Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-17 Thread Stephane Bortzmeyer
On Wed, Apr 16, 2014 at 09:22:31PM +0200, Reindl Harald wrote a message of 82 lines which said: > frankly outside a public hotspot / untrusted network nobody but the > NSA and otehr agencies are able to really to MITM As explained by Tim, this is false. He forgot to mention another attack vec

Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread Reindl Harald
Am 17.04.2014 01:06, schrieb Tim: >> and the others need a MITM attack which is not *that* easy >> as connect to a server and send a heartbleed-packet without >> anything in the logs of the attacked server > > I agree with you here. It seems that Lucky13 requires much more > access and is much

Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread Tim
> and the others need a MITM attack which is not *that* easy > as connect to a server and send a heartbleed-packet without > anything in the logs of the attacked server I agree with you here. It seems that Lucky13 requires much more access and is much harder to pull off in practice. Unless ther

Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread Paul McMillan
Also remember to actually try the exploit, even if you think your 0.9.8 installation isn't vulnerable. We found several devices which were running a safe version in the audit paperwork, but actually running a vulnerable version in practice. -Paul On Wed, Apr 16, 2014 at 6:03 PM, Ron Bowes wrote:

Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread Reindl Harald
and the others need a MITM attack which is not *that* easy as connect to a server and send a heartbleed-packet without anything in the logs of the attacked server frankly outside a public hotspot / untrusted network nobody but the NSA and otehr agencies are able to really to MITM Am 16.04.2014 2

Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread antisnatchor
The fact that for BEAST, CRIME and LT there is not a fully implemented and *public* PoC, doesn't mean that those attack were/are not critical. They were very critical when they came out, and involved more trickery than Heartbleed to work. I guess you can find full PoC implementations if you searc

Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread Hanno Böck
On Wed, 16 Apr 2014 18:10:15 +0800 Shawn wrote: > I do believe Lucky-thirteen is far > more dangerous than heartbleed, we just don't know. I'd really like to hear some arguments to back that claim. Basically, Lucky13 is a protocol problem and thus the fix is a bit less obvious than for heartblee

Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread Ron Bowes
Are there actually any real-world attack scenarios for BEAST, CRIME, or Lucky-thirteen? Heartbleed has been used in actual legitimate attacks, but those earlier attacks all seem pretty tame in comparison. Worth fixing, of course, but they don't seem *as* critical to me. Ron On Wed, Apr 16, 2014

[FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread Shawn
After an exciting and crazy week. People are getting calm and plan or already start to doing audit on their system. But there are something you might miss. The older version of OpenSSL( like 0.9.8) might not affected by heartbleed issue but it doesn't mean you are secure. Don't forget the old OpenS