[url=http://meincmagazine.com/civis/viewtopic.php?p=26613467#p26613467:cs27i0oh said:Infidel[/url]":cs27i0oh]In Chrome, there's a setting for "Check for server certificate revocation"... it's off by default.[url=http://meincmagazine.com/civis/viewtopic.php?p=26611303#p26611303:cs27i0oh said:rakkuuna[/url]":cs27i0oh]How effective is revoking certificates? Don't the client apps need to check it by themselves? I wonder if they do it very often...
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610491#p26610491:tquzyoh9 said:Aurich[/url]":tquzyoh9]Yes, we've updated all our certs.[url=http://meincmagazine.com/civis/viewtopic.php?p=26610469#p26610469:tquzyoh9 said:Fblue[/url]":tquzyoh9][url=http://meincmagazine.com/civis/viewtopic.php?p=26610385#p26610385:tquzyoh9 said:Solidstate89[/url]":tquzyoh9]
You don't have to keep logging in under the throwaway account. They updated OpenSSL this morning.
I saw this. I wonder if they have swapped there SSL Cert yet? I would imagine Ars public key was compromised, everything else appeared to be.
Ada 2012[url=http://meincmagazine.com/civis/viewtopic.php?p=26613301#p26613301:2aikos9s said:kliu0x52[/url]":2aikos9s]And what would you like to use to write low-level security libraries that will be used in a wide variety of scenarios and processes?[url=http://meincmagazine.com/civis/viewtopic.php?p=26612879#p26612879:2aikos9s said:ExcessPhase[/url]":2aikos9s]ArrayBoundscheck?
Why does this sound like C programming?
Why am I not coding in C anymore since 1996?
Now that it's the morning and I'm no longer drunk I can see where I went wrong in my simple idea – although even avoiding leaking the plaintext password is a plus, since the clueless user may have reused it and the salted hash won't help the attacker with other sites. However, you could use public key cryptography and end up with sign in tokens that don't help the attacker whether they read the database or a memory dump.[url=http://meincmagazine.com/civis/viewtopic.php?p=26612323#p26612323:2uxogi19 said:dangoodin[/url]":2uxogi19]To work with a hash, the user must enter the corresponding plain-text password and it must be passed through PBKDF2 or another hashing algorithm. During this process, the plain-text password is temporarily entered into memory. There's no way around this. To verify a password, it must be processed by the computer and pass through its memory. The same process is what gives rise to "RAM scrapers" that scour the memory of point-of-sale terminals for credit card numbers before they are encrypted and transmitted to payment processors.[url=http://meincmagazine.com/civis/viewtopic.php?p=26611775#p26611775:2uxogi19 said:Otus[/url]":2uxogi19]Why are they POSTing a plain text password when they could hash it on the client side and avoid ever leaking it?
What is bad is not the severity about this issue but who, who was the idiot that made this public before vendors like Red Hat could even release patches.
Honestly, this issue was published before people could even patch their servers which makes me wonder why they did not gave at least 7 days until at least the majority of servers where patched. In particular for a severity of this size and so easily to exploit by just visiting a web sever and sending some code to it.
Was it not enough for security researchers to say there is a security hole and patch it first, instead of actually releasing in public explaining the exploit vector? Ars is just publishing it after its public already but the original persons that discovered and this and leaked them are amazingly irresponsible and have done a huge damage to the Internet.
While that's true for code, they could've privately contacted the security teams at places like Yahoo that serve millions of people. AFAICT, Google's services were all secured before the disclosure, probably because one of the people who found the problem works for Google's security team. While Yahoo is Google's competitor, the problem of password cross-pollination means that giving big places like Yahoo an early heads-up through private channels would've been good for Google's users, too.[url=http://meincmagazine.com/civis/viewtopic.php?p=26615119#p26615119:28q3npyu said:traveller[/url]":28q3npyu]What is bad is not the severity about this issue but who, who was the idiot that made this public before vendors like Red Hat could even release patches.
Honestly, this issue was published before people could even patch their servers which makes me wonder why they did not gave at least 7 days until at least the majority of servers where patched. In particular for a severity of this size and so easily to exploit by just visiting a web sever and sending some code to it.
Was it not enough for security researchers to say there is a security hole and patch it first, instead of actually releasing in public explaining the exploit vector? Ars is just publishing it after its public already but the original persons that discovered and this and leaked them are amazingly irresponsible and have done a huge damage to the Internet.
I don't think you understand how this works. The exploits that were floating around within hours of the announcement were created from the patch itself, not because the researchers revealed too much information. They released the minimum information necessary, which by itself was by no means enough to do anything. The OpenSSL repositories are, by their very nature, public, so the moment the bug was fixed everybody was able to see exactly what it is and people were writing exploits based on that.
I doesn't ignore certificates completely, it has its own list which is maintained in updates. See this Ars article. Though, particularly at present, I'm still keeping that box checked.[url=http://meincmagazine.com/civis/viewtopic.php?p=26614707#p26614707:vxjod5ea said:nibb[/url]":vxjod5ea][url=http://meincmagazine.com/civis/viewtopic.php?p=26613467#p26613467:vxjod5ea said:Infidel[/url]":vxjod5ea]In Chrome, there's a setting for "Check for server certificate revocation"... it's off by default.[url=http://meincmagazine.com/civis/viewtopic.php?p=26611303#p26611303:vxjod5ea said:rakkuuna[/url]":vxjod5ea]How effective is revoking certificates? Don't the client apps need to check it by themselves? I wonder if they do it very often...
Which makes you wonder why in the world we have certificates in the first place if Google is so idiotic to turn a setting like that to off by default.
If we cannot send a list of certificates which are stolen or invalid or just not to trust to users worldwide there is no need for a repository either.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26612193#p26612193:2btkpzak said:myforwik[/url]":2btkpzak]
IMO SSL/TLS is now completely broken. The number of potential certificates that have been exploited and that could now be used for man in the middle attacks could be in the millions..... the list of black listed certificates will be in the millions and/or the number of blacklisted sub certficate authorities is probably going to be 10,000+. Vendors already hate just including one or two items on the blacklist, let alone this number of items....
[url=http://meincmagazine.com/civis/viewtopic.php?p=26613301#p26613301:3u403zj7 said:kliu0x52[/url]":3u403zj7]And what would you like to use to write low-level security libraries that will be used in a wide variety of scenarios and processes? Write this in a managed language, and now you have the problem of every program requiring TLS also requiring whatever runtimes, libraries, etc. that your managed language uses.[url=http://meincmagazine.com/civis/viewtopic.php?p=26612879#p26612879:3u403zj7 said:ExcessPhase[/url]":3u403zj7]ArrayBoundscheck?
Why does this sound like C programming?
Why am I not coding in C anymore since 1996?
There is a reason people still use C, just as there is still a reason for people to understand assembly. Just because C isn't what you'd use to write most software doesn't mean that there aren't places where C is by far the best option available.
Change them if the website has fixed the flaw. Otherwise your new password will still be visible in potential attacks.[url=http://meincmagazine.com/civis/viewtopic.php?p=26615601#p26615601:1o941ifh said:phil_s[/url]":1o941ifh]I am glad I use a password manager (http://www.stickypassword.com) so changing all my passwords will be quick and easy. Or do you think it is not necessary?
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611081#p26611081:3ac05ybm said:bombardier[/url]":3ac05ybm][url=http://meincmagazine.com/civis/viewtopic.php?p=26610043#p26610043:3ac05ybm said:Solomonoff's Secret[/url]":3ac05ybm]Bugs like this don't happen in memory-managed languages like Java. If we insist on writing our security software in C, perhaps it should be written in a variant that enforces the validity of memory accesses at runtime. Performance would suffer negligibly compared to the security benefit. Unfortunately certain operations would have to be disallowed but the resulting inconvenience is a small price to pay.
The performance difference is not that negligible. My company moved parts of the project from C++ to C# and all of our beta customers are complaining about performance problems. The difference is really big.
This is not a tool selection problem. This is developer problem. It doesn't make sense to switch to different tool (programming language) just because the individual who used the tool was not very proficient in using it. Everyone who had substantial experience in this type of programming would be aware of possible buffer overflow problems and would take care to sanitize the input data that comes from untrusted source. This is not something really tricky and hard to see that somehow surprised developer. This is really basic stuff when you have experience working in this field.
Not every developer is created equal and there is no universal tool you can use to level the playing field. Current tendency to use inappropriate tools just to minimize impact of bad developers is slowly coming to an end. We hit 4GHz limit with CPUs and there is no "let's wait for next years hardware that will improve our performance".
[url=http://meincmagazine.com/civis/viewtopic.php?p=26615079#p26615079:xypy8gt6 said:kliu0x52[/url]":xypy8gt6]I wonder if it would be worthwhile for browsers to do something proactive about this.
1) Browser is instructed to visit https://foo.example.com
2) Browser runs a test for this bug.
3a) Browser sees no problem, and adds foo.example.com to a list of safe domains (so that it won't check this every time)
3b) Browser sees a problem, warns user.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26614785#p26614785:16brrq9e said:ExcessPhase[/url]":16brrq9e]No there is no need for C anymore since nearly 20 years.
I was not talking about java or .net.
I was talking about C++ and std::vector and std::string and C++ interfaces and serialization.
And I was talking about designing interfaces/APIs in a way that only a few number of different states are possible.
Such things like buffer-overflow or truncation or unsafe C functions or multiple-step-initialization or "goto failure" do not happen to me any more since nearly 20 years
-- because usage of C++ as such.
The problem is that everybody things he can write or even design software.
That there are different levels of quality of software has not entered most peoples thinking.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26615497#p26615497:16brrq9e said:jrose[/url]":16brrq9e][url=http://meincmagazine.com/civis/viewtopic.php?p=26613301#p26613301:16brrq9e said:kliu0x52[/url]":16brrq9e]And what would you like to use to write low-level security libraries that will be used in a wide variety of scenarios and processes? Write this in a managed language, and now you have the problem of every program requiring TLS also requiring whatever runtimes, libraries, etc. that your managed language uses.[url=http://meincmagazine.com/civis/viewtopic.php?p=26612879#p26612879:16brrq9e said:ExcessPhase[/url]":16brrq9e]ArrayBoundscheck?
Why does this sound like C programming?
Why am I not coding in C anymore since 1996?
There is a reason people still use C, just as there is still a reason for people to understand assembly. Just because C isn't what you'd use to write most software doesn't mean that there aren't places where C is by far the best option available.
I dunno. Maybe ADA? Pascal? One of the myriad of other languages which isn't quite as sucky for performance as managed code, but at least does proper type checking and array bounds checking?
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611575#p26611575:2wgxfoqs said:chromal[/url]":2wgxfoqs]I should like to know who submitted the code change, and how much the NSA may have paid them.
I'd say so.[url=http://meincmagazine.com/civis/viewtopic.php?p=26616923#p26616923:21wc4ke0 said:cpragman[/url]":21wc4ke0]So is this one of those times where certificates should be proactively revoked by the CSAs?
"C combines the power and performance of assembly language with the portability and ease-of-use of assembly language."[url=http://meincmagazine.com/civis/viewtopic.php?p=26617017#p26617017:2vg94x9b said:Luridis[/url]":2vg94x9b]C took over the world of kernel, driver and low API programming and allows you to do everything you do on electronics today. There is a reason for that. Why don't you try finding out why C beat out the other languages in OS development before throwing disparaging statements at it before learning the when and why? I'll even give you a hint: #ifdef.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26617017#p26617017:7a3qxiq6 said:Luridis[/url]":7a3qxiq6]
Yea, and there is another problem. People who can write or design one "kind" of software thinking the rules and principals they adhere to apply to every "layer" of software. Hardware does not understand interfaces, objects, strings or integers. Hardware only understands two types: Instructions and Data, both represented by binary numbers. Those "weak" types in C exist to allow the programmer to address the hardware in a meaningful way.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26617525#p26617525:3a27lphe said:ExcessPhase[/url]":3a27lphe][url=http://meincmagazine.com/civis/viewtopic.php?p=26617017#p26617017:3a27lphe said:Luridis[/url]":3a27lphe]
Yea, and there is another problem. People who can write or design one "kind" of software thinking the rules and principals they adhere to apply to every "layer" of software. Hardware does not understand interfaces, objects, strings or integers. Hardware only understands two types: Instructions and Data, both represented by binary numbers. Those "weak" types in C exist to allow the programmer to address the hardware in a meaningful way.
You are saying that there is no need for arrays or strings when writing device drivers?
And C++ is a super-set of C -- but I'm not going to tell you!
Endianness is important as a low-level attribute of a particular data format. Failure to account for varying endianness across architectures when writing software code for mixed platforms and when exchanging certain types of data might lead to failures and bugs, though these issues have been understood and properly handled for many decades.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26611005#p26611005:2tc8thxz said:blissfulight[/url]":2tc8thxz]And yet here we are, still using passwords.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26612193#p26612193:1pbiaoy3 said:myforwik[/url]":1pbiaoy3]
Even 11 is an understatement. Remember the servers involved have potentially been leaking their private key for their certificate! This means anyone can 'fake' being them.
It is not enough to do new certificates. All of the old certificates could now be used for man in the middle attacks! 2/3rds of the Internets certificates potentially need to be blacklisted! This is a MAJOR disaster.
It is unfeasible to blacklist such a large amount of certificates - as every device requires a list of all blacklisted certificates. This means all of the major CA's are going to have to black list their intermediate certificate authorities, and start issuing all new certificates under new CA's. This means even people who weren't effected will probably have to have their certificates blacklisted.
Especially since, if I'm reading that correctly, they have also given the exact length of the password.[url=http://meincmagazine.com/civis/viewtopic.php?p=26615405#p26615405:2hsul1f3 said:Brian6String[/url]":2hsul1f3]It would've been good to redact the example user's Yahoo account name too. Sure glad they didn't use mine. Look at the Notepad screen shot &login=xxxxxxxxxx.
Some more than others, though. If you're using client certs and the client is not compromised, it's not as bad. If you're using something like SPNEGO with Kerberos, it's not as bad. If you're using something like the Blizzard authenticator, it's not as bad.[url=http://meincmagazine.com/civis/viewtopic.php?p=26617839#p26617839:gnaz83r5 said:Titanium Dragon[/url]":gnaz83r5][url=http://meincmagazine.com/civis/viewtopic.php?p=26611005#p26611005:gnaz83r5 said:blissfulight[/url]":gnaz83r5]And yet here we are, still using passwords.
The more secure a system is, the less usable it is.
Passwords are a reasonable compromise between usability and security. And frankly, it really doesn't matter if you're using passwords or not; this sort of thing could potentially undermine any security method you used.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26615153#p26615153:226gimh3 said:kliu0x52[/url]":226gimh3]While that's true for code, they could've privately contacted the security teams at places like Yahoo that serve millions of people. AFAICT, Google's services were all secured before the disclosure, probably because one of the people who found the problem works for Google's security team. While Yahoo is Google's competitor, the problem of password cross-pollination means that giving big places like Yahoo an early heads-up through private channels would've been good for Google's users, too.[url=http://meincmagazine.com/civis/viewtopic.php?p=26615119#p26615119:226gimh3 said:traveller[/url]":226gimh3]What is bad is not the severity about this issue but who, who was the idiot that made this public before vendors like Red Hat could even release patches.
Honestly, this issue was published before people could even patch their servers which makes me wonder why they did not gave at least 7 days until at least the majority of servers where patched. In particular for a severity of this size and so easily to exploit by just visiting a web sever and sending some code to it.
Was it not enough for security researchers to say there is a security hole and patch it first, instead of actually releasing in public explaining the exploit vector? Ars is just publishing it after its public already but the original persons that discovered and this and leaked them are amazingly irresponsible and have done a huge damage to the Internet.
I don't think you understand how this works. The exploits that were floating around within hours of the announcement were created from the patch itself, not because the researchers revealed too much information. They released the minimum information necessary, which by itself was by no means enough to do anything. The OpenSSL repositories are, by their very nature, public, so the moment the bug was fixed everybody was able to see exactly what it is and people were writing exploits based on that.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26609787#p26609787:3ous7bxq said:issor[/url]":3ous7bxq]Probably TLS-supporting mail servers and OpenVPN clients as well. Atlassian JIRA is having issues as well, and they don't seem to be dynamically linked, either, so we have to wait on them.
Gmail had TLS heartbeat enabled as of an hour ago.
This is quite the nightmare.
Edit: I'm actually seeing conflicting reports, some places report TLS heartbeat support, but exploit scripts don't seem to recognize or be able to use it.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26610189#p26610189:34ucitbq said:tiagojn[/url]":34ucitbq]You can check whether a particular website is vulnerable using this link:
http://filippo.io/Heartbleed/
It looks like yahoo.com is still vulnerable
I've had to report vulnerabilities before and it's a lot harder to track down the right person privately than you think. You're "random guy off the internet" and you want to talk to the head of security at a major corporation, most companies don't make their org charts public. So you have to go through the public PR channel which has no idea what you're talking about.[url=http://meincmagazine.com/civis/viewtopic.php?p=26615153#p26615153:2a11bg61 said:kliu0x52[/url]":2a11bg61]While that's true for code, they could've privately contacted the security teams at places like Yahoo that serve millions of people.
[url=http://meincmagazine.com/civis/viewtopic.php?p=26615119#p26615119:371ymoeb said:traveller[/url]":371ymoeb]What is bad is not the severity about this issue but who, who was the idiot that made this public before vendors like Red Hat could even release patches.
Honestly, this issue was published before people could even patch their servers which makes me wonder why they did not gave at least 7 days until at least the majority of servers where patched. In particular for a severity of this size and so easily to exploit by just visiting a web sever and sending some code to it.
Was it not enough for security researchers to say there is a security hole and patch it first, instead of actually releasing in public explaining the exploit vector? Ars is just publishing it after its public already but the original persons that discovered and this and leaked them are amazingly irresponsible and have done a huge damage to the Internet.
I don't think you understand how this works. The exploits that were floating around within hours of the announcement were created from the patch itself, not because the researchers revealed too much information. They released the minimum information necessary, which by itself was by no means enough to do anything. The OpenSSL repositories are, by their very nature, public, so the moment the bug was fixed everybody was able to see exactly what it is and people were writing exploits based on that.