Go to Post Every single team in FRC has had a rookie season. All those... have stories. Some are sad, some are funny, some are inspiring - but all the teams have stories to be told... Each year is a chapter in the team's history book with stories to be told and shared. - JaneYoung [more]
Home
Go Back   Chief Delphi > FIRST > General Forum
CD-Media   CD-Spy  
portal register members calendar search Today's Posts Mark Forums Read FAQ rules

 
Reply
Thread Tools Rating: Thread Rating: 2 votes, 5.00 average. Display Modes
  #1   Spotlight this post!  
Unread 10-04-2014, 23:37
cadandcookies's Avatar
cadandcookies cadandcookies is offline
Director of Programs, GOFIRST
AKA: Nick Aarestad
FTC #9205 (The Iron Maidens)
Team Role: College Student
 
Join Date: Jan 2012
Rookie Year: 2009
Location: Minnesnowta
Posts: 1,546
cadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond repute
Heartbleed

In case you haven't heard, now is a really good time to go and change your passwords.

This article explains it better than I can-- maybe some of the network gurus around here have more details?

I didn't see a thread about it anywhere and figured it's probably relevant to a lot of the users here.
__________________

Never assume the motives of others are, to them, less noble than yours are to you. - John Perry Barlow
tumblr | twitter
'Snow Problem CAD Files: 2015 2016
MN FTC Field Manager, FTA, CSA, Emcee
FLL Maybe NXT Year (09-10) -> FRC 2220 (11-14) -> FTC 9205(14-?)/FRC 2667 (15-16)
VEXU UMN (2015-??)
Volunteer since 2011
2013 RCA Winner (North Star Regional) (2220)
2016 Connect Award Winner (North Super Regional and World Championship) (9205)
Reply With Quote
  #2   Spotlight this post!  
Unread 10-04-2014, 23:44
plnyyanks's Avatar
plnyyanks plnyyanks is offline
Data wins arguments.
AKA: Phil Lopreiato
FRC #1124 (The ÜberBots), FRC #2900 (The Mighty Penguins)
Team Role: College Student
 
Join Date: Apr 2010
Rookie Year: 2010
Location: NYC/Washington, DC
Posts: 1,113
plnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond reputeplnyyanks has a reputation beyond repute
Re: Heartbleed

Quote:
Originally Posted by cadandcookies View Post
maybe some of the network gurus around here have more details?
This specific exploit is actually not quite network related. It's more of a programming oversight (with huge implications). Basically, there's a part of the SSL protocol called the heartbeat, which allows for a connection to remain open over time - the client sends a little message to the server saying, "hey! don't kill my connection" and the server acknowledges it and sends some data back.

The way the protocol is defined, the client sends its packet of data and a number representing the size of that data as validation (something pretty common to do). However, openSSL doesn't check that the given size actually corresponds to the actual size of the payload - it just allocates a chuck of memory that sized and returns it. This means that if the user tells openSSL that the payload is bigger that it is, the server will actually dump a portion of its memory back (which can include things like private keys, passwords, etc.).

You can check the vulnerable code out here, and you can see it just does a memcpy and if you look at the surrounding code, those bounds aren't checked.
Quote:
/* Allocate memory for the response, size is 1 byte
* message type, plus 2 bytes payload length, plus
* payload, plus padding
*/
buffer = OPENSSL_malloc(1 + 2 + payload + padding);
bp = buffer;
/* Enter response type, length and copy payload */
*bp++ = TLS1_HB_RESPONSE;
s2n(payload, bp);
memcpy(bp, pl, payload);
Although the situation is different, the moral of the story remains the same...
__________________
Phil Lopreiato - "It's a hardware problem"
Team 1124 (2010 - 2013), Team 1418 (2014), Team 2900 (2016)
FRC Notebook The Blue Alliance for Android

Last edited by plnyyanks : 10-04-2014 at 23:50.
Reply With Quote
  #3   Spotlight this post!  
Unread 11-04-2014, 09:24
cgmv123's Avatar
cgmv123 cgmv123 is offline
FRC RI/FLL Field Manager
AKA: Max Vrany
FRC #1306 (BadgerBOTS)
Team Role: College Student
 
Join Date: Jan 2011
Rookie Year: 2011
Location: Madison, WI
Posts: 2,078
cgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond reputecgmv123 has a reputation beyond repute
Re: Heartbleed

__________________
BadgerBOTS Robotics|@team1306|Facebook: BadgerBOTS
2016 FIRST Championship Tesla Division | 2016 Wisconsin Regional Engineering Inspiration Award

2015 FIRST Championship Carson Division | 2015 Wisconsin Regional Chairman's Award

2013 FIRST Championship Curie Division | 2013 Wisconsin Regional Chairman's Award

2012 FIRST Championship Archimedes Division | 2012 Wisconsin Regional Engineering Inspiration Award, Woodie Flowers Finalist Award (Lead Mentor Ben Senson)

Reply With Quote
  #4   Spotlight this post!  
Unread 11-04-2014, 13:29
MCMechTech MCMechTech is offline
Registered User
FRC #3959 (Morgan County Mech Tech)
 
Join Date: Sep 2011
Rookie Year: 2012
Location: Morgan County, AL
Posts: 3
MCMechTech is an unknown quantity at this point
Re: Heartbleed

You will want to be sure your web server has been updated to address the vulnerability before you change your passwords. Otherwise you could make the problem worse by exposing both the old and new password to an attack.
Reply With Quote
  #5   Spotlight this post!  
Unread 11-04-2014, 14:15
cadandcookies's Avatar
cadandcookies cadandcookies is offline
Director of Programs, GOFIRST
AKA: Nick Aarestad
FTC #9205 (The Iron Maidens)
Team Role: College Student
 
Join Date: Jan 2012
Rookie Year: 2009
Location: Minnesnowta
Posts: 1,546
cadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond reputecadandcookies has a reputation beyond repute
Re: Heartbleed

Quote:
Originally Posted by MCMechTech View Post
You will want to be sure your web server has been updated to address the vulnerability before you change your passwords. Otherwise you could make the problem worse by exposing both the old and new password to an attack.
We had a security expert come in to my AP Computer Science class who recommended changing all passwords now, and then again in 3-4 weeks. The rationale being that some will have fixed it ASAP, but some will only get around to it later (or something along those lines).
__________________

Never assume the motives of others are, to them, less noble than yours are to you. - John Perry Barlow
tumblr | twitter
'Snow Problem CAD Files: 2015 2016
MN FTC Field Manager, FTA, CSA, Emcee
FLL Maybe NXT Year (09-10) -> FRC 2220 (11-14) -> FTC 9205(14-?)/FRC 2667 (15-16)
VEXU UMN (2015-??)
Volunteer since 2011
2013 RCA Winner (North Star Regional) (2220)
2016 Connect Award Winner (North Super Regional and World Championship) (9205)
Reply With Quote
  #6   Spotlight this post!  
Unread 11-04-2014, 14:22
Lucario's Avatar
Lucario Lucario is offline
Registered User
AKA: Alan
FRC #0422 (Mech Tech Dragons)
Team Role: Operator
 
Join Date: Apr 2012
Rookie Year: 2011
Location: Sinnoh
Posts: 15
Lucario is on a distinguished road
Re: Heartbleed

Quote:
Originally Posted by cadandcookies View Post
We had a security expert come in to my AP Computer Science class who recommended changing all passwords now, and then again in 3-4 weeks. The rationale being that some will have fixed it ASAP, but some will only get around to it later (or something along those lines).
https://lastpass.com/heartbleed/ actually has a web tool to check if the server's been patched. You can use this to check to see if its time to change your password.

Also, if you're a web-admin, you'll want to check your own site's SSL if you're doing anything sensitive- both the patch and a re-key has to be applied for you to be protected.

Last edited by Lucario : 11-04-2014 at 15:32.
Reply With Quote
  #7   Spotlight this post!  
Unread 11-04-2014, 14:37
rich2202 rich2202 is offline
Registered User
FRC #2202 (BEAST Robotics)
Team Role: Mentor
 
Join Date: Jan 2012
Rookie Year: 2012
Location: Wisconsin
Posts: 1,191
rich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond reputerich2202 has a reputation beyond repute
Re: Heartbleed

Quote:
Originally Posted by plnyyanks View Post
This specific exploit is actually not quite network related.

Now it is:

Quote:
Cisco and Juniper, two of the largest router and Internet equipment makers, said today that the vulnerability, which exposes encrypted data like passwords, is present in their routers, switches and firewalls.

http://www.komando.com/blog/247808/t...ery-very-worse
Reply With Quote
  #8   Spotlight this post!  
Unread 11-04-2014, 15:29
Lucario's Avatar
Lucario Lucario is offline
Registered User
AKA: Alan
FRC #0422 (Mech Tech Dragons)
Team Role: Operator
 
Join Date: Apr 2012
Rookie Year: 2011
Location: Sinnoh
Posts: 15
Lucario is on a distinguished road
Re: Heartbleed

Quote:
Originally Posted by rich2202 View Post
Now it is:
Yep. Also, in Heartbleed-vulnerable routers, since almost all routers also act as a web server, SSL connections between it and clients (such as router management clients) are vulnerable to MITM (Man-In-The-Middle) attacks and decryption.
__________________
(a.k.a Rukar.io)
Info, games, and more!
Lucario is the best Pokemon, after all.
Reply With Quote
  #9   Spotlight this post!  
Unread 11-04-2014, 19:28
Chris_Ely's Avatar
Chris_Ely Chris_Ely is offline
Registered User
AKA: luckof13
FRC #3414 (HackBots)
Team Role: College Student
 
Join Date: Jan 2010
Rookie Year: 2010
Location: Farmington, Michigan
Posts: 365
Chris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond reputeChris_Ely has a reputation beyond repute
Re: Heartbleed

Anyone know if CD is affected? The tool that Alan linked to is inconclusive.
Quote:
Originally Posted by LastPass
Unable to get HTTP headers for www.chiefdelphi.com
Site: www.chiefdelphi.com
Server software: Not reported
Was vulnerable: Possibly (might use OpenSSL, but we can't tell)
SSL Certificate: Unable to extract SSL information for that host
__________________
2013: Waterford Finalist, Livonia Winner, MSC Quarterfinalist, Curie Division
2012: Waterford, Northville, Livonia
2011: Waterford Finalist, Livonia
2010: Ann Arbor Rookie Inspiration Award, Troy

Mechanical Engineering Student,
Michigan Technological University
Reply With Quote
  #10   Spotlight this post!  
Unread 11-04-2014, 20:22
Pat Fairbank's Avatar
Pat Fairbank Pat Fairbank is offline
Circuit Breaker
FRC #0254 (The Cheesy Poofs)
Team Role: Engineer
 
Join Date: Mar 2003
Rookie Year: 2001
Location: San Jose, CA
Posts: 2,132
Pat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond reputePat Fairbank has a reputation beyond repute
Send a message via MSN to Pat Fairbank
Re: Heartbleed

Quote:
Originally Posted by luckof13 View Post
Anyone know if CD is affected? The tool that Alan linked to is inconclusive.
Nope -- CD doesn't use SSL/HTTPS. Port 443 on chiefdelphi.com is blocked.
__________________
Patrick Fairbank
Team 254 | Mentor (2012-)
Team 1503 | Mentor (2007-2011)
Team 296 | Alumnus (2001-2004) | Mentor (2005-2006)

patfairbank.com
Reply With Quote
  #11   Spotlight this post!  
Unread 11-04-2014, 21:04
Joe Ross's Avatar Unsung FIRST Hero
Joe Ross Joe Ross is offline
Registered User
FRC #0330 (Beachbots)
Team Role: Engineer
 
Join Date: Jun 2001
Rookie Year: 1997
Location: Los Angeles, CA
Posts: 8,565
Joe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond reputeJoe Ross has a reputation beyond repute
Quote:
Originally Posted by Pat Fairbank View Post
Nope -- CD doesn't use SSL/HTTPS. Port 443 on chiefdelphi.com is blocked.

In other words, don't use an important password here.
Reply With Quote
  #12   Spotlight this post!  
Unread 11-04-2014, 21:18
alex.lew alex.lew is offline
college student
FRC #1912 (Team Combustion), FRC #0558 (Elm City Robo Squad)
 
Join Date: Jan 2012
Rookie Year: 2012
Location: New Haven
Posts: 72
alex.lew will become famous soon enoughalex.lew will become famous soon enough
Re: Heartbleed

Quote:
Originally Posted by Joe Ross View Post
In other words, don't use an important password here.
Is there any password that could be more important?
Reply With Quote
Reply


Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT -5. The time now is 03:50.

The Chief Delphi Forums are sponsored by Innovation First International, Inc.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
Copyright © Chief Delphi