Heartbleed

mwonow

Member
SoSH Member
Sep 4, 2005
7,124
Other folks here are probably already aware of Heartbleed, but I just learned of it today, and thought I'd pass it on. Essentially, it's a server-side problem with OpenSSL which can enable hackers to access names, passwords and other info. Here's a description: http://heartbleed.com/
Much more frighteningly, here's a list of vulnerable sites, which includes five that I'm likely to use within the course of any year: https://github.com/musalbas/heartbleed-masstest/blob/master/top1000.txt
 
If you're a server admin, you probably want to make sure that you're using a safe version of OpenSSL. If you are simply a user (like me), you don't have a ton of options, outside of changing passwords on those sites, and on any other sites where you might be using a password common to the sites listed as vulnerable...
 

MakMan44

stole corsi's dream
SoSH Member
Aug 22, 2009
19,363
Just heard about this tonight. Thanks for the list, good to know what to avoid. 
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
This thread might have made sense eight hours ago, but every site worth caring about on this list has already been patched.

It's a pain in the ass, and people should go change their passwords once a site has been confirmed to be not dead, but few enough people will that it'll all just recede.
 

HriniakPosterChild

Member
SoSH Member
Jul 6, 2006
14,841
500 feet above Lake Sammammish
A site declared not vulnerable according to that list might have had been vulnerable moments before the list was created.
 
To be safe, assume any information you stored on any site using https was never secure.
 
Yes, it sucks.
 

uncannymanny

Member
SoSH Member
Jan 12, 2007
9,097
Yeah this is real scary stuff. How in the world is stackexchange vulnerable? Of every site on this list, you'd think they'd be one of the first to patch.
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
HriniakPosterChild said:
To be safe, assume any information you stored on any site using https was never secure.
Yup.

Nobody will though. Because that's hard. :buddy:
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
uncannymanny said:
Yeah this is real scary stuff. How in the world is stackexchange vulnerable? Of every site on this list, you'd think they'd be one of the first to patch.
Because...they didn't know, their HAProxy boxes didn't have distro patches, and they don't really have sensitive data? (OpenID keys are whatever, you just nuke them and force a re-auth.) We have boxes we haven't patched, because they're still running our old SSL cert (to be invalidated tomorrow) due to some technical issues with updating them off of 10.04. They're not meaningfully sensitive, they run SSL for auth rather than encryption and the opportunity cost of maybe munging some statistical-noise data is much lower than trying to manage machines with home-rolled OpenSSL.

Oh, and your browser probably doesn't pay attention to CRLs, so it's not like it saves you from MitM. Your phone browser also probably uses OpenSSL and can be hit with heartbleed, too. So this is still a thing.)
 

MakMan44

stole corsi's dream
SoSH Member
Aug 22, 2009
19,363
So Blacken, how does it work if you use something like Twitter or FaceBook to sign in on one of those sites? Change that as well?
 

uncannymanny

Member
SoSH Member
Jan 12, 2007
9,097
Blacken said:
Because...they didn't know, their HAProxy boxes didn't have distro patches, and they don't really have sensitive data? (OpenID keys are whatever, you just nuke them and force a re-auth.) We have boxes we haven't patched, because they're still running our old SSL cert (to be invalidated tomorrow) due to some technical issues with updating them off of 10.04. They're not meaningfully sensitive, they run SSL for auth rather than encryption and the opportunity cost of maybe munging some statistical-noise data is much lower than trying to manage machines with home-rolled OpenSSL.

Oh, and your browser probably doesn't pay attention to CRLs, so it's not like it saves you from MitM. Your phone browser also probably uses OpenSSL and can be hit with heartbleed, too. So this is still a thing.)
Well emails and passwords that are certainly used by their users for other sites and services would qualify as sensitive, no? But, it was more of a surprise that a developer site with a portal called serverexchange wouldn't be patched in general regardless.
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
MakMan44 said:
So Blacken, how does it work if you use something like Twitter or FaceBook to sign in on one of those sites? Change that as well?
They should have invalidated you. If they didn't, you should.

uncannymanny said:
Well emails and passwords that are certainly used by their users for other sites and services would qualify as sensitive, no?
SE doesn't use fat cookies and 95% of its audience uses OAuth (or OpenID, whichever one they're using for data).

But it was more of a surprise that a developer site with a portal called serverexchange wouldn't be patched in general regardless.
There was no patch until midday yesterday. There was a workaround that came with a nontrivial likelihood of hosing your shit because you'd be recompiling with different flags and OpenSSL doesn't even have a working test suite.
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
HriniakPosterChild said:
Harder than waking up one day and having your Vanguard balance be $0.00?
 
Just call me "nobody," I guess.
I changed all mine too, nobody.
 

HriniakPosterChild

Member
SoSH Member
Jul 6, 2006
14,841
500 feet above Lake Sammammish
uncannymanny said:
Well emails and passwords that are certainly used by their users for other sites and services would qualify as sensitive, no? But, it was more of a surprise that a developer site with a portal called serverexchange wouldn't be patched in general regardless.
 
If you use the same password on multiple sites, you aren't part of the solution, you're part of the problem. But you should have known that six months ago after Adobe left 150m passwords out for the taking.
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
uncannymanny said:
While true, it's unfortunately an unrealistic expectation and definitely not one that sites should make about their users.
It's 2014. Password vaults are free and easy to use. At this point I'm pretty sure we have officially reached "fix your behavior or fuck off" levels of ease-of-not-passwording.
 

uncannymanny

Member
SoSH Member
Jan 12, 2007
9,097
How many "normal" people would even be aware of that though? I'm pretty sure my parents don't read Mashable or whatever. We just haven't reached the point where enough people understand security on the internet.
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
I see nontechnical people (and I don't mean nontechnical employees of tech companies) using LastPass or 1Password all the time.

But even if not, I'm past the point of sympathy. Learn or lose. The only people they hurt are themselves.
 

uncannymanny

Member
SoSH Member
Jan 12, 2007
9,097
Blacken said:
I see nontechnical people (and I don't mean nontechnical employees of tech companies) using LastPass or 1Password all the time.

But even if not, I'm past the point of sympathy. Learn or lose. The only people they hurt are themselves.
I agree with you up to the point where it becomes a company's security policy.

That said I bet many of those people are still storing "password123" in their LastPass.
 

HriniakPosterChild

Member
SoSH Member
Jul 6, 2006
14,841
500 feet above Lake Sammammish
uncannymanny said:
How many "normal" people would even be aware of that though? I'm pretty sure my parents don't read Mashable or whatever. We just haven't reached the point where enough people understand security on the internet.
 
Oh, my father in law was using "golf" for his hotmail password just last year.
 
And then all his friends got an emergency email from him. Seems he was stranded in England, the victim of a horrific robbery, and needed them to wire him some money so he could come home...
 

SumnerH

Malt Liquor Picker
Dope
SoSH Member
Jul 18, 2005
31,998
Alexandria, VA
HriniakPosterChild said:
What is on the list seems to be giving you a false sense of security.
 
They were using OpenSSL yesterday. They were vulnerable yesterday. IOW, change your damn Vanguard password!!!
The safest thing to assume is that all sites are compromised, but the fact that they were using OpenSSL yesterday doesn't mean squat--I know of many sites that are still on Ubuntu 10.x, a long-term service release--they're using OpenSSL, but not a recent enough version to be vulnerable to this problem.
 

Spelunker

Member
SoSH Member
Jul 17, 2005
11,943
Yeah it was great to see that we're on an old enough version of our F5 that we're not exposed. So, yay for people being lazy?
 

Orange Julia

kittens kitttens kittens kittens
Lifetime Member
SoSH Member
Dec 13, 2006
13,828
NatsTown!
So, we should all change all our passwords everywhere--is that the best solution? Not being snarky, truly trying to understand what the solution is because there's a lot of noise out there. Thanks!
 

Hextall

New Member
Mar 5, 2010
189
I use LastPass, and if you do a security check (tools--> security check) they'll list the sites I have in LastPass affected by Heartbleed and what to do (many of them say "Wait" while the sites update their SSL certificates).
 

SumnerH

Malt Liquor Picker
Dope
SoSH Member
Jul 18, 2005
31,998
Alexandria, VA
Orange Julia said:
So, we should all change all our passwords everywhere--is that the best solution? Not being snarky, truly trying to understand what the solution is because there's a lot of noise out there. Thanks!
In an ideal world:

Change passwords everywhere, make sure they're all different so that if one site gets hacked they can't use your password to access another site.
 

uncannymanny

Member
SoSH Member
Jan 12, 2007
9,097
Trlicek's Whip said:
 
I do this with LastPass and am happy with it. 
Curious to hear any info on ease of use. What if I forget my keys one day? How do I use it on a public machine?
 

Trlicek's Whip

Member
SoSH Member
Feb 8, 2009
5,607
New York City
It's fairly easy to use; it'd have to be because I'm fairly clueless with technical stuff past the basics. 
 
In my case my work computer is enabled with YubiKey for a 2-step authorization (password + one-time password generated by the YubiKey when activated and in a USB port). I type in a password, then press the button on the YubiKey to generate the OTP for that specific login. It's tiny and virtually indestructible and waterproof; smaller than a club card key on your keychain. 
 
When I log in there is the option underneath that states "if you lose your YubiKey, click here to disable YubiKey Authentication," which sends you an email link to disable it temporarily. Presumably when I log in the next day there's nothing permanently locked out unless/until I request another key. 
 
The YubiKey-LastPass bundle also allows for 5 different key authorizations. 
 
On public browsers you can log into LastPass from their website directly and access your "vault" of stored sites/passwords. I do that so don't need my key. FF and Chrome also have LastPass extensions that let you access passwords, auto-logins, etc. There's also smartphone versions of it (the Android one is fine). 
 
LastPass FAQ with YubiKey-specific FAQ's here = https://lastpass.com/support.php?cmd=getproductfaq&product=other_yubikey
 

HriniakPosterChild

Member
SoSH Member
Jul 6, 2006
14,841
500 feet above Lake Sammammish
SumnerH said:
In an ideal world:

Change passwords everywhere, make sure they're all different so that if one site gets hacked they can't use your password to access another site.
 
In the real world: start with the sites where you have the most to lose (banks, credit cards, PayPal) and save for the last those where the stakes are lowest (Open Table, SoSH).