Heartbleed: Serious OpenSSL zero day vulnerability revealed

Discussion in 'privacy technology' started by ronjor, Apr 7, 2014.

  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  2. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  3. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Just FYI, I have a little good news.
    https://forums.openvpn.net/topic15526.html
     
  4. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
  5. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  6. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  7. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  8. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  9. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,618
    Last edited by a moderator: Apr 10, 2014
  10. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    How about deleting ALL Certs & Server etc info in your browsers, & then when prompted as you visit Any HTTPS www, install as required ?
     
  11. iammike

    iammike Registered Member

    Joined:
    Jun 13, 2012
    Posts:
    345
    Location:
    SE Asia
    Does anyone know of a reliable way to test a site if it is affected or not

    I got a warning from someone about that -hxxp://filippo.io/Heartbleed/- site

    No point in checking the Certificates as most of them (my Banks) are still from 2013 or before

    Thanks
     
    Last edited: Apr 10, 2014
  12. iammike

    iammike Registered Member

    Joined:
    Jun 13, 2012
    Posts:
    345
    Location:
    SE Asia
    If the site that you visit already has patched OpenSSL and got a new certificate it's a good idea. But if they either patched or only got new certificates it is useless.
     
  13. chachazz

    chachazz Updates Team

    Joined:
    Apr 23, 2004
    Posts:
    841
    Mozilla Security Blog
    Sid Stamm - April 8, 2014

    "Two Mozilla systems were affected by Heartbleed. Most Persona and Firefox Account (FxA) servers run in Amazon Web Services (AWS), and their encrypted TLS connections are terminated on AWS Elastic Load Balancers (ELBs) using OpenSSL. Until April 8, when Amazon resolved the bug in AWS, those ELBs used a version of OpenSSL vulnerable to the Heartbleed attack"

    ..continue reading.

    Concerning Sync ..."Neither the account server nor a potential attacker could have learned the password or the encryption key that protects Sync data."
     
  14. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,872
    Location:
    Outer space
    Indeed, it's a real mess :(
    I don't know except for the Members now online on the main forum page.
     
  15. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,546
    Location:
    Triassic
    In reference to post #54, this caught my attention ...
    Cable boxes and home Internet routers are just two of the major classes of devices likely to be affected, says Lieberman. “ISPs now have millions of these devices with this bug in them”

    This is going to be interesting. ISPs are notorious for not upgrading field equipment even when it has been determined EOL for years.
     
  16. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  17. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  18. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    Heartbleed Bug: How to Check if a Website is Vulnerable

    Luckily there are some resources to hand to help you find out which websites are affected and which have taken steps to remedy the situation if they have been affected.

    The first thing you can do is to plug the website's URL into one of the many Heartbleed checkers set up in the wake of the security flaw being released. Here are three:



    If you find the website you are checking is vulnerable, then you should wait before changing your password, as doing so now won't protect it from those sneaky cybercriminals.

    While these online checkers will tell you if a site is or isn't vulnerable, they won't tell you what the website has done to correct the problem.

    http://www.ibtimes.co.uk/heartbleed-bug-how-check-if-website-vulnerable-1444236

    (Can someone please tell me why my text is so large and how to fix it please.) - LowWaterMark: The rich text editor hides formatting from you. If you ever find a post acting funny, disable the rich-text editing and then go into it with the plain editor. You'll see right away what's worng.
     
    Last edited by a moderator: Apr 10, 2014
  19. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    Hackers scanning Web for ‘Heartbleed’ bug
    10 April 2014

    "
    Hacking groups have been detected running automated scans of the Internet in search of Web servers vulnerable to the ‘Heartbleed’ bug.

    Kurt Baumgartner, a researcher with security software maker Kaspersky Lab, said his firm uncovered evidence on Monday that a few hacking groups believed to be involved in state-sponsored cyber espionage were running such scans shortly after news of the bug first surfaced the same day.

    By Tuesday, Kaspersky had identified such scans coming from "tens" of actors, and the number increased on yesterday after security software company Rapid7 released a free tool for conducting such scans.

    "The problem is insidious," Baumgartner said. "Now it is amateur hour. Everybody is doing it."

    http://eandt.theiet.org/news/2014/apr/heartbleed-scans.cfm
     
  20. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    24,067
    Location:
    UK
    You can alter the text size by highlighting the text and choosing a different font size from the 4th button from left in the post window.
     
  21. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,872
    Location:
    Outer space
    Nice finds :)
    In the link supplied by Mr. Brian a few sites are specified as Not Affected, but if you read the quote, some don't deny vulnerability and/or imply that they may have been vulnerable if you read between the lines.
     
    Last edited by a moderator: Apr 10, 2014
  22. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  23. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Clear the rich text formatting by using the Remove Formatting icon.
     
  24. SirDrexl

    SirDrexl Registered Member

    Joined:
    Apr 14, 2012
    Posts:
    556
    Location:
    USA
    For those using KeePass, I recommend adding "last modification time" to your columns so you can sort by that and keep track of which sites for which you've changed the passwords.
     
  25. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,849
    Location:
    Texas
    http://www.smh.com.au/it-pro/securi...-inserted-it-deliberately-20140410-zqta1.html
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.