On 2014-04-07 at 17:56 -0700, Paul Graydon wrote:
> Bear in mind that there is no way to tell if you've been compromised
> or not. If you can, it's worth erring on the side of caution.

Indeed.  The disclosure is just extra data sent back in a frame from the
server, without the connection being dropped or any abnormal
termination; the events are heart-beats which don't normally cause any
logging, because they're _not_ a "data transfer", they just keep the
connection alive, help with Path MTU Discovery and maybe help defeat
traffic analysis in some deployment scenarios.  The latter two reasons
are why "heartbeats" have a payload at all.

Further, it turns out that it's 64kB of disclosure, per heartbeat
packets, and the attacker appears to have pretty free reign over the
peer's address-space (and either side can send heart-beats, so AFAICT,
an OpenSSL client can be attacked by a malicious server).

(This would neatly explain how the NSA got ahold of server keys for some
 service providers.)

-Phil
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to