HEARTBLEED


Jump to Page:
< Previous  [ 1 ]    Next >




Full House   
Member since: Oct 12
Posts: 2677
Location:

Post ID: #PID Posted on: 11-04-14 14:06:09

FIRST I thought some one was stealing all of our sweethearts. After reading more about it and still learning, I thought I should bring it to everyone's attention, so that we all can protect ourselves from this drastic catastrophe, a big huge sinkhole that they left for us to discover today.

Who found the Heartbleed Bug?

This bug was independently discovered by a team of security engineers (Riku, Antti and Matti) at Codenomicon and Neel Mehta of Google Security, who first reported it to the OpenSSL team. Codenomicon team found heartbleed bug while improving the SafeGuard feature in Codenomicon's Defensics security testing tools and reported this bug to the NCSC-FI for vulnerability coordination and reporting to OpenSSL team.

Why it is called the Heartbleed Bug?

Bug is in the OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). When it is exploited it leads to the leak of memory contents from the server to the client and from the client to the server.

What makes the Heartbleed Bug unique?

Bugs in single software or library come and go and are fixed by new versions. However this bug has left large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitation and attacks leaving no trace this exposure should be taken seriously.

What is being leaked?

Encryption is used to protect secrets that may harm your privacy or security if they leak. In order to coordinate recovery from this bug we have classified the compromised secrets to four categories: 1) primary key material, 2) secondary key material and 3) protected content and 4) collateral.

What is leaked primary key material and how to recover?

These are the crown jewels, the encryption keys themselves. Leaked secret keys allows the attacker to decrypt any past and future traffic to the protected services and to impersonate the service at will. Any protection given by the encryption and the signatures in the X.509 certificates can be bypassed. Recovery from this leak requires patching the vulnerability, revocation of the compromised keys and reissuing and redistributing new keys. Even doing all this will still leave any traffic intercepted by the attacker in the past still vulnerable to decryption. All this has to be done by the owners of the services.

What is leaked secondary key material and how to recover?

These are for example the user credentials (user names and passwords) used in the vulnerable services. Recovery from this leaks requires owners of the service first to restore trust to the service according to steps described above. After this users can start changing their passwords and possible encryption keys according to the instructions from the owners of the services that have been compromised. All session keys and session cookies should be invalided and considered compromised.

What is leaked protected content and how to recover?

This is the actual content handled by the vulnerable services. It may be personal or financial details, private communication such as emails or instant messages, documents or anything seen worth protecting by encryption. Only owners of the services will be able to estimate the likelihood what has been leaked and they should notify their users accordingly. Most important thing is to restore trust to the primary and secondary key material as described above. Only this enables safe use of the compromised services in the future.

What is leaked collateral and how to recover?

Leaked collateral are other details that have been exposed to the attacker in the leaked memory content. These may contain technical details such as memory addresses and security measures such as canaries used to protect against overflow attacks. These have only contemporary value and will lose their value to the attacker when OpenSSL has been upgraded to a fixed version.

Can I detect if someone has exploited this against me?

Exploitation of this bug leaves no traces of anything abnormal happening to the logs.

Where to find more information?

This Q&A was published as a follow-up to the OpenSSL advisory, since this vulnerability became public on 7th of April 2014. The OpenSSL project has made a statement at https://www.openssl.org/news/secadv_20140407.txt. NCSC-FI published an advisory at https://www.cert.fi/en/reports/2014/vulnerability788210.html. Individual vendors of operating system distributions, affected owners of Internet services, software packages and appliance vendors may issue their own advisories.


So, beware...!!

FH





Jump to Page: < Previous  [ 1 ]    Next >

Discussions similar to: HEARTBLEED

Topic Forum Views Replies
Sticky: Old Doordarshan Serials ! Your Pick ? ( 1 2 3 ... Last )
Filmi Gupshup 195254 193
DRIVER’S HANDBOOK NOTES
Just Landed 5516 2
Top Eight Reasons NOT to immigrate to Canada ** ( 1 2 3 ... Last )
Jobs 65168 324
It's a Flat World, After All
News and Events 1861 0
New Immigrant To Canada, Is Calling It Quits! ( 1 2 3 )
Life 6637 15
Deepa Mehta's 'Water' to open the Toronto Film Festival
Arts and Culture 1967 2
Top Eight Reasons NOT to immigrate to Canada ( 1 2 3 4 )
Moving Soon 9167 27
Greg Chappell's email
General 1629 0
Interesting Article About Canada
General 2224 1
Pension can send home country After Retirement in canada
Family Class 2614 3
Mukesh Ambanis Blue Print for Reliance in SEZ & Retail - India #1
Our Native Country! 1853 0
Drug Design/Research/Development: Outsourced to India
Our Native Country! 4109 3
Social Darwinism-Survival of the Fittest & Trickle-down Economics ( 1 2 3 ... Last )
News and Events 39060 229
Our First prospective woman President - Some facts about this great persona
Our Native Country! 2414 2
Lease agreement- Problem at the end of lease ( 1 2 3 )
Real Estate & Mortgages 9158 20
Dark Side of Dubai !
General 3619 4
President Obama's speech at Cairo University ( 1 2 )
General 1820 7
The Best Answers to Tough Interview Questions ( 1 2 3 4 )
Jobs 10404 24
Ayodhya Verdict: Hindus and Muslims to share the site ( 1 2 3 )
Our Native Country! 12248 17
World's Largest Republic of Scams ( 1 2 )
Our Native Country! 3478 8
Is university worth it ?
Study 2799 1
TN Visa to Green Card ( 1 2 3 4 5 )
USA 9463 31
Is it all over for the India? ( 1 2 3 ... Last )
News and Events 30114 166
HEARTBLEED
Science & Technology 1174 0
WHODATHUNKIT ( 1 2 3 )
General 9140 17
 


Share:
















Advertise Contact Us Privacy Policy and Terms of Usage FAQ
Canadian Desi
© 2001 Marg eSolutions


Site designed, developed and maintained by Marg eSolutions Inc.