[url=http://meincmagazine.com/civis/viewtopic.php?p=26609767#p26609767:3hz1rn7x said:Killer Orca[/url]":3hz1rn7x]I am doubly glad that I switched over to using a password manager. Makes it a lot easier to keep log in information unique.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609881#p26609881:2edxxzi6 said:snowcat-il[/url]":2edxxzi6]Welp this is going to very ugly very quickly..... I bet a lot of privet keys are about to get changed
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609903#p26609903:2c222sv7 said:Vigilante1024[/url]":2c222sv7][url=http://meincmagazine.com/civis/viewtopic.php?p=26609767#p26609767:2c222sv7 said:Killer Orca[/url]":2c222sv7]I am doubly glad that I switched over to using a password manager. Makes it a lot easier to keep log in information unique.
Any word on vulnerability of hosted password manager services like lastpass? Even two factor auth is no guarantee if the second factor is tied to an email service that is also vulnerable...
http://www.cnet.com/news/heartbleed-bug ... passwords/One of the companies affected by the vulnerability was password manager LastPass, but the company upgraded its servers as of 5:47 a.m. PT Tuesday, spokesman Joe Siegrist said. "LastPass is quite unique in that nearly all your data is also encrypted with a key that LastPass servers never get -- so this bug could not have exposed customer's encrypted data," Siegrist added.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609943#p26609943:3s81li12 said:hangfirew8[/url]":3s81li12]Nagant Model 1895 revolver... from Russia... nice touch.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610001#p26610001:6hc5b81y said:SuperJB[/url]":6hc5b81y]I'm sorry ... but this was no accident. Security conscious programmers know better. Someone got a nice phat check.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610045#p26610045:21l75ip5 said:ThomBat[/url]":21l75ip5]Good to see some actual rubber-on-the-road proof of the vulnerability, since in the earlier thread people were quite sensibly asking how often something interesting does churn through the 64kB window.
Is there an up-to-date summary page of the state of major services like Gmail, Yahoo, etc, showing whether they've patched and re-issued keys? I don't want to go updating passwords on each until I know they've shut their peephole.
LastPass' own blog said there is no breech because all of the transmitted data is already in an encrypted state on the client's machine before it ever gets sent.[url=http://meincmagazine.com/civis/viewtopic.php?p=26609903#p26609903:kul4trh8 said:Vigilante1024[/url]":kul4trh8][url=http://meincmagazine.com/civis/viewtopic.php?p=26609767#p26609767:kul4trh8 said:Killer Orca[/url]":kul4trh8]I am doubly glad that I switched over to using a password manager. Makes it a lot easier to keep log in information unique.
Any word on vulnerability of hosted password manager services like lastpass? Even two factor auth is no guarantee if the second factor is tied to an email service that is also vulnerable...
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609955#p26609955:1t12omue said:RRob[/url]":1t12omue]You could have used Yahoo as an example without making the article title suggest it's an issue particular to them.
When I scanned Yahoo a few minutes ago they weren't vulnerable. But I'm starting to wonder if that python script has issues.[url=http://meincmagazine.com/civis/viewtopic.php?p=26610147#p26610147:20ayn2u8 said:robert.walter[/url]":20ayn2u8][url=http://meincmagazine.com/civis/viewtopic.php?p=26609955#p26609955:20ayn2u8 said:RRob[/url]":20ayn2u8]You could have used Yahoo as an example without making the article title suggest it's an issue particular to them.
As a yahoo subscriber, I'm glad they did. If more pressure causes the purple Y! to move its ass I'm all for it.
Other sites will have to follow suit as soon as the topic slips into the mainstream on the back of Yahoo as whipping boy.
Website operators should strongly consider replacing their X.509 certificates after applying the update...
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609903#p26609903:1bh12vgv said:Vigilante1024[/url]":1bh12vgv][url=http://meincmagazine.com/civis/viewtopic.php?p=26609767#p26609767:1bh12vgv said:Killer Orca[/url]":1bh12vgv]I am doubly glad that I switched over to using a password manager. Makes it a lot easier to keep log in information unique.
Any word on vulnerability of hosted password manager services like lastpass? Even two factor auth is no guarantee if the second factor is tied to an email service that is also vulnerable...
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609767#p26609767:1ew1tlol said:Killer Orca[/url]":1ew1tlol]I am doubly glad that I switched over to using a password manager. Makes it a lot easier to keep log in information unique.
In the meantime, readers should steer clear of Yahoo Mail and any other sites that are still running vulnerable versions of OpenSSL. The login credential you save may be your own.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610237#p26610237:25n46tqi said:bthylafh[/url]":25n46tqi]My router firmware (Tomato/Shibby v1.16) is vulnerable. I've shut off remote access to the web console until this gets resolved.
You don't have to keep logging in under the throwaway account. They updated OpenSSL this morning.[url=http://meincmagazine.com/civis/viewtopic.php?p=26610257#p26610257:16e8npnm said:TemporaryAftermatch[/url]":16e8npnm]In the meantime, readers should steer clear of Yahoo Mail and any other sites that are still running vulnerable versions of OpenSSL. The login credential you save may be your own.
That's exactly why I created this throwaway account to log in on Ars Technica. This website is extremely vulnerable. Just check the comments under http://meincmagazine.com/security/2014/04 ... 1&start=40 (look at the end of the page).
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610363#p26610363:v9ddaaql said:bthylafh[/url]":v9ddaaql][url=http://meincmagazine.com/civis/viewtopic.php?p=26610339#p26610339:v9ddaaql said:sryan2k1[/url]":v9ddaaql][url=http://meincmagazine.com/civis/viewtopic.php?p=26610237#p26610237:v9ddaaql said:bthylafh[/url]":v9ddaaql]My router firmware (Tomato/Shibby v1.16) is vulnerable. I've shut off remote access to the web console until this gets resolved.
You shouldn't have remote access to your router enabled in the first place.
I don't care. It's all over HTTPS and it's a good password, and it lets me remotely wake a computer if it's nodded off.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610257#p26610257:vi47fkdu said:TemporaryAftermatch[/url]":vi47fkdu]In the meantime, readers should steer clear of Yahoo Mail and any other sites that are still running vulnerable versions of OpenSSL. The login credential you save may be your own.
That's exactly why I created this throwaway account to log in on Ars Technica. This website is extremely vulnerable. Just check the comments under http://meincmagazine.com/security/2014/04 ... 1&start=40 (look at the end of the page).
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610385#p26610385:3c1a0oja said:Solidstate89[/url]":3c1a0oja]
You don't have to keep logging in under the throwaway account. They updated OpenSSL this morning.
Yes, we've updated all our certs.[url=http://meincmagazine.com/civis/viewtopic.php?p=26610469#p26610469:3heu0ql4 said:Fblue[/url]":3heu0ql4][url=http://meincmagazine.com/civis/viewtopic.php?p=26610385#p26610385:3heu0ql4 said:Solidstate89[/url]":3heu0ql4]
You don't have to keep logging in under the throwaway account. They updated OpenSSL this morning.
I saw this. I wonder if they have swapped there SSL Cert yet? I would imagine Ars public key was compromised, everything else appeared to be.