|
|
|
![]() |
|
|||||||
|
||||||||
![]() |
| Thread Tools |
Rating:
|
Display Modes |
|
#1
|
||||
|
||||
|
Heartbleed
In case you haven't heard, now is a really good time to go and change your passwords.
This article explains it better than I can-- maybe some of the network gurus around here have more details? I didn't see a thread about it anywhere and figured it's probably relevant to a lot of the users here. |
|
#2
|
|||||
|
|||||
|
Re: Heartbleed
Quote:
The way the protocol is defined, the client sends its packet of data and a number representing the size of that data as validation (something pretty common to do). However, openSSL doesn't check that the given size actually corresponds to the actual size of the payload - it just allocates a chuck of memory that sized and returns it. This means that if the user tells openSSL that the payload is bigger that it is, the server will actually dump a portion of its memory back (which can include things like private keys, passwords, etc.). You can check the vulnerable code out here, and you can see it just does a memcpy and if you look at the surrounding code, those bounds aren't checked. Quote:
![]() Last edited by plnyyanks : 10-04-2014 at 23:50. |
|
#3
|
||||
|
||||
|
Re: Heartbleed
![]() |
|
#4
|
|||
|
|||
|
Re: Heartbleed
You will want to be sure your web server has been updated to address the vulnerability before you change your passwords. Otherwise you could make the problem worse by exposing both the old and new password to an attack.
|
|
#5
|
||||
|
||||
|
Re: Heartbleed
We had a security expert come in to my AP Computer Science class who recommended changing all passwords now, and then again in 3-4 weeks. The rationale being that some will have fixed it ASAP, but some will only get around to it later (or something along those lines).
|
|
#6
|
||||
|
||||
|
Re: Heartbleed
Quote:
Also, if you're a web-admin, you'll want to check your own site's SSL if you're doing anything sensitive- both the patch and a re-key has to be applied for you to be protected. Last edited by Lucario : 11-04-2014 at 15:32. |
|
#7
|
|||
|
|||
|
Re: Heartbleed
Now it is: Quote:
|
|
#8
|
||||
|
||||
|
Re: Heartbleed
Yep. Also, in Heartbleed-vulnerable routers, since almost all routers also act as a web server, SSL connections between it and clients (such as router management clients) are vulnerable to MITM (Man-In-The-Middle) attacks and decryption.
|
|
#9
|
||||
|
||||
|
Re: Heartbleed
Anyone know if CD is affected? The tool that Alan linked to is inconclusive.
Quote:
|
|
#10
|
||||
|
||||
|
Re: Heartbleed
Nope -- CD doesn't use SSL/HTTPS. Port 443 on chiefdelphi.com is blocked.
|
|
#11
|
||||||
|
||||||
|
Quote:
In other words, don't use an important password here. |
|
#12
|
|||
|
|||
|
Re: Heartbleed
Is there any password that could be more important?
|
![]() |
| Thread Tools | |
| Display Modes | Rate This Thread |
|
|