I don’t think so. Master thread loads SSL certs, childs connect to master thread so I think the key would already be loaded and passed on. Seems like this would squeeze the memory.
You would need to crash a HTTP server and force the restart while capturing for a private key to get dumped. Not 100% sure but don’t see how loading private keys every time there was a child would be the best memory usage.
It isn’t. There was the mass hysteria that it was possible and yes, it was but the only shot it would leak is on a reboot or the quick instant that it is allocated to memory. No company would want to be the one that didn’t change their private keys and be blamed if they were the 0.001% that maybe leaked them.
malloc() dumps recent memory so you aren’t really getting SSL keys even right after a web server reboot or system reboot. The memory heap is used for something else pretty quickly so from a web server, you are getting user sessions and usernames that are passed for the most recent connections in 64k chunks. Some apps may be better at exploiting the SSL keys depending on how they are written tho as there may not be as much memory writing depending on what they are doing. Small app on big server could mean trouble. Can test this pretty simple with a small NodeJS app. Run it with SSL turned on, just output text and see if you can dump the key.
Either way, the bug is pretty cool how it works and dumb programming for sure.
Two factor auth is your friend. May know my Gmail password but still need my phone every login.
I believe our instructions to the application owners was to re-generate AND re-sign. Most people just follow the KB article that we have posted which instructs the user to generate the CSR, so they’re probably doing that even if they don’t realize it.
Yeah we let the server guys make the announcement to the users that were impacted since they were the ones communicating the patch process. We (infosec) spent most of our time identifying machines affected and making sure they were in the patch process.