Hi.

On Mon, Apr 14, 2014 at 04:31:18AM -0400, shawn wilson wrote:
> It might be possible for an openvpn server to initiate a heartbeat sequence 
> with a client. And therefore for a rogue server to exploit this. I don't 
> believe
> this to be the case however and I can't think of any other way of exploiting 
> this.
> 
> If you can get openvpn to use named sockets, you should be able to easily 
> test this with existing scripts.

Those guys did so called 'Reverse Heartbleed attack', i.e. an attack
targeting clients, not the servers:

http://blog.meldium.com/home/2014/4/10/testing-for-reverse-heartbleed

In particular, this part is very interesting:

Is this harder to exploit than Heartbleed?

At a high-level, the exploit code is very similar to the
client-initiated attack, but there are a couple of factors that make
"reverse Heartbleed" a little harder to pull off:

If a client is using certificate pinning, then the window for
exploitation is much smaller, because as soon as the client realizes the
server certificate doesn't match, they'll cut off the TLS connection.
Some clients that support TLS heartbeats will not advertise that support
when negotiating a handshake. In our exploit code, we removed the
OpenSSL checks that determined whether or not heartbeat requests were
allowed based on the negotiated and just sent them anyway.
Server-initiated heartbeat requests can only be sent once the TLS
connection has been established, so they need to be properly encrypted
and MACed. We ended up building our exploit on top of a modified version
of OpenSSL instead of writing one from scratch to keep the code simpler.
Most clients are trying to complete an HTTP request and then close the
channel, so our server uses a few tricks to keep the connection open as
long as possible and maximize the number of heartbeat requests we can
make. We slowly bleed out the HTTP response headers, we stream the HTTP
response body, and we send malformed heartbeat requests interleved
throughout. We've found that vulnerable clients can actually be made to
send hundreds of 16kb chunks of memory back, making it much easier to
explore the client's memory space.

Reco


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140414113542.GA7681@x101h

Reply via email to