V.T. Eric Layton Posted April 17, 2014 Share Posted April 17, 2014 Heartbleed is giving Internet security a nosebleed. Quote Link to comment Share on other sites More sharing options...
ross549 Posted April 17, 2014 Share Posted April 17, 2014 I have not had any of the web sites I frequent contact me suggesting I change my password. I've gotten two so far. One from an online store, and the other from an app developer. I'd think I would get more. Adam Quote Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted April 17, 2014 Share Posted April 17, 2014 The only one I got was from Tumblr. Quote Link to comment Share on other sites More sharing options...
sunrat Posted April 18, 2014 Author Share Posted April 18, 2014 Looks like a few more people are scrutinising the code now. Another new security update for OpenSSL in Debian today - http://forums.scotsnewsletter.com/index.php?showtopic=22937&st=700#entry394878 Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted April 18, 2014 Share Posted April 18, 2014 Excellent! Quote Link to comment Share on other sites More sharing options...
ross549 Posted April 18, 2014 Share Posted April 18, 2014 I heard something somewhere that one of the BSDs was going to tear the code down and sift through the code with a fine tooth comb. I can't look it up here in class, since our internet access is heaviliy filtered. Quote Link to comment Share on other sites More sharing options...
zlim Posted April 18, 2014 Share Posted April 18, 2014 I've only received one so far from fastmail.fm an email account. Quote Link to comment Share on other sites More sharing options...
crp Posted April 18, 2014 Share Posted April 18, 2014 Seems to me that the initial 'rush of panic' has been overtaken by admins realizing that wait-a-sec , that version range of OpenSSL is not in operation or that the firewall is taking care of protecting the site. If you look at what it took for the Moscow group to break into the CloudFlare server to get the keys , one finds the CloudFlare firewall was not setup to detect repeated knocking and that it took the Moscow over 9 hours with optimal setups for getting the keys. So, not that the code goof isn't/wasn't a problem, just the real world facts are such that a lot less people were effected. btw: i keep reading that a Heartbleed siphoning can not be detected, it seems to me the logs can be checked to see if there dozens of attempts to connect to within a minute. Why a firewall setup would allow for that to begin with is another question Quote Link to comment Share on other sites More sharing options...
ross549 Posted April 18, 2014 Share Posted April 18, 2014 Good point. I think it was meant to be said that the server would not have any logs of the "intrusion" but mentioned nothing about firewalls. The attacker would need to send malformed UDP packets to the server. As far as I know, TLS over UDP is not something that is widely used, so the firewall could be easily set to block UDP TLS packets. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.