Hi All, 

The Heartbleed Bug is just that is it a coding failure in the implementation of 
the OpenSSL lib that ships with most if not all Linux OS's. Any software that 
says it can "remove" the bug is a little on the bogus side as well you need the 
OpenSSL lib for both Client access and Server access, meaning it is needed on 
both the client for it to start the openSSL session and the Server for it to 
know what to do with the SSL certificates. OK so what exactly is the risk.

Well: 

OpenSSL has a biult in heatbeat command so the client says to the server "Dude 
you still there say Potato (6 letters)" the server responds with potato all 
fine and dandy however if the user now evil says "Dude you still there? Say hat 
(500 letters)" the server will respond with hat and then 470 letters from RAM 
if you are a luck sod that may include a username and password that was securly 
shipped to the server using an SSL session. 

see: 
http://www.centosblog.com/xkcd-explanation-openssl-heartbleed-vulnerability/

So what is our risk profile? 

I would say that it is limited.
1) We do not know how many times this has ben exploited 
2) We do not know how many username password combo's were got via this means 

The risk is quite low, you would have to be very lucky to grab a decent amount 
of passwords (not saying it is impossible) but there you go. I would, and 
indeed my recomendation to my users here at work, recommend changing your 
online passwords. 

Ironically for once Microsoft is not at risk of this as they do not use an 
implementation on OpenSSL 
----- Original Message -----
From: Brian Smith
Sent: 04/30/14 05:11 PM
To: Peterborough LUG - No commercial posts
Subject: Re: [Peterboro] Hi eveyone

1. I read that the exploitation was discovered/created/exploited by a benign 
hacker. i.e. Someone who did it to draw attention and not to use it. 

2. I also read that it was a real vulnerability and that, although banks, etc., 
would patch pretty quickly, there was a slim chance someone could have got your 
credentials. The advice was to change all passwords immediately and then change 
them again after a couple of weeks just in case. 

3. Lastly, I logged into First Direct Bank and they are displaying a notice 
which says, "Don't worry. There's no risk. You're safe".

So take your pick.

Brian 

Sent from my iPhone
On 29 Apr 2014, at 18:23, gary smith < gazwebdes...@msn.com > wrote:

I have just been reading a about the Heart Bleed Bug s and the report say's 
open source programs can be vulnerable and that Some operating system 
distributions that have shipped with potentially vulnerable OpenSSL version:
    * Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4
    * Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11
    * CentOS 6.5, OpenSSL 1.0.1e-15
    * Fedora 18, OpenSSL 1.0.1e-4
    * OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 
2012)
    * FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013
    * NetBSD 5.0.2 (OpenSSL 1.0.1e)
    * OpenSUSE 12.2 (OpenSSL 1.0.1c).
I have also seen adverts saying Heart bleed Bug removal software available.
Has anyone had any dealings with this problem or is it scare mongering.
Gary Smith
_______________________________________________
Peterboro mailing list
 Peterboro@mailman.lug.org.uk 
https://mailman.lug.org.uk/mailman/listinfo/peterboro
_______________________________________________
Peterboro mailing list
Peterboro@mailman.lug.org.uk
https://mailman.lug.org.uk/mailman/listinfo/peterboro

Reply via email to