Welcome Guest ( Log In | Register )

4 Pages V < 1 2 3 4 >  
Closed TopicStart new topic
> The OpenSSL Heartbleed Exploit And You

 
post Apr 9 2014, 09:43
Post #21
S BENZ



Casual Poster
***
Group: Members
Posts: 163
Joined: 15-August 10
Level 220 (Destined)


I am greatly reassured that I did not take the plunge and have all my financial and most other details being handled online a couple of decades ago, looks likely my overall caution 'might' have paid off.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 09:57
Post #22
Arith Undine



ElvenCon
******
Group: Catgirl Camarilla
Posts: 815
Joined: 24-August 11
Level 500 (Ponyslayer)


Now checking all my bank accounts, and e-wallets.
That's really a pain in the ass.

At least, we are safe here.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 11:47
Post #23
Necromusume




*********
Group: Catgirl Camarilla
Posts: 7,069
Joined: 17-May 12
Level 500 (Ponyslayer)



(IMG:https://forums.e-hentai.org/uploads/post-986243-1397036629.jpg)

I am reading your passwords
With my mind



This post has been edited by mechafujoshi: Apr 9 2014, 11:48
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 11:53
Post #24
Tresik



Newcomer
*
Group: Members
Posts: 17
Joined: 13-March 13
Level 247 (Godslayer)


Good job informing people about this very important issue.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 12:05
Post #25
Wizards



Newcomer
*
Group: Recruits
Posts: 13
Joined: 28-May 10
Level 235 (Godslayer)


"https://e-hentai.org/" has been GFW ~
o((⊙﹏⊙))o
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 13:16
Post #26
LostLogia4



Translating Miku's Yuri Nikki for the heck of it~~
********
Group: Gold Star Club
Posts: 2,716
Joined: 4-June 11
Level 362 (Godslayer)


Okay, I might be about half a day late, but I've updated the OpenSSL on my H@Home server in response to this vulnerability. If you have any servers that uses the OpenSSL, you should update them ASAP.

As for my server, the provider for my VPN haven't quite added the updated OpenSSL into their repo, so I added the OS's main repo in response.

This post has been edited by LostLogia4: Apr 9 2014, 13:18
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 14:19
Post #27
blue penguin



in umbra, igitur, pugnabimus
***********
Group: Gold Star Club
Posts: 10,046
Joined: 24-March 12
Level 500 (Godslayer)


QUOTE(LostLogia4 @ Apr 9 2014, 12:16) *

Okay, I might be about half a day late, but I've updated the OpenSSL on my H@Home server in response to this vulnerability. If you have any servers that uses the OpenSSL, you should update them ASAP.

As for my server, the provider for my VPN haven't quite added the updated OpenSSL into their repo, so I added the OS's main repo in response.

Debian and Red Hat (at least) are is still behind, if you wanna make sure 100% that you're safe from heart bleed cross check the openssl.
CODE
$ openssl version

e.g. on latest debian weezy it still gives:
CODE
OpenSSL 1.0.1e 11 Feb 2013
which contains the heartbleed bug.

(remember that the bug is around server HTTPS, if you do not use HTTPS for anything you're good)

EDIT: You can update Debian to a decent openssl version. Thanks mechafujoshi

This post has been edited by blue penguin: Apr 9 2014, 14:49
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 14:42
Post #28
Necromusume




*********
Group: Catgirl Camarilla
Posts: 7,069
Joined: 17-May 12
Level 500 (Ponyslayer)


QUOTE(blue penguin @ Apr 9 2014, 12:19) *

Debian and Red Hat (at least) are still behind, if you wanna make sure 100% that you're safe from heart bleed cross check the openssl.
CODE
$ openssl version

e.g. on latest debian weezy it still gives:
CODE
OpenSSL 1.0.1e 11 Feb 2013
which contains the heartbleed bug.

Debian did issue a patch on April 7:
[www.debian.org] https://www.debian.org/security/2014/dsa-2896
QUOTE

For the stable distribution (wheezy), this problem has been fixed in version 1.0.1e-2+deb7u5.

They usually backport security patches to the exact version in stable to avoid introducing additional lightly-tested code or causing breakage in running systems, so stable gets a patched 1.0.1e.

>Go to your bank
>They don't say anything about it. If you don't know yet, they don't want you to know.
>Go to your hentai site
>Today's programming is pre-empted to tell you all about it
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 16:25
Post #29
Tenboro

Admin




Not sure about RHEL (Red Hat), but CentOS pushed a very quick patch that simply disables the heartbeat functionality without waiting for upstream. It will still show as 1.0.1e with openssl version, but if you rpm -q openssl it will show as openssl-1.0.1e-16.el6_5.7.

Edit: There is a patch for RHEL 6 as well, I believe CentOS replaced their patch with the upstream's.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 18:54
Post #30
blue penguin



in umbra, igitur, pugnabimus
***********
Group: Gold Star Club
Posts: 10,046
Joined: 24-March 12
Level 500 (Godslayer)


Cool, they're fast when the breach is big. From what I looked around today, the only distros from the Red Hat copies family that haven't made patches are Oracle Linux (no surprise there) and CERN's Scientific Linux (which personally I'm super pissed with, as I do have a server running https nginx with this OS (IMG:[invalid] style_emoticons/default/sad.gif) ).
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 19:46
Post #31
rickshawpanda77



Newcomer
*
Group: Members
Posts: 20
Joined: 23-December 11
Level 57 (Expert)


For people worried about online banking, don't worry about it too much. The banks have better security, not to mention if you do get robbed your bank will help you with that. However, for your yahoo accounts you guys better start changing passwords (IMG:[invalid] style_emoticons/default/wink.gif)
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 20:58
Post #32
Freedomno1



Casual Poster
***
Group: Members
Posts: 124
Joined: 25-January 10
Level 363 (Godslayer)


Since heartbleed also affects Bitcoins I would recommend users running Bitcoin QT to move up to version 0.9.1

News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0. Download. More info.

[bitcoin.org] https://bitcoin.org/bin/0.9.1/ Download
[bitcointalk.org] https://bitcointalk.org/index.php?topic=562400.0 More Info
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 21:14
Post #33
mokkah



Newcomer
*
Group: Members
Posts: 21
Joined: 11-November 12


QUOTE(rickshawpanda77 @ Apr 9 2014, 19:46) *

For people worried about online banking, don't worry about it too much. The banks have better security, not to mention if you do get robbed your bank will help you with that. However, for your yahoo accounts you guys better start changing passwords (IMG:[invalid] style_emoticons/default/wink.gif)

This is a dangerous thing to say, all online banking services are different and there's no doubt they employ talented people, but it doesn't mean none of them are vulnerable.

This is probably the most serious security bug since the web became mainstream, pretty scary.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 21:49
Post #34
kingwolf



Gonna be a lot of shredded beef when I'm done with you
*********
Group: Members
Posts: 6,438
Joined: 16-July 09
Level 370 (Destined)


[filippo.io] Heartbleed test

This'll help you find out which sites are vulnerable. The big stuff like Google, Microsoft and Amazon are fine.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 22:13
Post #35
blue penguin



in umbra, igitur, pugnabimus
***********
Group: Gold Star Club
Posts: 10,046
Joined: 24-March 12
Level 500 (Godslayer)


QUOTE(Freedomno1 @ Apr 9 2014, 19:58) *

Since heartbleed also affects Bitcoins I would recommend users running Bitcoin QT to move up to version 0.9.1

News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0. Download. More info.

[bitcoin.org] https://bitcoin.org/bin/0.9.1/ Download
[bitcointalk.org] https://bitcointalk.org/index.php?topic=562400.0 More Info

*snip*

EDIT: bad info, sorry

This post has been edited by blue penguin: Apr 10 2014, 02:43
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 9 2014, 23:17
Post #36
Tenboro

Admin




QUOTE(blue penguin @ Apr 9 2014, 22:13) *
Only if you use web wallets (don't use those) or boot the UI/integrate your bitcoin client with your browser.i.e. But do update your bitcoin client, e.g. if you plan to use the GUI in the future.


False. The GUI version of Bitcoin Core 0.9.0 was vulnerable to Heartbleed even if you didn't enable RPC SSL. It's part of their new payment request thingie (BIP 0070). Prior versions were not vulnerable, unless you enabled RPC SSL.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 10 2014, 03:25
Post #37
slyborg



Newcomer
*
Group: Members
Posts: 49
Joined: 17-June 08
Level 189 (Lord)


The bug is certain to be exploited now that it is public, but I think some of the breathless talk about all past SSL transactions being exposed is tabloid hyperbole. Exploiting this on a wide scale would require huge amounts of effort, since you get 64K of process memory per attempt, which might or might not contain keys. As a targeted attack against specific targets it is a huge problem since it could lead to silent compromise of site keys which could be used to pwn people en masse, but against individual traffic, not so much.

tl;dr if you run a service using SSL, better update your openssl and change your certs, but some guy in Moldova is not reading your Yahoo mail tonight because of this bug.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 10 2014, 08:44
Post #38
S BENZ



Casual Poster
***
Group: Members
Posts: 163
Joined: 15-August 10
Level 220 (Destined)


Well good news for me my passbook account at my bank is A O K as well as my cheque book account too so I am in the apparent all-clear.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 10 2014, 12:43
Post #39
LurkerDan



Newcomer
*
Group: Members
Posts: 21
Joined: 14-May 12
Level 16 (Novice)


Really, the only surprising thing about this is that it didn't happen sooner.
I feel reconfirmed with my policy to write any dynamic system on my websites myself.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

 
post Apr 10 2014, 12:52
Post #40
4M4M



Newcomer
*
Group: Members
Posts: 22
Joined: 11-January 12
Level 93 (Lord)


Damn, just when I started using Google Wallet.

(I guess it doesn't affect me directly -seems like my bank account is just fine- but heartbleed will make any upcoming transaction quite scary).
User is offlineProfile CardPM
Go to the top of the page
+Quote Post


4 Pages V < 1 2 3 4 >
Closed TopicStart new topic
1 User(s) are reading this topic (1 Guests and 0 Anonymous Users)
0 Members:

 


Lo-Fi Version Time is now: 8th July 2025 - 09:21