Heartbleed Openssl Bug

Should I be concerned based on our proximity? :stuck_out_tongue:

I want to figure out how people were getting a complete private key back out…if they just keep a SSL/TLS session open or just keep creating new ones.

its all good player

It is in progress

Sooooooooo now what?

This?
[ATTACH=CONFIG]32238[/ATTACH]

more like this

Short 50,000ft overview:

Websites use SSL to encrypt connections. This relies on a secure key that the site uses to generate certificate that tells people, yes, this is the site you are looking for so you know going to your banks website, you are actually at your banks website and not someone trying to fake it.

Someone found a way to use this protocol and not only see what you are passing through it and decrypt usernames and passwords, but also dump that private key so essentially, could sign certificates and make their own websites that appear to be legit.

Wth. So how can one prevent this? How do I stop some middle aged man in a shirt and time sitting in a outdoor cafe from stealing my money?

Completely separate issue

The issue here is the code that was written to handle SSL had bug that let attackers read a bunch of random memory off the vulnerable servers…It will be end up being patched on all major sites in the next few days.

Most of the US government is still on XP. The client we consult for just upgraded to Win 7 per EOL for XP. So many Government applications incompatible on Windows 7 it’s NOT even funny. …yeah it is

Update about Yahoo:

April 2nd post about yahoo efforts of encryption - http://yahoo.tumblr.com/

Latest update provided by yahoo:

Update: Yahoo has sent us a new statement. “Our team has successfully made the appropriate corrections across the main Yahoo properties (Yahoo Homepage, Yahoo Search, Yahoo Mail, Yahoo Finance, Yahoo Sports, Yahoo Food, Yahoo Tech, Flickr and Tumblr) and we are working to implement the fix across the rest of our sites right now.”

It’s cool Yahoo took that long I wonder how many passwords were lost

Yahoo accounts are compromised in droves pretty much all day every day anyway lol

Yeah, it’s pretty ridiculous that it took them so long to address this.

I see it’s finally hitting mainstream media today…

http://www.cnn.com/2014/04/08/tech/web/heartbleed-openssl/index.html?hpt=hp_t2

Which was worse, letting this bug linger or serving up malware via ads?

This bug is worse

Tons of people use the same creds for paypal as their yahoo email addresses

yeah no kidding. I’m not sure what distro they’re running, but surely they’re doing centralized package/patch and configuration management. That should make it pretty easy to push the patch and restart their web servers.

They’re both bad

You now know too much! LOL I think I need to change all my passwords and get off PFsense. :stuck_out_tongue:

Probably should change my Yahoo Password… yet again…

Damn them for owning Flickr

Yahoo, Google, Microsoft, Amazon, etc were all affected.

Microsofts stuff doesn’t even use OpenSSL unless its was some obscure MS site.

Microsofts Azure doesn’t use OpenSSL and the people who found the bug work for Google :lol:

Yahoo dropped the ball hard on this one

Companies that haven’t made improvements for some time are not as affected as companies who continue to update their encryption. This is why many of the larger tech companies are affected