Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 04/09/2014 3:00:05 PM PDT by kingattax
[ Post Reply | Private Reply | View Replies ]


To: kingattax

Drive down and talk to your local, cute Teller.


2 posted on 04/09/2014 3:01:55 PM PDT by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax
The code vulnerability exists within layers of secure Internet server coding.

If a vulnerability can exist with "layers of secure coding" and undermine the whole structure, why do we call them "layers?"

3 posted on 04/09/2014 3:02:28 PM PDT by Steely Tom (How do you feel about robbing Peter's robot?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

This appears to be ‘the big one’ and it was open source.. And the bug went unnoticed since late 2011.. This is a huge blow.

I updated my client stuff to 1.01g, which is fixed. But who knows how long actual web site owners will take to upgrade.


4 posted on 04/09/2014 3:03:59 PM PDT by Monty22002
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax; Jim Robinson; John Robinson

Ping !,,,,!,,,!


5 posted on 04/09/2014 3:04:23 PM PDT by moose07 (the truth will out ,one day.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

This is all Algore’s fault. He invented a flawed internet.


6 posted on 04/09/2014 3:07:55 PM PDT by Proud2BeRight
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

Any other source other than “The Blaze?” Hate that site and all of its’ pop-ups.


7 posted on 04/09/2014 3:11:57 PM PDT by A_Tradition_Continues (formerly known as Politicalwit ...05/28/98 Class of '98)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

So it sounds like the problem is with how individual sites handle SSL. Anyone know if Bank of America or PayPal websites are affected by this?


10 posted on 04/09/2014 3:20:14 PM PDT by Menehune56 ("Let them hate so long as they fear" (Oderint Dum Metuant), Lucius Accius (170 BC - 86 BC))
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

check out your bank/etc here to see if it is vulnerable

http://lastpass.com/heartbleed/


11 posted on 04/09/2014 3:31:37 PM PDT by Chode (Stand UP and Be Counted, or line up and be numbered - *DTOM* -vvv- NO Pity for the LAZY - 86-44)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

Here’s a good source with a few things users can do to help protect themselves. However, it’s the hosting sites and their version of OpenSSL. So ultimately, end users can’t do too much.

http://www.macobserver.com/tmo/article/dealing-with-heartbleed-what-you-need-to-know?utm_campaign=tmo_twitter


12 posted on 04/09/2014 3:33:28 PM PDT by Lake Living
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

Bttt.


13 posted on 04/09/2014 4:24:49 PM PDT by Inyo-Mono (NRA)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax
Spent most of the day on it. What you do is patch OpenSSL on the affected servers and then apply new certs (the old ones could have been compromised). The problem with that is that the cert vendors have been absolutely swamped all day. I'm sitting on my thumb waiting for about a dozen at the moment. One ploy is to go to self-signed certs but that's only a temporary solution in our environment.

The way it works is simply that a remote user can grab memory from any server running OpenSSL in 64K chunks, as many times as he wants, and piece together anything that was there. Logins, passwords, account numbers, email, you name it. Any time for the past two years.

For the user, a change of password is mandatory for any site that uses SSL, which is practically anything where you'd pass money. Most of the bigger vendors are already patched but only since Monday. There's still that two-year window. This is a huge, gaping security hole.

Changing your password on an unpatched site/server is useless. The new one could be instantly compromised. HERE is a means you can use to test whatever site whose safety you need to verify.

22 posted on 04/09/2014 5:00:26 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax
I tested freerepublic.com, and the result came back: dial tcp 209.157.64.200:443: connection refused

Are the passwords here at risk? Were they previously? Or is this only for secure web sites?

23 posted on 04/09/2014 5:01:05 PM PDT by Defiant (Let the Tea Party win, and we will declare peace on the American people and go home.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

The exploit is diabolically simple.

Read about heartbeats in RFC 6520. A heartbeat consists of a type code, a length, some data, and at least 16 bytes of padding. You send this to the server, and it echoes back your data and resets the timeout timer.

Someone saw that in this implementation, no one was comparing the length field to what you actually sent. You could sent a heartbeat with a length field of 10K, but only have 2 characters of data. The server will put your 2 characters in memory, and then you back 10K starting at at the address of your 2 characters. That memory would have been recently released by other processes, and contains who know what.

Since a heartbeat resets your timeout, you could send heartbeats all day and collect enormous amounts of server memory, some of which would be bound to contain something interesting.


26 posted on 04/09/2014 5:15:38 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax
Is heartbleed a Microsoft only problem ?

28 posted on 04/09/2014 5:52:14 PM PDT by Uri’el-2012 (Psalm 119:174 I long for Your salvation, YHvH, Your teaching is my delight.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: kingattax

Beck just got new Lifelock ad material.


31 posted on 04/09/2014 6:49:55 PM PDT by TurboZamboni (Marx smelled bad and lived with his parents .)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson