What is the process name of that daemon in CPVM? I remember that we only
have SSH and HTTPS port open in console proxy, and the later one is
running Java based SSL engine.

Kelven

On 4/9/14, 1:38 PM, "John Kinsella" <j...@stratosec.co> wrote:

>CPVM runs a monit daemon which is at least linked to libssl. I haven¹t
>taken more than peek at that yet - I think SSL is configured off by
>default butŠyeah sorry will have to look at that closer.
>
>Regarding the trusted IPs - I only attempted to test one SSVM from
>http://filippo.io/Heartbleed/ and it was a) publicly accessible and b)
>vulnerable, so trust didn¹t really enter into the equation.
>
>I already adjusted the blog post re: VR and earlier versions of ACS.
>
>John
>
>On Apr 9, 2014, at 12:15 PM, Animesh Chaturvedi
><animesh.chaturv...@citrix.com<mailto:animesh.chaturv...@citrix.com>>
>wrote:
>
>Courtesy Chiradeep
>
>
>- CPVM uses JSSE so that should not be affected
>- VR is not affected since it does not offer any HTTPS/TLS service. The
>RA VPN and S2S VPN use the OpenSSL lib only for crypto and not for any
>transport
>- The only vulnerable service is the volume upload service and template
>copy. The latter is between 2 trusted IPs
>- Also this should only affect SSVM template from 4.2 onwards as only
>wheezy is affected
>
>Thanks
>Animesh
>-----Original Message-----
>From: John Kinsella [mailto:j...@stratosec.co]
>Sent: Wednesday, April 09, 2014 11:07 AM
>To: dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>
>Subject: Re: OpenSSL vunerability (bleedheart)
>
>I want to address a few things here directly (I think these are covered
>in the
>blog post, if not ping me)
>
>* Current SSVM from 4.3 is not good enough.
>* Yes, each SystemVM runs software that needs OpenSSL. For the curious,
>see "lsof|grep -i ssl"
>* I'm not sure if the current SystemVM template on Jenkins is secure,
>we're
>testing that currently and will update once confirmed.
>* Assume if you see us releasing a blog post about a security issue,
>there's a
>security issue (QED HTH HAND)
>* Realhostip uses SSL, but not on the SystemVMs. If you're using
>realhostIP,
>it doesn't matter what version of OSSL you use, you're still insecure.
>Horse:
>beaten.
>* Chiradeep's correct, 4.1 and older are not vulnerable. Post updated
>again.
>
>I think that covers the questions...running around doing a few things but
>this
>is very high on our priority list.
>
>(snarky comments are meant to be funny not insulting/condescending)
>
>On Apr 9, 2014, at 10:19 AM, John Kinsella
><j...@stratosec.co<mailto:j...@stratosec.co><mailto:j...@stratosec.co>>
>wrote:
>
>To my knowledge, no code change is necessary just a rebuild.  - j
>
>Please excuse typos - sent from mobile device.
>
>----- Reply message -----
>From: "Rayees Namathponnan"
><rayees.namathpon...@citrix.com<mailto:rayees.namathpon...@citrix.com><mai
>lto:rayees.namathpon...@citrix.co
>m>>
>To: 
>"dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org><mailto:dev@cl
>oudstack.apache.org>"
><dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org><mailto:dev@cl
>oudstack.apache.org>>
>Subject: OpenSSL vunerability (bleedheart)
>Date: Wed, Apr 9, 2014 10:13 AM
>
>Even if we get latest systemvm template from
>http://jenkins.buildacloud.org/view/4.3/job/cloudstack-4.3-systemvm/ . ,
>it
>has openssl 1.0.1e-2+deb7u4 ?
>
>Is there any code change required to create system template with openssl
>1.0.1e-2+deb7u6  ?
>
>Regards,
>Rayees
>
>-----Original Message-----
>From: Harikrishna Patnala [mailto:harikrishna.patn...@citrix.com]
>Sent: Wednesday, April 09, 2014 5:15 AM
>To: 
><dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org><mailto:dev@cl
>oudstack.apache.org>>
>Subject: Re: OpenSSL vunerability (bleedheart)
>
>Latest System VMs have openssl 1.0.1e-2+deb7u4. We need to update
>openssl to get 1.0.1e-2+deb7u6.
>
>It will be great if some one can update openssl to 1.0.1e-2+deb7u6 and
>test
>OpenSSL HeartBleed Vulnerability. Right now I could not do it from our
>network.
>
>-Harikrishna
>
>On 09-Apr-2014, at 5:00 pm, Nux!
><n...@li.nux.ro<mailto:n...@li.nux.ro><mailto:n...@li.nux.ro>>
>wrote:
>
>On 09.04.2014 12:04, Abhinandan Prateek wrote:
>Latest jenkins build template have openSSL version 1.0.1e, the version
>that is
>compromised.
>
>Guys, do not panic.
>It is my understanding that in Debian, just like in RHEL, major versions
>will
>not change, i.e. Debian GNU/Linux 7.0 will EOL with openssl 1.0.1e, but
>they
>will backport stuff.
>
>After I did an "apt-get update && apt-get install openssl" I got package
>version 1.0.1e-2+deb7u6 (dpkg -l|grep openssl) and this package is ok
>according to the changelog:
>
>"aptitude changelog openssl" says:
>
>openssl (1.0.1e-2+deb7u6) wheezy-security; urgency=high
>
>* Non-maintainer upload by the Security Team.
>* Enable checking for services that may need to be restarted
>* Update list of services to possibly restart
>
>-- Salvatore Bonaccorso
><car...@debian.org<mailto:car...@debian.org><mailto:car...@debian.org>>
>Tue, 08 Apr 2014 10:44:53
>+0200
>
>openssl (1.0.1e-2+deb7u5) wheezy-security; urgency=high
>
>* Non-maintainer upload by the Security Team.
>* Add CVE-2014-0160.patch patch.
> CVE-2014-0160: Fix TLS/DTLS hearbeat information disclosure.
> A missing bounds check in the handling of the TLS heartbeat extension
> can be used to reveal up to 64k of memory to a connected client or
> server.
>
>-- Salvatore Bonaccorso
><car...@debian.org<mailto:car...@debian.org><mailto:car...@debian.org>>
>Mon, 07 Apr 2014 22:26:55
>+0200
>
>In conclusion, if System VMs have openssl 1.0.1e-2+deb7u5 or higher, then
>they are OK. Can anyone confirm they have 1.0.1e-2+deb7u5+ ?
>
>Lucian
>
>--
>Sent from the Delta quadrant using Borg technology!
>
>Nux!
>www.nux.ro<http://www.nux.ro><http://www.nux.ro>
>
>
>Stratosec<http://stratosec.co/> - Compliance as a Service
>o: 415.315.9385
>@johnlkinsella<http://twitter.com/johnlkinsella>
>
>
>Stratosec<http://stratosec.co/> - Compliance as a Service
>o: 415.315.9385
>@johnlkinsella<http://twitter.com/johnlkinsella>
>

Reply via email to