If anyone wants to run the PoC against their own boxes or... other boxes:
https://gist.github.com/takeshixx/10107280
Also VUPEN.
https://gist.github.com/takeshixx/10107280
Also VUPEN.
There are also things wrong with the protocol, but it does move forward to mitigate those issues. This is why we have several versions of the protocol.OP title bothers me. This isn't SSL failing over and over again. Apple's bug was an implementation issue. The HeartBleed bug is an implementation issue. This is not an attack on SSL itself. 'SSL keeps on failing' implies there's something wrong with the protocol and shouldn't be trusted, which is foolish.
Enable 2-step authentication.
Yikes. If anyone in this thread uses Lastpass, I'd suggest Keepass instead since a locally stored database can't be affected by something like this.
If you have 2-step verification enabled with Lastpass, you should be okay.
This bug has been around for two years. So potentially all data stored in a server's memory in the past two years has been exposed, if they're running openssl. Realistically, just change your passwords once everybody updates their openssl versions.Crap...I am literally logged into eBay right now.
So I'm screwed, right? :x
Is the Sony Entertainment Network site affected?
I won't have to change all my saved passwords, will I?
LastPass said:However, LastPass is unique in that your data is also encrypted with a key that LastPass servers dont have access to. Your sensitive data is never transmitted over SSL unencrypted - its already encrypted when it is transmitted, with a key LastPass never receives. While this bug is still very serious, it could not expose LastPass customers encrypted data due to our extra layers of protection.
I will do that eventually, if your Lastpass data was accessable...
LastPass data is only ever encrypted and decrypted locally on your PC, never on their servers. Only an encrypted data blob is stored on the servers, and nothing that could decrypt the data is ever sent there. So as long as you have a strong master password (meaning it doesn't really matter all that much if someone did manage to steal a copy of your synced data) it should be fine, right?
Neogaf too? (!)
That's what I assumed about keepass. Maybe I need a stronger password. Yeah, someone can get the file. But then again, it's for all the other passwords.LastPass data is only ever encrypted and decrypted locally on your PC, never on their servers. Only an encrypted data blob is stored on the servers, and nothing that could decrypt the data is ever sent there. So as long as you have a strong master password (meaning it doesn't really matter all that much if someone did manage to steal a copy of your synced data) it should be fine, right?
EDIT: Yeah:
http://blog.lastpass.com/2014/04/lastpass-and-heartbleed-bug.html
And I do trust these guys, they've never given anyone a reason not to.
You can store it in any cloud service or on a memory stick.
How does that work if you work from multiple computers? Is there an allowance for that?
I'm looking at a screenshot of Mnemosyne and I'm sorta curioushow do you keep tabs on sites that have different password requirements?What I do is use an app like Mmemosyne where I re-generate my pass for a site/service on the fly whenever I need it. Have Mnemosyne on all my computers + my phone.
It is a slightly slower process? Yup. But I'm storing my passwords NOWHERE, online or off.
I'd suggest logging out or removing any accounts that automatically log in to these affected sites from on your phone as well. Had to manually remove my Yahoo account just in case.
That one is probably already toast anyway. Can't remember if I have 2-step setup on it or not.
Two-factor isn't enough. (It's at best a mitigation… but if you just logged in, and someone got your session key, welp.)
https://twitter.com/blubbfiction/status/453513110348107776
LastPass data is only ever encrypted and decrypted locally on your PC, never on their servers. Only an encrypted data blob is stored on the servers, and nothing that could decrypt the data is ever sent there. So as long as you have a strong master password (meaning it doesn't really matter all that much if someone did manage to steal a copy of your synced data) it should be fine, right?
EDIT: Yeah:
http://blog.lastpass.com/2014/04/lastpass-and-heartbleed-bug.html
And I do trust these guys, they've never given anyone a reason not to.
Frankly, I trust LastPass to keep my data secure over whatever cloud service I'm opting to use. Although, this SSL certificate issue is worrying, it would effect Dropbox, AmazonS3, Bitbucket, Github, and anything else.
Not to be all "I told you so", but I never thought things like LastPass were a good idea.
What I do is use an app like Mmemosyne where I re-generate my pass for a site/service on the fly whenever I need it. Have Mnemosyne on all my computers + my phone.
It is a slightly slower process? Yup. But I'm storing my passwords NOWHERE, online or off.
I believe the claim is true. Very plausible.Well if what he's claiming is true, not even shidoshi's suggestion above would necessarily be safe then if you're between logins.
Neogaf too? (!)
I believe the claim is true. Very plausible.
The only safe option at this point is to have never logged in to a given service since the bug went public.
Other than that, you just have to hope your service provider gets their act together, changes out their certs post-haste, and has a safe path for changing your password afterward (re-requiring 2FA, verifying with email, something.)
So what does this mean? All logins are just boned? If you change now they just steal the data right? Do apps like yahoo mail or gmail use SSL also?
Should I attempt to sign out of all apps or just wait? This is fucking absurd.Everything is unsafe right now. Even smartphone apps. Just wait until there is a official statement about the fix.
One thing I don't understand is: if I change a password now (for a site that's vulnerable), it's sent via SSL? So it could be read from the server's memory?
The other thing is: Isn't the text encrypted?
So what does this mean? All logins are just boned? If you change now they just steal the data right? Do apps like yahoo mail or gmail use SSL also?
Almost everyone who uses Keypass is going to be using a file sharing service to keep their passwords synchronised between their devices. That file sharing service is going to be just as vulnerable as LastPass was.Yikes. If anyone in this thread uses Lastpass, I'd suggest Keepass instead since a locally stored database can't be affected by something like this.
No. To actually exploit this beyond a handful of targeted users would require a lot of work.Oh fuck. I logged in a few hours ago but I have my pw saved on my comp/browser. My wife also paid for something with PayPal like an hour ago. Am I fucked?
Everything is unsafe right now.
Yeah which is my main email. Should I log out of the app or just leave it for now? Is Facebook and such affected?Google stuff is fine from what I read, same with Microsoft. Yahoo is the big one that is vulnerable.
Yeah which is my main email. Should I log out of the app or just leave it for now? Is Facebook and such affected?
Encrypted with the server's public key which is decrypted using its secret key.. and if the secret key is exposed~~
Guys, shouldn't we create a list or update the OP with services that we know are vulnerable for people who don't know about it yet?
Almost everyone who uses Keypass is going to be using a file sharing service to keep their passwords synchronised between their devices. That file sharing service is going to be just as vulnerable as LastPass was.
This is what I have found so far:
okcupid.com
www.gog.com (according to one tool)
nowtv.com (it says its fine now)
www.netflix.com (according to one tool)
jobisjob.com
linkedin.co.uk
LastPass also requires a key that isn't stored on LastPass servers.My Keepass database requires a key file that isn't stored on Dropbox. Even if you get into my Dropbox account AND had my database password, you're still not getting in. Keepass is as secure as you want to make it.
We also know about Steam, Yahoo services, EA services and Sony services.
My Keepass database requires a key file that isn't stored on Dropbox. Even if you get into my Dropbox account AND had my database password, you're still not getting in. Keepass is as secure as you want to make it.
They're not paying me, I swear. I just think it's a great program that has saved me from a lot of security headaches.
yes I've read that later, but how was the private key exposed? Is it stored in the memory?