• Hey Guest. Check out your NeoGAF Wrapped 2025 results here!

Heartbleed SSL bug serious vulnerability impacting major services, being patched now

Status
Not open for further replies.
Seeing the same thing. Google, Facebook, Dropbox and Netflix are still there though.

Give it a while. These guys have thousands to 10s of thousands of servers in their web farm and they will update them during their maintenance windows as to avoid bringing down their services altogether.
 
if everyone just adopted some form of multi-factor auth...this stuff would be way less a pain in the ass.

not to mention the conflicting information as to whether or not servers have been patched and certs re-issued.
 
Arguing about which password management solution is best is silly. It's more important that people use one rather than get caught up in the details of which is "better".

On the one hand you are right, but the manager should be secure as you are putting a lot of valuable information in one place. Telling people to use Excel for their passwords is not as good as telling them to use Strip.
hyperbol I know
 
Apple says OSX and iOS are unaffected. Now companies are gonna say what needs to be said, not necessarily what's true, so... is it?
 
Apple says OSX and iOS are unaffected. Now companies are gonna say what needs to be said, not necessarily what's true, so... is it?

OS X and iOS don't use OpenSSL for anything major, Apple has their own SSL implementation (which had its own well-known vulnerability a month or so ago). They do ship a version of OpenSSL with OS X but it's deprecated, and it's an older version that isn't vulnerable to this anyway.
 
This is one of the big ones, available since 2012, not know until a couple of days ago, released into the wild with almost no one patched.

http://arstechnica.com/security/201...-may-have-been-exploited-months-before-patch/

Ales Teska, of the mobile security provider SeaCat.mobi, wrote in an email to Ars that his company’s service, while not vulnerable to the Heartbleed exploit, acted as a sort of “honeypot” for attacks based on the exploit because of its use of OpenSSL. “Our OpenSSL-based software was logging Heartbleed attack attempts to its logs by coincidence,” he wrote, starting on March 23. When upgrading the OpenSSL on two test servers, he checked the logs of the servers and found “these two servers are actually logging such an attempt to the log file (as a generic OpenSSL handshake issue).” SeaCat.mobi has detailed the attempted attacks in a blog post.

It seems someone else already knew about this. It's not perfect evidence though, because:

Update: SeaCat and Teska have now qualified their comments: " EFF correctly pointed out that there are other tools, that can produce the same pattern in the SeaCat server log (see http://blog.erratasec.com/2014/04/no-we-werent-scanning-for-hearbleed.html#.U0Xq4OaSz-l ). I don't have any hard data evidence to support or reject this statement. Since there is a risk that our finding is false positive, I have modified this entry to neutral tone, removing any conclusions.

Terrence Koeman of MediaMonks told Ars he found signs of attempts to use the exploit dating back to November 2013.
...
from a network suspected of harboring a number of “bot” servers that were apparently scans for the vulnerability—sending Heartbleed-style requests to two different development servers in requests that were about five minutes apart.
 
On the one hand you are right, but the manager should be secure as you are putting a lot of valuable information in one place. Telling people to use Excel for their passwords is not as good as telling them to use Strip.
hyperbol I know
Nah, that's a good point. Still, the spreadsheet method is more secure than using the same password everywhere. I guess my point was that I think far too many people reuse passwords and that the important bit is to get them away from that.
 
The only thing that keeps me from generating passwords on LastPass is the hassle I could have on every time I'd need to use a mobile app (Steam, Facebook...) and need the password. LastPass has an app, but only for premium users and iOS integration isn't very well done, right? I mean, is there a way to copy the password from the LastPass app into another mobile app?
 
The only thing that keeps me from generating passwords on LastPass is the hassle I could have on every time I'd need to use a mobile app (Steam, Facebook...) and need the password. LastPass has an app, but only for premium users and iOS integration isn't very well done, right? I mean, is there a way to copy the password from the LastPass app into another mobile app?

I don't know about LastPass, but that definitely works with my password manager of choice both on iOS as well as OSX.
 
The only thing that keeps me from generating passwords on LastPass is the hassle I could have on every time I'd need to use a mobile app (Steam, Facebook...) and need the password. LastPass has an app, but only for premium users and iOS integration isn't very well done, right? I mean, is there a way to copy the password from the LastPass app into another mobile app?

Supposedly there's a way to integrate your Lastpass vault into Safari on iOS by doing something where you bookmark a page and then modify it, but it never worked for me so I just gave up on it. It only takes a second to copy your password from the mobile app to your clipboard, plus I'm starting to let iCloud save some of my passwords as well.
 
Supposedly there's a way to integrate your Lastpass vault into Safari on iOS by doing something where you bookmark a page and then modify it, but it never worked for me so I just gave up on it. It only takes a second to copy your password from the mobile app to your clipboard, plus I'm starting to let iCloud save some of my passwords as well.

But you'd have to be a premium user to have the mobile app, right? Not that I don't want to be, just want to be sure of my choices. And can I copy the password to clipboard and then to another mobile app, like Steam?
 
The latest update of the Android app has better integration of filling in passwords on mobile apps without having to copy and paste from the LP app itself. Not sure how it works as I haven't upgraded to premium yet and also not sure if that better integration is available on iOS.
 
The only thing that keeps me from generating passwords on LastPass is the hassle I could have on every time I'd need to use a mobile app (Steam, Facebook...) and need the password. LastPass has an app, but only for premium users and iOS integration isn't very well done, right? I mean, is there a way to copy the password from the LastPass app into another mobile app?

That is a bit of a hassle, but you really only need to do it once per app/site. And even without Premium you can just visit the LastPass site in your mobile browser and copy/paste passwords from there.
 
I haven't been online much in the past few days and now I'm suddenly finding I need to change all of my passwords. In a way this is kind of a good thing though, since I've been really bad about updating some of them in a while.
 
I've ignored this Heartbleed stuff for long enough.

Now, I'll have to change my passwords... Fuck. Well, I mean I only use five passwords and rotate those in between services so I guess it's time I make a unique password for each service?

Fuck everything.

Edit: I'll have to check out this LastPass stuff later today.
 
Stump's sleuthing got me to check out the password security for my own bank BMO.. the result is not pretty.


Horrendous for 2014. I thought that 6 character minimum was okay'ish. Nope. That's the minimum and maximum. The passwords have to be only 6 characters. Fuck.

I've noticed a few banks have this shitty password rule. Its crazy for banks of all places to be this lax.
 
That is a bit of a hassle, but you really only need to do it once per app/site. And even without Premium you can just visit the LastPass site in your mobile browser and copy/paste passwords from there.

Correct, that feature would require a premium membership.

I just made a random test and apparently you don't need to be premium if you access the mobile site. Great then! Thanks for the help, everyone!
 

The comic is not well done.

It would have been more accurate this way:

Server, are you still there? If so, reply with the following 6 characters "POTATO".

...

Server, are you still there? If so, reply with the following 4 characters "BIRD".

...

Server, are you still there? If so, reply with the following 500 characters "HAT".

That's surely nitpicking. But it's way easier to understand it that way.
 
It looks like private keys may not be vulnerable with this attack after all. Definitely a dodged bullet if it's the case, but at this point it seems nobody is willing to take any chance on even the most far-fetched vulnerability.
In general, they are proving hard to get to, but they're not 100% safe. Researchers have proven that FreeBSD will give up its key right away, for example. It depends on a lot of things.

Since there's no way to tell for certain, it's best to regenerate keys and certificates.

The comic is not well done.

…

That's surely nitpicking. But it's way easier to understand it that way.
Uh, okay. I don't see how it's any easier, but if you say so.
 
I've never heard of Lastpass before but I feel like this may be something I want to look into now. Geez the implications of this bug are scary.
 
It makes it more explicit about how the commands regarding the character length are sent. That said, the change doesn't enhance my understanding of it.

To make it more obvious, add to the server:

"Okay, I'm still here. I will send you back the 500 characters, that you just sent me".

The sender only sent "HAT", which is 3 characters. Because of that the remaining 497 characters are from the remaining OpenSSL memory pool. Which may be secret keys. passwords and all sorts of other stuff. The maximum amount of characters to request is 64k (65535) bytes.

Normally the server should have said: "wat, you want 500 characters? But you only sent me 3, so there you go - your 3 characters - I won't send you more than that".
 
The only thing that keeps me from generating passwords on LastPass is the hassle I could have on every time I'd need to use a mobile app (Steam, Facebook...) and need the password. LastPass has an app, but only for premium users and iOS integration isn't very well done, right? I mean, is there a way to copy the password from the LastPass app into another mobile app?
Yes you can copy and paste anywhere.

Premium is very cheap. Only $12 a year. Bargain for what you get.

The app works perfectly fine for me. They upgraded recently and it's pretty nice.
 
As I mentioned earlier in the thread, the level of exploit is only just now beginning to be fully appreciated.

Security experts said the vulnerable code is also found in some widely used email server software, the online browser anonymizing tool Tor and OpenVPN, as well as some online games and software that runs Internet-connected devices such as webcams and mobile phones.

Jeff Forristal, chief technology officer of Bluebox Security, said that version 4.1.1 of Google's Android operating system, known as Jelly Bean, is also vulnerable. Google officials declined comment on his finding.

Other security experts said that they would avoid using any device with the vulnerable software in it, but that it would take a lot of effort for a hacker to extract useful data from a vulnerable Android phone. (Editing by Edwin Chan and Eric Walsh)
 
Ok I store all my passwords on Evernote (I use the desktop app) and log on to chase regularly. On a scale of 1 to 10 how screwed am I?

Lastpass is really secure?

I should also note that I've been watching porn (haven't in a while though).

I knew downloading a few videos would come in handy!
 
So is it ok now to change all my passes? I haven't logged into certain sites recently thanks to this bug.

This vulnerability has been know in some circles for quite a while, it's only now that it comes to light. Nevertheless, the rule of thumb says changing your passwords once in awhile is a good practice.
 
This vulnerability has been know in some circles for quite a while, it's only now that it comes to light. Nevertheless, the rule of thumb says changing your passwords once in awhile is a good practice.

Yeah I use lastpass and have 2 step turned on for every place that offers it. Just curious if most sites have patched the bug so I can change my pw safely. From what I've read it won't matter if I change my pass until the bug is patched.
 
Yeah I use lastpass and have 2 step turned on for every place that offers it. Just curious if most sites have patched the bug so I can change my pw safely. From what I've read it won't matter if I change my pass until the bug is patched.

So there's little point in changing passwords now until this blows over? Are you able to tell if you've been hit with this bug or not? I've been watching my bank account like a hawk....
 
So there's little point in changing passwords now until this blows over? Are you able to tell if you've been hit with this bug or not? I've been watching my bank account like a hawk....

https://lastpass.com/heartbleed/
Unless I'm mistaken sites that aren't patched are still vulnerable so yeah logging in could still compromise your info so don't log on to vulnerable sites and change your passes until they're patched.

On a side note I swear no one else I know besides me follows or cares about this stuff. I send out alerts on fb and twitter about news like this and how to upgrade security and it's like I"m talking to myself :(. Apparently using things like lastpass take too much work even if I can get people to buy in.
 
So there's little point in changing passwords now until this blows over? Are you able to tell if you've been hit with this bug or not? I've been watching my bank account like a hawk....

Well, if whomever you are talking to has yet to actually patch their servers, you checking so often actually heightens the chances someone can steal from you.

Not likely that banks have not already covered their asses though.
 
I read through this thing but I feel like a dunce playing with big words.

This bug only affects sites you are actively on correct? So if I go to a website with this bug but jot down the password on another application will it be able to tell? Or do I have to close the site and thus am no longer affected?

Or once your exposed your infected? This isn't a typical virus as far as I'm aware and is more online orientated.
 
I read through this thing but I feel like a dunce playing with big words.

This bug only affects sites you are actively on correct? So if I go to a website with this bug but jot down the password on another application will it be able to tell? Or do I have to close the site and thus am no longer affected?

Or once your exposed your infected? This isn't a typical virus as far as I'm aware and is more online orientated.

This is not an infection.

This is a structural weakness that allows bad guys to peek at information the site you are talking to currently stores. Usually if you have logged off or have not tried to access the site in an unspecified period of time, there is little/no data to be peeked at.

The thing about changing passwords/keys is that part of the data that can be stolen MAY be password/keys and so your current set MAY not be secure if someone got to them before the site patched their shit.

The best thing to do is to stay away from sites that have yet to patch themselves so that the likelihood of your stuff getting stolen is reduced. Then after they are patched, you should change your password as a security measure.
 
This is not an infection.

This is a structural weakness that allows bad guys to peek at information the site you are talking to currently stores. Usually if you have logged off or have not tried to access the site in an unspecified period of time, their is none of your data to be peeked at.

The thing about changing passwords/keys is that part of the data that can be stolen MAY be password/keys and so your current set MAY not be secure if someone got to them before the site patched their shit.

The best thing to do is to stay away from sites that have yet to patch themselves so that the likelihood of your stuff getting stolen is reduced.

Thanks for the info, looks like I'll limit the sites I'm on until this hopefully goes away.
 
Status
Not open for further replies.
Top Bottom