Previous Thread
Next Thread
Print Thread
Joined: Feb 2007
Posts: 3,405
I
I_Rogue Offline OP
Hall of Famer
OP Offline
Hall of Famer
I
Joined: Feb 2007
Posts: 3,405
So, I am surprised there hasn't been a post on this yet, but this is truly a huge deal right now.

web page


Enterprise More: Security Heartbleed Computer Security Encryption
Here's How To Protect Yourself From The Massive Security Flaw That's Taken Over The Internet
Kyle Russell

It's been a while since there was a computer security bug we all had to worry about.

Unfortunately, it seems like we may all have been facing one for two years and not even realized it.

Yesterday, security researchers announced a security flaw in OpenSSL, a popular data encryption standard, that gives hackers who know about it the ability to extract massive amounts of data from the services that we use every day and assume are mostly secure.

This isn't simply a bug in some app that can quickly be updated. The vulnerability is in the machines that power services that transmit secure information, such as Facebook and Gmail.

We've put together the following guide to the so-called Heartbleed bug for those who want to understand what all the fuss is about, and how they can protect themselves.

What is the Heartbleed bug?

Heartbleed is a flaw in OpenSSL, the open-source encryption standard used by the majority of websites that need to transmit the data that users want to keep secure. It basically gives you a secure line when you're sending an email or chatting on IM.

Encryption works by making it so that data being sent looks like nonsense to anyone but the intended recipient.

Occasionally, one computer might want to check that there's still a computer at the end of its secure connection, and it will send out what's known as a heartbeat, a small packet of data that asks for a response.

Because of a programming error in the implementation of OpenSSL, the researchers found that it was possible to send a well-disguised packet of data that looked like one of these heartbeats to trick the computer at the other end into sending data stored in its memory.

The flaw was first reported to the team behind OpenSSL by Google security researcher Neel Mehta, and independently found by security firm Codenomicon. According to the researchers who discovered the flaw, the code has been in OpenSSL for about two years, and using it doesn't leave a trace.

How bad is that?

It's really bad. Web servers can keep a lot of information in their active memory, including usernames, passwords, and even the content that users have uploaded to a service. According to Vox.com's Timothy Lee, even credit-card numbers could be pulled out of the data sitting in memory on the servers that power some services.

But worse than that, the flaw has made it possible for hackers to steal encryption keys — the codes used to turn gibberish-encrypted data into readable information.

With encryption keys, hackers can intercept encrypted data moving to and from a site's servers and read it without establishing a secure connection. This means that unless the companies running vulnerable servers change their keys, even future traffic will be susceptible.

Am I affected?

Probably, though again, this isn't simply an issue on your personal computer or your phone — it's in the software that powers the services you use. Security firm Codenomicon reports:

You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet. Your popular social site, your company's site, commercial site, hobby site, sites you install software from or even sites run by your government might be using vulnerable OpenSSL.

According to a recent Netcraft web server survey that looked at nearly 959,000,000 websites, 66% of sites are powered by technology built around SSL, and that doesn't include email services, chat services, and a wide variety of apps available on every platform.

So what can I do to protect myself?

Since the vulnerability has been in OpenSSL for about two years and using it leaves no trace, assume that your accounts may be compromised. You should change your online passwords, especially for services where privacy and security are major concerns. However, many sites likely haven't upgraded to software without the bug, so immediately changing them still might not help.

The researchers who discovered the flaw let the developers behind OpenSSL know several days before announcing the vulnerability, so it was fixed before word got out yesterday. Most major service providers should already be updating their sites, so the bug will be less prevalent over coming weeks.

Read more: http://www.businessinsider.com/heartbleed-bug-explainer-2014-4#ixzz2ybSSnsC3

--------------------------------------------------------------

This is a really huge deal. Here is a way to check websites you use to help know if they are safe. One thing to know. Don't change your passwords on sites that were/ are vulnerable until you know they actually fixed the thing. Otherwise, you are just you-know-what-ing into the wind.

LastPass

Last edited by I_Rogue; 04/11/14 02:27 PM.

"My signature line goes here."
Joined: Sep 2006
Posts: 50,545
Legend
Online
Legend
Joined: Sep 2006
Posts: 50,545
I was just plugging in some sites I use on a fairly regular basis ...... my bank and such ... and none of them are vulnerable ..... but I threw EBay in there on a lark, and it says that it may be vulnerable.

CreditKarma was vulnerable, but is safe as of 4/8/14. I do use that site. I should probably change my password.

They cannot tell if Quizzle is OK or not.

Looks like my credit card and bank sites are ok.

My mortgage site is now safe, but may have been vulnerable. I'll have to change my password there too.

Thanks for posting this. I did have a couple of potential vulnerabilities.

I just got an email from Motley Fool as I was typing, so they were vulnerable.

Last edited by YTownBrownsFan; 04/11/14 02:46 PM.

Micah 6:8; He has shown you, O mortal, what is good. And what does the Lord require of you? To act justly and to love mercy, and to walk humbly with your God.

John 14:19 Jesus said: Because I live, you also will live.
Joined: Mar 2013
Posts: 12,635
D
Legend
Offline
Legend
D
Joined: Mar 2013
Posts: 12,635
Well...

Cheers for the heads up. My banking site is okay and the others I visit it is unable to determine. Just had to change my CreditKarma password which for that free service, I don't mind at all...

*EDIT*

Looks like us GMAIL users should update our password(s):

WARNING: mail.google.com was confirmed as vulnerable either publicly via statement or on 4/8/2014


Last edited by Dawg_LB; 04/11/14 02:53 PM.
Joined: Sep 2006
Posts: 2,089
C
Dawg Talker
Offline
Dawg Talker
C
Joined: Sep 2006
Posts: 2,089
Big deal in Canada right now. They found that the Canada Revenue Agency was affected and its tax season. They've shut down all online filings as well as several other government sites.

Joined: Feb 2007
Posts: 3,405
I
I_Rogue Offline OP
Hall of Famer
OP Offline
Hall of Famer
I
Joined: Feb 2007
Posts: 3,405
Here is a list of known sites that are/ were vulnerable :

web page


(Dawgtalkers is safe )


"My signature line goes here."
Joined: Feb 2008
Posts: 6,370
A
Hall of Famer
Offline
Hall of Famer
A
Joined: Feb 2008
Posts: 6,370
Quote:

(Dawgtalkers is safe )




Well, PPE does a good job.

Joined: Sep 2006
Posts: 17,438
E
Legend
Offline
Legend
E
Joined: Sep 2006
Posts: 17,438
If a web application isn't using OpenSSL would this affect anything else on the server?

Joined: Sep 2006
Posts: 17,438
E
Legend
Offline
Legend
E
Joined: Sep 2006
Posts: 17,438
Nevermind I found the information I need. What a pain in the butt.

Joined: Mar 2013
Posts: 12,635
D
Legend
Offline
Legend
D
Joined: Mar 2013
Posts: 12,635
It's also effecting "mobile" apps too.

http://money.cnn.com/2014/04/11/technology/security/heartbleed-gear/index.html

Quote:

...

That means for two years now, someone could have been able to tap your phone calls and voicemails at work, all your emails and entire sessions at your computer or iPhone. You also could have been compromised if you logged into work from home remotely. And you'll probably never know if you were hacked.

...




I am glad I don't own a smart phone, this is pretty insane. Bad enough Big Brother is recording our every move and word...

DawgTalkers.net Forums DawgTalk Everything Else... 'Heartbleed' Internet Security flaw - It IS a big deal.

Link Copied to Clipboard
Powered by UBB.threads™ PHP Forum Software 7.7.5