Loading. Please Wait... 
 |
 |
 |
The OpenSSL Heartbleed Exploit And You |
|
Apr 9 2014, 09:43
|
S BENZ
Group: Members
Posts: 163
Joined: 15-August 10

|
I am greatly reassured that I did not take the plunge and have all my financial and most other details being handled online a couple of decades ago, looks likely my overall caution 'might' have paid off.
|
|
|
Apr 9 2014, 09:57
|
Arith Undine
Group: Catgirl Camarilla
Posts: 815
Joined: 24-August 11

|
Now checking all my bank accounts, and e-wallets. That's really a pain in the ass.
At least, we are safe here.
|
|
|
Apr 9 2014, 11:47
|
Necromusume
Group: Catgirl Camarilla
Posts: 7,069
Joined: 17-May 12

|
This post has been edited by mechafujoshi: Apr 9 2014, 11:48
|
|
|
Apr 9 2014, 11:53
|
Tresik
Newcomer
 Group: Members
Posts: 17
Joined: 13-March 13

|
Good job informing people about this very important issue.
|
|
|
Apr 9 2014, 12:05
|
Wizards
Newcomer
 Group: Recruits
Posts: 13
Joined: 28-May 10

|
"https://e-hentai.org/" has been GFW ~ o((⊙﹏⊙))o
|
|
|
Apr 9 2014, 13:16
|
LostLogia4
Group: Gold Star Club
Posts: 2,716
Joined: 4-June 11

|
Okay, I might be about half a day late, but I've updated the OpenSSL on my H@Home server in response to this vulnerability. If you have any servers that uses the OpenSSL, you should update them ASAP.
As for my server, the provider for my VPN haven't quite added the updated OpenSSL into their repo, so I added the OS's main repo in response.
This post has been edited by LostLogia4: Apr 9 2014, 13:18
|
|
|
|
 |
|
Apr 9 2014, 14:19
|
blue penguin
Group: Gold Star Club
Posts: 10,046
Joined: 24-March 12

|
QUOTE(LostLogia4 @ Apr 9 2014, 12:16)  Okay, I might be about half a day late, but I've updated the OpenSSL on my H@Home server in response to this vulnerability. If you have any servers that uses the OpenSSL, you should update them ASAP.
As for my server, the provider for my VPN haven't quite added the updated OpenSSL into their repo, so I added the OS's main repo in response.
Debian and Red Hat (at least) are is still behind, if you wanna make sure 100% that you're safe from heart bleed cross check the openssl. CODE $ openssl version e.g. on latest debian weezy it still gives: CODE OpenSSL 1.0.1e 11 Feb 2013 which contains the heartbleed bug. (remember that the bug is around server HTTPS, if you do not use HTTPS for anything you're good) EDIT: You can update Debian to a decent openssl version. Thanks mechafujoshi This post has been edited by blue penguin: Apr 9 2014, 14:49
|
|
|
|
 |
|
Apr 9 2014, 14:42
|
Necromusume
Group: Catgirl Camarilla
Posts: 7,069
Joined: 17-May 12

|
QUOTE(blue penguin @ Apr 9 2014, 12:19)  Debian and Red Hat (at least) are still behind, if you wanna make sure 100% that you're safe from heart bleed cross check the openssl. CODE $ openssl version e.g. on latest debian weezy it still gives: CODE OpenSSL 1.0.1e 11 Feb 2013 which contains the heartbleed bug. Debian did issue a patch on April 7: [ www.debian.org] https://www.debian.org/security/2014/dsa-2896QUOTE For the stable distribution (wheezy), this problem has been fixed in version 1.0.1e-2+deb7u5.
They usually backport security patches to the exact version in stable to avoid introducing additional lightly-tested code or causing breakage in running systems, so stable gets a patched 1.0.1e. >Go to your bank >They don't say anything about it. If you don't know yet, they don't want you to know. >Go to your hentai site >Today's programming is pre-empted to tell you all about it
|
|
|
|
 |
|
Apr 9 2014, 16:25
|
Tenboro

|
Not sure about RHEL (Red Hat), but CentOS pushed a very quick patch that simply disables the heartbeat functionality without waiting for upstream. It will still show as 1.0.1e with openssl version, but if you rpm -q openssl it will show as openssl-1.0.1e-16.el6_5.7.
Edit: There is a patch for RHEL 6 as well, I believe CentOS replaced their patch with the upstream's.
|
|
|
Apr 9 2014, 18:54
|
blue penguin
Group: Gold Star Club
Posts: 10,046
Joined: 24-March 12

|
Cool, they're fast when the breach is big. From what I looked around today, the only distros from the Red Hat copies family that haven't made patches are Oracle Linux (no surprise there) and CERN's Scientific Linux (which personally I'm super pissed with, as I do have a server running https nginx with this OS (IMG:[ invalid] style_emoticons/default/sad.gif) ).
|
|
|
Apr 9 2014, 19:46
|
rickshawpanda77
Newcomer
 Group: Members
Posts: 20
Joined: 23-December 11

|
For people worried about online banking, don't worry about it too much. The banks have better security, not to mention if you do get robbed your bank will help you with that. However, for your yahoo accounts you guys better start changing passwords (IMG:[ invalid] style_emoticons/default/wink.gif)
|
|
|
Apr 9 2014, 20:58
|
Freedomno1
Group: Members
Posts: 124
Joined: 25-January 10

|
Since heartbleed also affects Bitcoins I would recommend users running Bitcoin QT to move up to version 0.9.1 News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0. Download. More info. [ bitcoin.org] https://bitcoin.org/bin/0.9.1/ Download [ bitcointalk.org] https://bitcointalk.org/index.php?topic=562400.0 More Info
|
|
|
|
 |
|
Apr 9 2014, 21:14
|
mokkah
Newcomer
 Group: Members
Posts: 21
Joined: 11-November 12

|
QUOTE(rickshawpanda77 @ Apr 9 2014, 19:46)  For people worried about online banking, don't worry about it too much. The banks have better security, not to mention if you do get robbed your bank will help you with that. However, for your yahoo accounts you guys better start changing passwords (IMG:[ invalid] style_emoticons/default/wink.gif) This is a dangerous thing to say, all online banking services are different and there's no doubt they employ talented people, but it doesn't mean none of them are vulnerable. This is probably the most serious security bug since the web became mainstream, pretty scary.
|
|
|
Apr 9 2014, 21:49
|
kingwolf
Group: Members
Posts: 6,438
Joined: 16-July 09

|
[ filippo.io] Heartbleed test This'll help you find out which sites are vulnerable. The big stuff like Google, Microsoft and Amazon are fine.
|
|
|
Apr 9 2014, 22:13
|
blue penguin
Group: Gold Star Club
Posts: 10,046
Joined: 24-March 12

|
QUOTE(Freedomno1 @ Apr 9 2014, 19:58)  Since heartbleed also affects Bitcoins I would recommend users running Bitcoin QT to move up to version 0.9.1 News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0. Download. More info. [ bitcoin.org] https://bitcoin.org/bin/0.9.1/ Download [ bitcointalk.org] https://bitcointalk.org/index.php?topic=562400.0 More Info *snip* EDIT: bad info, sorry This post has been edited by blue penguin: Apr 10 2014, 02:43
|
|
|
|
 |
|
Apr 9 2014, 23:17
|
Tenboro

|
QUOTE(blue penguin @ Apr 9 2014, 22:13)  Only if you use web wallets (don't use those) or boot the UI/integrate your bitcoin client with your browser.i.e. But do update your bitcoin client, e.g. if you plan to use the GUI in the future. False. The GUI version of Bitcoin Core 0.9.0 was vulnerable to Heartbleed even if you didn't enable RPC SSL. It's part of their new payment request thingie (BIP 0070). Prior versions were not vulnerable, unless you enabled RPC SSL.
|
|
|
|
 |
|
Apr 10 2014, 03:25
|
slyborg
Newcomer
 Group: Members
Posts: 49
Joined: 17-June 08

|
The bug is certain to be exploited now that it is public, but I think some of the breathless talk about all past SSL transactions being exposed is tabloid hyperbole. Exploiting this on a wide scale would require huge amounts of effort, since you get 64K of process memory per attempt, which might or might not contain keys. As a targeted attack against specific targets it is a huge problem since it could lead to silent compromise of site keys which could be used to pwn people en masse, but against individual traffic, not so much.
tl;dr if you run a service using SSL, better update your openssl and change your certs, but some guy in Moldova is not reading your Yahoo mail tonight because of this bug.
|
|
|
|
 |
|
Apr 10 2014, 08:44
|
S BENZ
Group: Members
Posts: 163
Joined: 15-August 10

|
Well good news for me my passbook account at my bank is A O K as well as my cheque book account too so I am in the apparent all-clear.
|
|
|
Apr 10 2014, 12:43
|
LurkerDan
Newcomer
 Group: Members
Posts: 21
Joined: 14-May 12

|
Really, the only surprising thing about this is that it didn't happen sooner. I feel reconfirmed with my policy to write any dynamic system on my websites myself.
|
|
|
Apr 10 2014, 12:52
|
4M4M
Newcomer
 Group: Members
Posts: 22
Joined: 11-January 12

|
Damn, just when I started using Google Wallet.
(I guess it doesn't affect me directly -seems like my bank account is just fine- but heartbleed will make any upcoming transaction quite scary).
|
|
|
1 User(s) are reading this topic (1 Guests and 0 Anonymous Users)
0 Members:
|
 |
 |
 |
|
|
|