HEARTBLEED


Jump to Page:
< Previous  [ 1 ]    Next >




Full House   
Member since: Oct 12
Posts: 2677
Location:

Post ID: #PID Posted on: 11-04-14 14:06:09

FIRST I thought some one was stealing all of our sweethearts. After reading more about it and still learning, I thought I should bring it to everyone's attention, so that we all can protect ourselves from this drastic catastrophe, a big huge sinkhole that they left for us to discover today.

Who found the Heartbleed Bug?

This bug was independently discovered by a team of security engineers (Riku, Antti and Matti) at Codenomicon and Neel Mehta of Google Security, who first reported it to the OpenSSL team. Codenomicon team found heartbleed bug while improving the SafeGuard feature in Codenomicon's Defensics security testing tools and reported this bug to the NCSC-FI for vulnerability coordination and reporting to OpenSSL team.

Why it is called the Heartbleed Bug?

Bug is in the OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). When it is exploited it leads to the leak of memory contents from the server to the client and from the client to the server.

What makes the Heartbleed Bug unique?

Bugs in single software or library come and go and are fixed by new versions. However this bug has left large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitation and attacks leaving no trace this exposure should be taken seriously.

What is being leaked?

Encryption is used to protect secrets that may harm your privacy or security if they leak. In order to coordinate recovery from this bug we have classified the compromised secrets to four categories: 1) primary key material, 2) secondary key material and 3) protected content and 4) collateral.

What is leaked primary key material and how to recover?

These are the crown jewels, the encryption keys themselves. Leaked secret keys allows the attacker to decrypt any past and future traffic to the protected services and to impersonate the service at will. Any protection given by the encryption and the signatures in the X.509 certificates can be bypassed. Recovery from this leak requires patching the vulnerability, revocation of the compromised keys and reissuing and redistributing new keys. Even doing all this will still leave any traffic intercepted by the attacker in the past still vulnerable to decryption. All this has to be done by the owners of the services.

What is leaked secondary key material and how to recover?

These are for example the user credentials (user names and passwords) used in the vulnerable services. Recovery from this leaks requires owners of the service first to restore trust to the service according to steps described above. After this users can start changing their passwords and possible encryption keys according to the instructions from the owners of the services that have been compromised. All session keys and session cookies should be invalided and considered compromised.

What is leaked protected content and how to recover?

This is the actual content handled by the vulnerable services. It may be personal or financial details, private communication such as emails or instant messages, documents or anything seen worth protecting by encryption. Only owners of the services will be able to estimate the likelihood what has been leaked and they should notify their users accordingly. Most important thing is to restore trust to the primary and secondary key material as described above. Only this enables safe use of the compromised services in the future.

What is leaked collateral and how to recover?

Leaked collateral are other details that have been exposed to the attacker in the leaked memory content. These may contain technical details such as memory addresses and security measures such as canaries used to protect against overflow attacks. These have only contemporary value and will lose their value to the attacker when OpenSSL has been upgraded to a fixed version.

Can I detect if someone has exploited this against me?

Exploitation of this bug leaves no traces of anything abnormal happening to the logs.

Where to find more information?

This Q&A was published as a follow-up to the OpenSSL advisory, since this vulnerability became public on 7th of April 2014. The OpenSSL project has made a statement at https://www.openssl.org/news/secadv_20140407.txt. NCSC-FI published an advisory at https://www.cert.fi/en/reports/2014/vulnerability788210.html. Individual vendors of operating system distributions, affected owners of Internet services, software packages and appliance vendors may issue their own advisories.


So, beware...!!

FH





Jump to Page: < Previous  [ 1 ]    Next >

Discussions similar to: HEARTBLEED

Topic Forum Views Replies
Dog is infact God, while God is ......
General 6775 3
Do not login to paypal.com from e-mail
Science & Technology 1656 5
USA Social Security Number (SSN) question... ( 1 2 )
USA 1706 9
Security gurad positions
Jobs 1760 1
H1b and Social Security
Moving Soon 1537 2
Security Jobs
General 1714 4
Social Security- To Social Insurance (CPP) - Credits transfer
General 2935 4
EURO ENGLISH
Have Fun! 1606 3
INDIA HAS SOCIAL SECURITY AGREEMENT WITH CANADA FOR SECURITY PENSION
Family Class 2519 1
PC too slow
Science & Technology 1758 5
Applying for PIO Card in Toronto ( 1 2 )
General 4684 11
Any practising lawyers on this forum?
General 1704 2
Urgent -Letter of good conduct required for Federal Govt Job ( 1 2 )
Ask Immigration Expert 3111 9
laptop security
Science & Technology 1609 6
Norton 360 Mistakenly dubbed Canadian Desi Forum as phishing site
Feedback and Comments 2891 4
Don't mess up with old people
Have Fun! 1348 1
Req. threads that are huge
Feedback and Comments 1831 3
If Columbus was Married? Would he had still discovered AMERICA?
Have Fun! 1386 4
OCI application
General 1628 1
TO CALL THE POLICE - within minutes ( 1 2 )
General 2616 9
What If Columbus Had Been Married ?
Have Fun! 1259 3
Email Security - hacking
General 1659 4
HEARTBLEED
Science & Technology 1091 0
Tax Return preparation in fort Mcmurray
Accounting and Taxation 1355 1
Nothing to show ( 1 2 )
Nothing to show
Wanted 6343 8
 


Share:
















Advertise Contact Us Privacy Policy and Terms of Usage FAQ
Canadian Desi
© 2001 Marg eSolutions


Site designed, developed and maintained by Marg eSolutions Inc.