 2006
1,006
0
76
Hmm...

I am logged into steam right now, and the name of my copy of South Park: STOT has been changed to "Valve please reset all partner logins because heartbleed". Does this indicate a vulnerability on valve's server side, or on my pc? What can I do to protect from data and account loss?

Everyone is seeing that name change. Either the publisher changed the listing name for the game, or someone logged in as the publisher and changed the name of the listing.

Either way, there is nothing for you to do except change your password once it's clear that Steam has patched its servers.
 

code65536

Golden Member
Mar 7, 2006
1,006
0
76
Are you guys talking about DD-WRT refering to the OpenVPN? Because I have DD-WRT, but I use SSH.

SSH does not use SSL/TLS for its encryption, so it's unaffected.

DD-WRT's HTTPS-based remote management is obviously also affected, but that feature, like OpenVPN, is disabled by default.
 
Last edited:

Dude111

Golden Member
Jan 19, 2010
1,495
5
81
VirtualLarry said:
The NSA must be LOVING this. Or perhaps they are the ones that introduced the vuln two years ago, and have been exploiting it ever since.
I wouldnt doubt 4 a second they did!!

Crusty said:
There is no way to possibly tell if someone compromised your server and has your key, the only safe option is to get rid of the old ones.
Yes and NOT USE OPENSSL!!! (Use another method)
 
Last edited:

Chiefcrowe

Diamond Member
Sep 15, 2008
5,049
182
116
Does anyone know if Steam has updated their systems? I changed my pw but may have to change again...

ARGH!
 

John Connor

Lifer
Nov 30, 2012
22,840
617
121
I don't listen to that conspiracy nut. I personally think the problem was the "open" in Open SSL.

I wish all sites just used AES+Twofish. It's fast anyway and free! Why can't sites use just AES? I've seen my bank and a few others use AES, but most use RC4. Bah

I'm using an add-on for Pale Moon and Firefox called Cipherfox. It displays the type of encryption.
 

code65536

Golden Member
Mar 7, 2006
1,006
0
76
I don't listen to that conspiracy nut. I personally think the problem was the "open" in Open SSL.
Um, no? The problem was someone accidentally forgetting the number one rule of security programming: validate all input.

I wish all sites just used AES+Twofish. It's fast anyway and free! Why can't sites use just AES? I've seen my bank and a few others use AES, but most use RC4. Bah
Erm...

First, AES is available for use in TLS. Second, which block cipher the server negotiates with the client to use is completely irrelevant here because Heartbleed has absolutely nothing to do with encryption.

TLS supports something called a "heartbeat", which is basically a "hey, are you still there?" to prevent the connection from timing out. I say to you, "Monkeys!", and you echo that back to me, and I know that you're still on the line with me.

The Heartbleed bug is the server not validating the the heartbeat input, thus causing it to including more data than it should in its return echo. I say to you, "Monkeys!" and tell you that you're supposed to echo back something two paragraphs long, and you didn't bother to check that my "Monkeys!" isn't actually two paragraphs long, so you echo back to me two paragraphs that consists of my "Monkeys!" and some random other words that you happened to have lying around to fill my two-paragraph request. And that extra data is basically random--it might be useless garbage, or it might be a chunk from a recent transmission from someone else containing sensitive data. That's it. None of the cryptographic bits were involved; the vulnerable code is completely unrelated to any of the cryptographic components.
 
Last edited:

code65536

Golden Member
Mar 7, 2006
1,006
0
76
You say TLS, this is SSL. Or should I say SOL? LOL

You do know that TLS is basically the new name that they gave SSL, right? (so instead of "SSL v4", it's "TLS") SSL and TLS are still used interchangeably in the vernacular.

OpenSSL may be called "SSL", but implements both SSL and TLS. Heartbeat is an extension of TLS, not SSL. And TLS supports AES as a block cipher (which SSL obviously doesn't because SSL predates AES).
 
Last edited:
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |