November 24 2024 20:31:29
News Photos Forum Search Contact History Linkbox Calendar
 
Forum Threads
Newest Threads
The MAGA chronicles
Starship orbital lau...
It's a trap!
AI discussion
Covers that Rock
The Tech billionaire...
Covers that never sh...
Besti ella størsti ...
Good music that peop...
UFO incidents
Linkbox
Newest Links
I Hired A F1 Driver ... (0)
The "Conspiracy" to ... (0)
The Three Night Nort... (1)
Leela vs Stockfish (0)
This is what real gr... (4)
Israel Could Destroy... (0)
How global finance r... (0)
Björn Afzelius - NÃ... (3)
Another reason Rings... (0)
Meet Your Second Wife (1)
Random Photo
vegas067.jpg
vegas067.jpg
Stateside05 by Norlander

Member Poll
Should I watch "The Rings of Power"?

Yes

No

LOL

You must login to vote.
Link
 CategoryLink
Rating
Breaking'Heartbleed': for hundreds of thousands of servers at risk around the world from catastrophic bug
4

Comments
Norlander on April 09 2014 08:37:41
Could one of you who knows about this stuff please elaborate?
Vuzman on April 09 2014 10:04:43
I think that article is really good, and explains the issue quite well. It doesn't go into technical details, but this link (from the article) does.

To summarize, the Heartbeat extension is a keep-alive feature for TLS (the successor to SSL) that minimizes renegotiation of a secure channel. This consists of some communication back and forth between the client and the server, where the client sends some data and then requests it back. The bug means that OpenSSL doesn't check that what you request back has the same length as what you sent; i.e. you can send 1 KB of data and request 64 KB back, and then you'll get 63 KB of data from the server's memory. 64 KB is the limit, but you can request again and again. The extra data you get is straight from memory, and as such you don't know what you're getting, but you can analyze the data and figure out what it is. You might even find sensitive data, even private keys, which in turn can be used to read all communication to/from the site.

This is a code error, which means that exploiting this bug will not raise any red flags by any security measures on the server. The exploiting client request is perfectly valid.

Good Q&A site by the discoverers of the bug: Heartbleed.com

What can/should you do? Do NOT change all your passwords (they might get exposed due to this bug). Avoid using netbanks etc. for a few days. If you need to do something, check the site before you connect using this site or LastPass´ test. There's even a Chrome extension, Chromebleed. These should be safe, and have been recommended by security experts. The site you want to access might also have a news page/blog or similar, that explains that they have updated OpenSSL and are no longer vulnerable. It is safe/recommended that you change your password AFTER confirmation that the site is secure.
Vuzman on April 09 2014 13:49:41
Btw, this might be an opportunity to set up two-factor authentication for important/sensitive sites, like Gmail, Facebook, etc. Two-factor authentication means that in addition to your password, you get a separate code via SMS or an app on your phone. This code changes every minute. If your password gets leaked/hacked, it will be useless without your phone.

The site itself has to support two-factor authentication, here is a list. Some sites use SMS, some use apps, some offer both. I use an app called Authy, as a single app for many services. Usually, when logging in to a site where you have enabled this, you will get an option to trust the computer, and then you won't have to enter the generated code every time you log on from that computer.

Two-factor authentication can be a bit bothersome, but it greatly improves your security.

Another security measure you might want to consider, is using a password manager like LastPass, KeePass or 1Password (or iCloud KeyChain, but that is for Apple platforms only). These can generate unique, complex passwords for every service you use, and remember them for you. You then only have to remember one password. Oh, but don't use your browser's password manager!
Grizlas on April 09 2014 15:47:00
One password to remember all the other passwords! - better not forget that one smiley
Here in the faroes, people are always complaining about SSL..
Norlander on April 09 2014 15:55:04
One password to remember all the other passwords!


One Password to rule them all, One Password to find them,
One Password to bring them all and in the Cloud bind them
In the Land of the NSA where the Shadows lie.
Grizlas on April 11 2014 20:29:14
http://xkcd.com/1354/
Post Comment
Please Login to Post a Comment.
Login
Username

Password



Forgotten your password?
Request a new one here.
Last Seen Users
Grizlas04:24:43
Norlander09:29:40
Torellion17:30:06
Boddin 1 day
Spiff 1 day
OKJones 2 days
Vuzman 3 days
fjallsbak 3 weeks
Laluu14 weeks
Anubis_fo18 weeks
Obituaries
You must login to post a message.

Grizlas
06/11/2024 20:17
Finally.

Norlander
05/11/2024 13:14
tta finally works again

Vuzman
26/08/2024 07:45
Try the google search box

Grizlas
24/08/2024 23:30
doubtful

OKJones
24/08/2024 22:08
does the search function even work?

Grizlas
24/12/2023 15:06
Gleðilig jól

Norlander
24/12/2023 10:09
Gleðilig jól!

Norlander
29/10/2023 19:16
:/

Grizlas
29/10/2023 11:35
RIP Matthew Perry.

Norlander
25/08/2023 19:22
That's not from the chess scene, it's Omar to Wee Bay, 2 mins into this clip: https://www.youtube.com/w
atch?v=LF0Xt6b525E