Yes, we've updated all our certs.[/quote][url=http://meincmagazine.com/civis/viewtopic.php?p=26610491#p26610491:28n1164h said:Aurich[/url]":28n1164h]
I saw this. I wonder if they have swapped there SSL Cert yet? I would imagine Ars public key was compromised, everything else appeared to be.
If you actually read the thread, you'd see that Ars updated their servers this morning within hours of the news breaking. AKA - as soon as the admins became aware, and as soon as the OpenSSL patch was available.
Nice try.
Don't know that I'd call that "extremely vulnerable"
The concern isn't that the key was generated on a vulnerable server (although there is a bunch of potential issues there, if the CA really sucks) but that the private key for the cert was installed for use on a server that was vulnerable. The CA never even sees your private key when they sign your public key, and it's the private key that is in immediate danger here.[url=http://meincmagazine.com/civis/viewtopic.php?p=26610525#p26610525:2k5d5vvx said:GreenMeters[/url]":2k5d5vvx]Is there any 100% sure way for users to check a website's certificate and verify that it was generated by an SSL tool/version without known vulnerabilities?
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610525#p26610525:132a63xa said:GreenMeters[/url]":132a63xa]Is there any 100% sure way for users to check a website's certificate and verify that it was generated by an SSL tool/version without known vulnerabilities?
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610043#p26610043:3j47klvm said:Solomonoff's Secret[/url]":3j47klvm]Bugs like this don't happen in memory-managed languages like Java. If we insist on writing our security software in C, perhaps it should be written in a variant that enforces the validity of memory accesses at runtime. Performance would suffer negligibly compared to the security benefit. Unfortunately certain operations would have to be disallowed but the resulting inconvenience is a small price to pay.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610503#p26610503:s9hykz9v said:sryan2k1[/url]":s9hykz9v]If you actually read the thread, you'd see that Ars updated their servers this morning within hours of the news breaking. AKA - as soon as the admins became aware, and as soon as the OpenSSL patch was available.
Nice try.
Don't know that I'd call that "extremely vulnerable"
But you have no idea how far back data theft occurred. There is proof in one of the news feeds of people logging in as other Ars users using this bug as of this morning. That could have been happening for months with nobody knowing.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609955#p26609955:2tep0d6z said:RRob[/url]":2tep0d6z]You could have used Yahoo as an example without making the article title suggest it's an issue particular to them.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610429#p26610429:3ttzprzt said:SunnyD[/url]":3ttzprzt]... The entire Android ecosystem relies on OpenSSL if I am not mistaken, probably iOS too ...
Imagine how many "outdated" phones that are still in use will never get firmware update to fix this issue.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610817#p26610817:1tw8hkaq said:invertigo[/url]":1tw8hkaq][url=http://meincmagazine.com/civis/viewtopic.php?p=26609955#p26609955:1tw8hkaq said:RRob[/url]":1tw8hkaq]You could have used Yahoo as an example without making the article title suggest it's an issue particular to them.
Yahoo was significantly slower (like 17 hours or so) to patch than any of the other major email providers.
I did that. On Linux. It was vulnerable.[url=http://meincmagazine.com/civis/viewtopic.php?p=26610335#p26610335:3fynt2j2 said:longhairedboy[/url]":3fynt2j2]its tempting to fire up my own mail server again.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610363#p26610363:35gzrlcz said:bthylafh[/url]":35gzrlcz][url=http://meincmagazine.com/civis/viewtopic.php?p=26610339#p26610339:35gzrlcz said:sryan2k1[/url]":35gzrlcz][url=http://meincmagazine.com/civis/viewtopic.php?p=26610237#p26610237:35gzrlcz said:bthylafh[/url]":35gzrlcz]My router firmware (Tomato/Shibby v1.16) is vulnerable. I've shut off remote access to the web console until this gets resolved.
You shouldn't have remote access to your router enabled in the first place.
I don't care. It's all over HTTPS and it's a good password, and it lets me remotely wake a computer if it's nodded off.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610633#p26610633:37eq8lvh said:Kevinv[/url]":37eq8lvh][url=http://meincmagazine.com/civis/viewtopic.php?p=26610525#p26610525:37eq8lvh said:GreenMeters[/url]":37eq8lvh]Is there any 100% sure way for users to check a website's certificate and verify that it was generated by an SSL tool/version without known vulnerabilities?
it's not the SSL tool that generated the cert that's vulnerable. It's that the cert private key may have been leaked by this bug in the software.
Any cert with a valid from date before today is suspect. Go to the site, bring up the certificate information in your browser and check the valid from date. For example, below is fastmail.fm's certs. You'll see the start date as today.
![]()
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610969#p26610969:2hu4d5p7 said:Archangel Mychael[/url]":2hu4d5p7][url=http://meincmagazine.com/civis/viewtopic.php?p=26610363#p26610363:2hu4d5p7 said:bthylafh[/url]":2hu4d5p7][url=http://meincmagazine.com/civis/viewtopic.php?p=26610339#p26610339:2hu4d5p7 said:sryan2k1[/url]":2hu4d5p7][url=http://meincmagazine.com/civis/viewtopic.php?p=26610237#p26610237:2hu4d5p7 said:bthylafh[/url]":2hu4d5p7]My router firmware (Tomato/Shibby v1.16) is vulnerable. I've shut off remote access to the web console until this gets resolved.
You shouldn't have remote access to your router enabled in the first place.
I don't care. It's all over HTTPS and it's a good password, and it lets me remotely wake a computer if it's nodded off.
*Headdesk*
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610845#p26610845:lyivzsos said:Kevinv[/url]":lyivzsos][url=http://meincmagazine.com/civis/viewtopic.php?p=26610429#p26610429:lyivzsos said:SunnyD[/url]":lyivzsos]... The entire Android ecosystem relies on OpenSSL if I am not mistaken, probably iOS too ...
Imagine how many "outdated" phones that are still in use will never get firmware update to fix this issue.
this is a server side issue, not a client issue. OpenSSL provides both server and client libraries and that is why Android and iOS use them. Unless you're serving web pages from your phone you're OK.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610043#p26610043:3ap6y246 said:Solomonoff's Secret[/url]":3ap6y246]Bugs like this don't happen in memory-managed languages like Java. If we insist on writing our security software in C, perhaps it should be written in a variant that enforces the validity of memory accesses at runtime. Performance would suffer negligibly compared to the security benefit. Unfortunately certain operations would have to be disallowed but the resulting inconvenience is a small price to pay.
What's with the cartridge on the left though?[url=http://meincmagazine.com/civis/viewtopic.php?p=26609943#p26609943:2lt07hvv said:hangfirew8[/url]":2lt07hvv]Nagant Model 1895 revolver... from Russia... nice touch.
Before the update, the Yahoo Mail cert was valid from March 2014 to April 11, 2014. After the update, the cert is from today to April 25, 2014.[url=http://meincmagazine.com/civis/viewtopic.php?p=26610875#p26610875:1babr8ie said:Roguish[/url]":1babr8ie][url=http://meincmagazine.com/civis/viewtopic.php?p=26610817#p26610817:1babr8ie said:invertigo[/url]":1babr8ie][url=http://meincmagazine.com/civis/viewtopic.php?p=26609955#p26609955:1babr8ie said:RRob[/url]":1babr8ie]You could have used Yahoo as an example without making the article title suggest it's an issue particular to them.
Yahoo was significantly slower (like 17 hours or so) to patch than any of the other major email providers.
Does this mean they are now in fact patched? I see their cert with a valid date of 4/7, and this story written just an hour and a half ago is warning you against logging in to Yahoo.
I just want to make sure when I should finally bother changing my password.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611091#p26611091:vi8l3uyp said:Sulla[/url]":vi8l3uyp]What's with the cartridge on the left though?[url=http://meincmagazine.com/civis/viewtopic.php?p=26609943#p26609943:vi8l3uyp said:hangfirew8[/url]":vi8l3uyp]Nagant Model 1895 revolver... from Russia... nice touch.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611057#p26611057:29kn7hst said:Kasoroth[/url]":29kn7hst][url=http://meincmagazine.com/civis/viewtopic.php?p=26610633#p26610633:29kn7hst said:Kevinv[/url]":29kn7hst][url=http://meincmagazine.com/civis/viewtopic.php?p=26610525#p26610525:29kn7hst said:GreenMeters[/url]":29kn7hst]Is there any 100% sure way for users to check a website's certificate and verify that it was generated by an SSL tool/version without known vulnerabilities?
it's not the SSL tool that generated the cert that's vulnerable. It's that the cert private key may have been leaked by this bug in the software.
Any cert with a valid from date before today is suspect. Go to the site, bring up the certificate information in your browser and check the valid from date. For example, below is fastmail.fm's certs. You'll see the start date as today.
![]()
I wonder if any of the browsers will be updated to automatically reject any older certificates as a precaution, or at least display a warning, so users know the connection is potentially compromised.
I hope we get some kind of follow up on this to explain. "it does" is a bit too vague to go on. One of them give you a clue about connectin to "malicious" server. So maybe trying to connect to a fake server might give the owner of the server a possibility to attack the client? How likely is that compared to the shitstorm on the serverside? I understand "heartbeating" servers but how could that be done against client side?[url=http://meincmagazine.com/civis/viewtopic.php?p=26611067#p26611067:p07xdei3 said:dangoodin[/url]"07xdei3]
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610845#p26610845:p07xdei3 said:Kevinv[/url]"07xdei3]
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610429#p26610429:p07xdei3 said:SunnyD[/url]"07xdei3]... The entire Android ecosystem relies on OpenSSL if I am not mistaken, probably iOS too ...
Imagine how many "outdated" phones that are still in use will never get firmware update to fix this issue.
this is a server side issue, not a client issue. OpenSSL provides both server and client libraries and that is why Android and iOS use them. Unless you're serving web pages from your phone you're OK.
Hold on, please. I don't think your comment is accurate, and it may give some readers a false sense of security. According to multiple researchers I trust, Heartbleed is a client issue, also. See, e.g.:
https://twitter.com/cpu/status/453621581797806080
https://twitter.com/KevinSMcArthur/stat ... 9950974976
https://twitter.com/jaimeblascob/status ... 4384235520
https://twitter.com/scottamcintyre/stat ... 7718906880
Comment updated to report tweeted opinions from researchers.
And what exactly is it that makes you think private keys or anything else would have been any more secure when they can get those in the memory dump as well?[url=http://meincmagazine.com/civis/viewtopic.php?p=26611005#p26611005:2tqmceg0 said:blissfulight[/url]":2tqmceg0]And yet here we are, still using passwords.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611271#p26611271:1zwwmjag said:Korpo[/url]":1zwwmjag]Doesn't the fact that something like this--used by 2/3 of the sites out there, entirely open source, yet vulnerable for years--fly in the face of the assertion that "open source is more secure because anyone can audit it"?
That is correct, IIS is not affected by this.[url=http://meincmagazine.com/civis/viewtopic.php?p=26611297#p26611297:1pocv63p said:jeromeyers2[/url]":1pocv63p]Am I mistaken in thinking that IIS and most Microsoft services aren't affected by this?
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609903#p26609903:2tly1jke said:Vigilante1024[/url]":2tly1jke][url=http://meincmagazine.com/civis/viewtopic.php?p=26609767#p26609767:2tly1jke said:Killer Orca[/url]":2tly1jke]I am doubly glad that I switched over to using a password manager. Makes it a lot easier to keep log in information unique.
Any word on vulnerability of hosted password manager services like lastpass? Even two factor auth is no guarantee if the second factor is tied to an email service that is also vulnerable...
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611293#p26611293:3klg4j8y said:Muti[/url]":3klg4j8y]Having an old certificate does not inherently mean the site is/was vulnerable since some sites may not be utilizing the OpenSSL library for their TLS implementations (Microsoft's IIS for instance).
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611297#p26611297:3gat2zmp said:jeromeyers2[/url]":3gat2zmp]Am I mistaken in thinking that IIS and most Microsoft services aren't affected by this?
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609767#p26609767:1vufv62v said:Killer Orca[/url]":1vufv62v]I am doubly glad that I switched over to using a password manager. Makes it a lot easier to keep log in information unique.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611473#p26611473:3aupo2zf said:Jousle[/url]":3aupo2zf]Tell me the truth doctor, how bad is it?