* [gentoo-user] 'Heartbleed' bug
@ 2014-04-10 0:06 Joseph
2014-04-10 0:13 ` Ralf
` (3 more replies)
0 siblings, 4 replies; 18+ messages in thread
From: Joseph @ 2014-04-10 0:06 UTC (permalink / raw
To: gentoo-user
Is gentoo effected by this new 'Heartbleed' bug?
"The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library...."
http://heartbleed.com/
--
Joseph
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 0:06 [gentoo-user] 'Heartbleed' bug Joseph
@ 2014-04-10 0:13 ` Ralf
2014-04-10 0:32 ` Michael Orlitzky
` (2 subsequent siblings)
3 siblings, 0 replies; 18+ messages in thread
From: Ralf @ 2014-04-10 0:13 UTC (permalink / raw
To: gentoo-user
Hello Joseph,
On 04/10/2014 02:06 AM, Joseph wrote:
> Is gentoo effected by this new 'Heartbleed' bug?
yes it is, as all OpenSSL versions > 0.9.8 were affected.
And Gentoo supported those versions.
So Gentoo also was affected but it supports the new
"heartbleed-bug-fixed" version 1.0.1g.
I *think* that you could also use an older version disabling the
"tls-heartbeat" USE flag.
Regards
Ralf
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 0:06 [gentoo-user] 'Heartbleed' bug Joseph
2014-04-10 0:13 ` Ralf
@ 2014-04-10 0:32 ` Michael Orlitzky
2014-04-10 5:48 ` Pavel Volkov
2014-04-10 10:42 ` Marc Joliet
2014-04-10 22:55 ` [gentoo-user] " walt
3 siblings, 1 reply; 18+ messages in thread
From: Michael Orlitzky @ 2014-04-10 0:32 UTC (permalink / raw
To: gentoo-user
On 04/09/2014 08:06 PM, Joseph wrote:
> Is gentoo effected by this new 'Heartbleed' bug?
>
> "The Heartbleed Bug is a serious vulnerability in the popular OpenSSL
> cryptographic software library...."
>
> http://heartbleed.com/
>
Yes, upgrade your OpenSSL to the latest stable version, and if 1.0.1g
isn't stable on your arch (it should be unless it's a weird one), unset
USE=tls-heartbeat like Ralf said.
But that's not your big problem. If you operate any servers, the private
keys to any OpenSSL-backed service may have been compromised. So the old
certificates all need to be revoked and new ones issued. That includes
Apache, OpenVPN, Postfix, Dovecot -- all the big ones. Even if you don't
run servers, other people do, and they were probably vulnerable. So any
passwords you've used on the web in the past two years should be changed.
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 0:32 ` Michael Orlitzky
@ 2014-04-10 5:48 ` Pavel Volkov
2014-04-10 9:03 ` Adam Carter
0 siblings, 1 reply; 18+ messages in thread
From: Pavel Volkov @ 2014-04-10 5:48 UTC (permalink / raw
To: gentoo-user
On Thursday, 10 April 2014 04:32:34 MSK, Michael Orlitzky wrote:
> Yes, upgrade your OpenSSL to the latest stable version, and if 1.0.1g
> isn't stable on your arch (it should be unless it's a weird one), unset
> USE=tls-heartbeat like Ralf said.
>
> But that's not your big problem. If you operate any servers, the private
> keys to any OpenSSL-backed service may have been compromised. So the old
> certificates all need to be revoked and new ones issued. That includes
> Apache, OpenVPN, Postfix, Dovecot -- all the big ones. Even if you don't
> run servers, other people do, and they were probably vulnerable. So any
> passwords you've used on the web in the past two years should be changed.
What surprises me here is OpenSSH. It's not supposed to use OpenSSL but
Debian update process suggests to restart it after updating OpenSSL to a
fixed version. Is it an overkill on their part? It might confuse admins.
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 5:48 ` Pavel Volkov
@ 2014-04-10 9:03 ` Adam Carter
2014-04-10 9:53 ` Ján Zahornadský
0 siblings, 1 reply; 18+ messages in thread
From: Adam Carter @ 2014-04-10 9:03 UTC (permalink / raw
To: gentoo-user@lists.gentoo.org
[-- Attachment #1: Type: text/plain, Size: 1215 bytes --]
> What surprises me here is OpenSSH. It's not supposed to use OpenSSL but
> Debian update process suggests to restart it after updating OpenSSL to a
> fixed version. Is it an overkill on their part? It might confuse admins.
>
>
> adam@proxy ~ $ ldd /usr/sbin/sshd
linux-vdso.so.1 (0x00007fffb068e000)
libwrap.so.0 => /lib64/libwrap.so.0 (0x00007f68db1e6000)
libpam.so.0 => /lib64/libpam.so.0 (0x00007f68dafd8000)
libcrypto.so.1.0.0 => /usr/lib64/libcrypto.so.1.0.0 (0x00007f68dabf5000)
libutil.so.1 => /lib64/libutil.so.1 (0x00007f68da9f2000)
libz.so.1 => /lib64/libz.so.1 (0x00007f68da7db000)
libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00007f68da5a4000)
libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f68da387000)
libc.so.6 => /lib64/libc.so.6 (0x00007f68d9fd7000)
libgcc_s.so.1 => /usr/lib/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1
(0x00007f68d9dc0000)
libdl.so.2 => /lib64/libdl.so.2 (0x00007f68d9bbc000)
/lib64/ld-linux-x86-64.so.2 (0x00007f68db3f1000)
adam@proxy ~ $ qfile /usr/lib64/libcrypto.so.1.0.0
dev-libs/openssl (/usr/lib64/libcrypto.so.1.0.0)
adam@proxy ~ $
So OpenSSH clearly IS using OpenSSL, and you need to restart sshd after
upgrading OpenSSL.
[-- Attachment #2: Type: text/html, Size: 1575 bytes --]
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 9:03 ` Adam Carter
@ 2014-04-10 9:53 ` Ján Zahornadský
2014-04-10 10:52 ` Matthew Finkel
0 siblings, 1 reply; 18+ messages in thread
From: Ján Zahornadský @ 2014-04-10 9:53 UTC (permalink / raw
To: gentoo-user
On 04/10/2014 05:03 PM, Adam Carter wrote:
>
> What surprises me here is OpenSSH. It's not supposed to use OpenSSL
> but Debian update process suggests to restart it after updating
> OpenSSL to a fixed version. Is it an overkill on their part? It
> might confuse admins.
>
>
> adam@proxy ~ $ ldd /usr/sbin/sshd
> linux-vdso.so.1 (0x00007fffb068e000)
> libwrap.so.0 => /lib64/libwrap.so.0 (0x00007f68db1e6000)
> libpam.so.0 => /lib64/libpam.so.0 (0x00007f68dafd8000)
> libcrypto.so.1.0.0 => /usr/lib64/libcrypto.so.1.0.0 (0x00007f68dabf5000)
> libutil.so.1 => /lib64/libutil.so.1 (0x00007f68da9f2000)
> libz.so.1 => /lib64/libz.so.1 (0x00007f68da7db000)
> libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00007f68da5a4000)
> libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f68da387000)
> libc.so.6 => /lib64/libc.so.6 (0x00007f68d9fd7000)
> libgcc_s.so.1 =>
> /usr/lib/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1 (0x00007f68d9dc0000)
> libdl.so.2 => /lib64/libdl.so.2 (0x00007f68d9bbc000)
> /lib64/ld-linux-x86-64.so.2 (0x00007f68db3f1000)
> adam@proxy ~ $ qfile /usr/lib64/libcrypto.so.1.0.0
> dev-libs/openssl (/usr/lib64/libcrypto.so.1.0.0)
> adam@proxy ~ $
>
> So OpenSSH clearly IS using OpenSSL, and you need to restart sshd after
> upgrading OpenSSL.
As far as I know, it doesn't use it for the communication itself, just
some key generations, so it shouldn't be affected by this bug. But I
guess better safe than sorry...
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 0:06 [gentoo-user] 'Heartbleed' bug Joseph
2014-04-10 0:13 ` Ralf
2014-04-10 0:32 ` Michael Orlitzky
@ 2014-04-10 10:42 ` Marc Joliet
2014-04-10 22:55 ` [gentoo-user] " walt
3 siblings, 0 replies; 18+ messages in thread
From: Marc Joliet @ 2014-04-10 10:42 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 533 bytes --]
Am Wed, 9 Apr 2014 18:06:35 -0600
schrieb Joseph <syscon780@gmail.com>:
> Is gentoo effected by this new 'Heartbleed' bug?
>
> "The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library...."
>
> http://heartbleed.com/
Just FYI: security issues such as this get announced on the gentoo-announce ML
("heartbleed" was announced on the 8th of April).
--
Marc Joliet
--
"People who think they know everything really annoy those of us who know we
don't" - Bjarne Stroustrup
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 836 bytes --]
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 10:52 ` Matthew Finkel
@ 2014-04-10 10:51 ` Nilesh Govindrajan
2014-04-10 11:00 ` Randolph Maaßen
2014-04-10 11:06 ` Neil Bothwick
1 sibling, 1 reply; 18+ messages in thread
From: Nilesh Govindrajan @ 2014-04-10 10:51 UTC (permalink / raw
To: Gentoo User Mailing List
On Thu, Apr 10, 2014 at 4:22 PM, Matthew Finkel
<matthew.finkel@gmail.com> wrote:
> On Thu, Apr 10, 2014 at 05:53:44PM +0800, J?n Zahornadsk? wrote:
>> On 04/10/2014 05:03 PM, Adam Carter wrote:
>> >
>> > What surprises me here is OpenSSH. It's not supposed to use OpenSSL
>> > but Debian update process suggests to restart it after updating
>> > OpenSSL to a fixed version. Is it an overkill on their part? It
>> > might confuse admins.
>> >
>> >
>> > adam@proxy ~ $ ldd /usr/sbin/sshd
>> > linux-vdso.so.1 (0x00007fffb068e000)
>> > libwrap.so.0 => /lib64/libwrap.so.0 (0x00007f68db1e6000)
>> > libpam.so.0 => /lib64/libpam.so.0 (0x00007f68dafd8000)
>> > libcrypto.so.1.0.0 => /usr/lib64/libcrypto.so.1.0.0 (0x00007f68dabf5000)
>> > libutil.so.1 => /lib64/libutil.so.1 (0x00007f68da9f2000)
>> > libz.so.1 => /lib64/libz.so.1 (0x00007f68da7db000)
>> > libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00007f68da5a4000)
>> > libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f68da387000)
>> > libc.so.6 => /lib64/libc.so.6 (0x00007f68d9fd7000)
>> > libgcc_s.so.1 =>
>> > /usr/lib/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1 (0x00007f68d9dc0000)
>> > libdl.so.2 => /lib64/libdl.so.2 (0x00007f68d9bbc000)
>> > /lib64/ld-linux-x86-64.so.2 (0x00007f68db3f1000)
>> > adam@proxy ~ $ qfile /usr/lib64/libcrypto.so.1.0.0
>> > dev-libs/openssl (/usr/lib64/libcrypto.so.1.0.0)
>> > adam@proxy ~ $
>> >
>> > So OpenSSH clearly IS using OpenSSL, and you need to restart sshd after
>> > upgrading OpenSSL.
>>
>> As far as I know, it doesn't use it for the communication itself, just
>> some key generations, so it shouldn't be affected by this bug. But I
>> guess better safe than sorry...
>>
>
> Right. heartbleed does not directly affect openssh, but openssh uses
> openssl and it's good practice to keep the shared libraries on-disk and
> the shared libraries in-memory in sync.
>
How is OpenSSH not affected?
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 9:53 ` Ján Zahornadský
@ 2014-04-10 10:52 ` Matthew Finkel
2014-04-10 10:51 ` Nilesh Govindrajan
2014-04-10 11:06 ` Neil Bothwick
0 siblings, 2 replies; 18+ messages in thread
From: Matthew Finkel @ 2014-04-10 10:52 UTC (permalink / raw
To: gentoo-user
On Thu, Apr 10, 2014 at 05:53:44PM +0800, J?n Zahornadsk? wrote:
> On 04/10/2014 05:03 PM, Adam Carter wrote:
> >
> > What surprises me here is OpenSSH. It's not supposed to use OpenSSL
> > but Debian update process suggests to restart it after updating
> > OpenSSL to a fixed version. Is it an overkill on their part? It
> > might confuse admins.
> >
> >
> > adam@proxy ~ $ ldd /usr/sbin/sshd
> > linux-vdso.so.1 (0x00007fffb068e000)
> > libwrap.so.0 => /lib64/libwrap.so.0 (0x00007f68db1e6000)
> > libpam.so.0 => /lib64/libpam.so.0 (0x00007f68dafd8000)
> > libcrypto.so.1.0.0 => /usr/lib64/libcrypto.so.1.0.0 (0x00007f68dabf5000)
> > libutil.so.1 => /lib64/libutil.so.1 (0x00007f68da9f2000)
> > libz.so.1 => /lib64/libz.so.1 (0x00007f68da7db000)
> > libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00007f68da5a4000)
> > libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f68da387000)
> > libc.so.6 => /lib64/libc.so.6 (0x00007f68d9fd7000)
> > libgcc_s.so.1 =>
> > /usr/lib/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1 (0x00007f68d9dc0000)
> > libdl.so.2 => /lib64/libdl.so.2 (0x00007f68d9bbc000)
> > /lib64/ld-linux-x86-64.so.2 (0x00007f68db3f1000)
> > adam@proxy ~ $ qfile /usr/lib64/libcrypto.so.1.0.0
> > dev-libs/openssl (/usr/lib64/libcrypto.so.1.0.0)
> > adam@proxy ~ $
> >
> > So OpenSSH clearly IS using OpenSSL, and you need to restart sshd after
> > upgrading OpenSSL.
>
> As far as I know, it doesn't use it for the communication itself, just
> some key generations, so it shouldn't be affected by this bug. But I
> guess better safe than sorry...
>
Right. heartbleed does not directly affect openssh, but openssh uses
openssl and it's good practice to keep the shared libraries on-disk and
the shared libraries in-memory in sync.
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 10:51 ` Nilesh Govindrajan
@ 2014-04-10 11:00 ` Randolph Maaßen
2014-04-10 11:06 ` Ján Zahornadský
0 siblings, 1 reply; 18+ messages in thread
From: Randolph Maaßen @ 2014-04-10 11:00 UTC (permalink / raw
To: gentoo-user
The Heartbleed bug is in the Heartbeat function of TSL (a second keep
alive). OpenSSL does not use TLS for transport security, it uses its
own Protokoll for security.
2014-04-10 12:51 GMT+02:00 Nilesh Govindrajan <me@nileshgr.com>:
> On Thu, Apr 10, 2014 at 4:22 PM, Matthew Finkel
> <matthew.finkel@gmail.com> wrote:
>> On Thu, Apr 10, 2014 at 05:53:44PM +0800, J?n Zahornadsk? wrote:
>>> On 04/10/2014 05:03 PM, Adam Carter wrote:
>>> >
>>> > What surprises me here is OpenSSH. It's not supposed to use OpenSSL
>>> > but Debian update process suggests to restart it after updating
>>> > OpenSSL to a fixed version. Is it an overkill on their part? It
>>> > might confuse admins.
>>> >
>>> >
>>> > adam@proxy ~ $ ldd /usr/sbin/sshd
>>> > linux-vdso.so.1 (0x00007fffb068e000)
>>> > libwrap.so.0 => /lib64/libwrap.so.0 (0x00007f68db1e6000)
>>> > libpam.so.0 => /lib64/libpam.so.0 (0x00007f68dafd8000)
>>> > libcrypto.so.1.0.0 => /usr/lib64/libcrypto.so.1.0.0 (0x00007f68dabf5000)
>>> > libutil.so.1 => /lib64/libutil.so.1 (0x00007f68da9f2000)
>>> > libz.so.1 => /lib64/libz.so.1 (0x00007f68da7db000)
>>> > libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00007f68da5a4000)
>>> > libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f68da387000)
>>> > libc.so.6 => /lib64/libc.so.6 (0x00007f68d9fd7000)
>>> > libgcc_s.so.1 =>
>>> > /usr/lib/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1 (0x00007f68d9dc0000)
>>> > libdl.so.2 => /lib64/libdl.so.2 (0x00007f68d9bbc000)
>>> > /lib64/ld-linux-x86-64.so.2 (0x00007f68db3f1000)
>>> > adam@proxy ~ $ qfile /usr/lib64/libcrypto.so.1.0.0
>>> > dev-libs/openssl (/usr/lib64/libcrypto.so.1.0.0)
>>> > adam@proxy ~ $
>>> >
>>> > So OpenSSH clearly IS using OpenSSL, and you need to restart sshd after
>>> > upgrading OpenSSL.
>>>
>>> As far as I know, it doesn't use it for the communication itself, just
>>> some key generations, so it shouldn't be affected by this bug. But I
>>> guess better safe than sorry...
>>>
>>
>> Right. heartbleed does not directly affect openssh, but openssh uses
>> openssl and it's good practice to keep the shared libraries on-disk and
>> the shared libraries in-memory in sync.
>>
>
>
> How is OpenSSH not affected?
>
--
Mit freundlichen Grüßen / Best regards
Randolph Maaßen
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 10:52 ` Matthew Finkel
2014-04-10 10:51 ` Nilesh Govindrajan
@ 2014-04-10 11:06 ` Neil Bothwick
1 sibling, 0 replies; 18+ messages in thread
From: Neil Bothwick @ 2014-04-10 11:06 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 378 bytes --]
On Thu, 10 Apr 2014 10:52:21 +0000, Matthew Finkel wrote:
> Right. heartbleed does not directly affect openssh, but openssh uses
> openssl and it's good practice to keep the shared libraries on-disk and
> the shared libraries in-memory in sync.
The easiest way to do that is with app-admin/checkrestart.
--
Neil Bothwick
Invertebrates make no bones about it.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] 'Heartbleed' bug
2014-04-10 11:00 ` Randolph Maaßen
@ 2014-04-10 11:06 ` Ján Zahornadský
0 siblings, 0 replies; 18+ messages in thread
From: Ján Zahornadský @ 2014-04-10 11:06 UTC (permalink / raw
To: gentoo-user
Exactly, OpenSSH depends on OpenSSL, but should never use the buggy code.
Some details in the answer here:
http://superuser.com/questions/739349/does-heartbleed-affect-ssh-keys
On 04/10/2014 07:00 PM, Randolph Maaßen wrote:
> The Heartbleed bug is in the Heartbeat function of TSL (a second keep
> alive). OpenSSL does not use TLS for transport security, it uses its
> own Protokoll for security.
>
> 2014-04-10 12:51 GMT+02:00 Nilesh Govindrajan <me@nileshgr.com>:
>> On Thu, Apr 10, 2014 at 4:22 PM, Matthew Finkel
>> <matthew.finkel@gmail.com> wrote:
>>> On Thu, Apr 10, 2014 at 05:53:44PM +0800, J?n Zahornadsk? wrote:
>>>> On 04/10/2014 05:03 PM, Adam Carter wrote:
>>>>>
>>>>> What surprises me here is OpenSSH. It's not supposed to use OpenSSL
>>>>> but Debian update process suggests to restart it after updating
>>>>> OpenSSL to a fixed version. Is it an overkill on their part? It
>>>>> might confuse admins.
>>>>>
>>>>>
>>>>> adam@proxy ~ $ ldd /usr/sbin/sshd
>>>>> linux-vdso.so.1 (0x00007fffb068e000)
>>>>> libwrap.so.0 => /lib64/libwrap.so.0 (0x00007f68db1e6000)
>>>>> libpam.so.0 => /lib64/libpam.so.0 (0x00007f68dafd8000)
>>>>> libcrypto.so.1.0.0 => /usr/lib64/libcrypto.so.1.0.0 (0x00007f68dabf5000)
>>>>> libutil.so.1 => /lib64/libutil.so.1 (0x00007f68da9f2000)
>>>>> libz.so.1 => /lib64/libz.so.1 (0x00007f68da7db000)
>>>>> libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00007f68da5a4000)
>>>>> libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f68da387000)
>>>>> libc.so.6 => /lib64/libc.so.6 (0x00007f68d9fd7000)
>>>>> libgcc_s.so.1 =>
>>>>> /usr/lib/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1 (0x00007f68d9dc0000)
>>>>> libdl.so.2 => /lib64/libdl.so.2 (0x00007f68d9bbc000)
>>>>> /lib64/ld-linux-x86-64.so.2 (0x00007f68db3f1000)
>>>>> adam@proxy ~ $ qfile /usr/lib64/libcrypto.so.1.0.0
>>>>> dev-libs/openssl (/usr/lib64/libcrypto.so.1.0.0)
>>>>> adam@proxy ~ $
>>>>>
>>>>> So OpenSSH clearly IS using OpenSSL, and you need to restart sshd after
>>>>> upgrading OpenSSL.
>>>>
>>>> As far as I know, it doesn't use it for the communication itself, just
>>>> some key generations, so it shouldn't be affected by this bug. But I
>>>> guess better safe than sorry...
>>>>
>>>
>>> Right. heartbleed does not directly affect openssh, but openssh uses
>>> openssl and it's good practice to keep the shared libraries on-disk and
>>> the shared libraries in-memory in sync.
>>>
>>
>>
>> How is OpenSSH not affected?
>>
>
>
>
^ permalink raw reply [flat|nested] 18+ messages in thread
* [gentoo-user] Re: 'Heartbleed' bug
2014-04-10 0:06 [gentoo-user] 'Heartbleed' bug Joseph
` (2 preceding siblings ...)
2014-04-10 10:42 ` Marc Joliet
@ 2014-04-10 22:55 ` walt
2014-04-10 22:59 ` Alan McKinnon
` (3 more replies)
3 siblings, 4 replies; 18+ messages in thread
From: walt @ 2014-04-10 22:55 UTC (permalink / raw
To: gentoo-user
On 04/09/2014 05:06 PM, Joseph wrote:
> Is gentoo effected by this new 'Heartbleed' bug?
>
> "The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library...."
>
> http://heartbleed.com/
This topic was discussed in my favorite podcast, http://twit.tv/sn
Steve Gibson explained that the heartbeat feature was introduced in openssl to
allow *UDP* connections to mimic the 'keepalive' function of the TCP protocol.
IIRC Steve didn't explain how UDP bugs can compromise TCP connections.
Anyone here really understand the underlying principles? If so, please explain!
Thanks.
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] Re: 'Heartbleed' bug
2014-04-10 22:55 ` [gentoo-user] " walt
@ 2014-04-10 22:59 ` Alan McKinnon
2014-04-10 23:38 ` Chris Walters
2014-04-10 23:37 ` Matthew Finkel
` (2 subsequent siblings)
3 siblings, 1 reply; 18+ messages in thread
From: Alan McKinnon @ 2014-04-10 22:59 UTC (permalink / raw
To: gentoo-user
On 11/04/2014 00:55, walt wrote:
> On 04/09/2014 05:06 PM, Joseph wrote:
>> Is gentoo effected by this new 'Heartbleed' bug?
>>
>> "The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library...."
>>
>> http://heartbleed.com/
>
> This topic was discussed in my favorite podcast, http://twit.tv/sn
>
> Steve Gibson explained that the heartbeat feature was introduced in openssl to
> allow *UDP* connections to mimic the 'keepalive' function of the TCP protocol.
>
> IIRC Steve didn't explain how UDP bugs can compromise TCP connections.
>
> Anyone here really understand the underlying principles? If so, please explain!
>
> Thanks.
>
>
>
>
>
UDP is not compromising TCP connections.
The software bug allows malicious connecting code to determine the
contents of memory, which is in use by sshd. How that memory got to be
there is irrelevant.
There are many lengthy discussions on the internet on how this vuln
works. You should read them.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] Re: 'Heartbleed' bug
2014-04-10 22:55 ` [gentoo-user] " walt
2014-04-10 22:59 ` Alan McKinnon
@ 2014-04-10 23:37 ` Matthew Finkel
2014-04-10 23:42 ` Ralf
2014-04-11 8:05 ` Philip Webb
3 siblings, 0 replies; 18+ messages in thread
From: Matthew Finkel @ 2014-04-10 23:37 UTC (permalink / raw
To: gentoo-user
On Thu, Apr 10, 2014 at 03:55:47PM -0700, walt wrote:
> On 04/09/2014 05:06 PM, Joseph wrote:
> > Is gentoo effected by this new 'Heartbleed' bug?
> >
> > "The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library...."
> >
> > http://heartbleed.com/
>
> This topic was discussed in my favorite podcast, http://twit.tv/sn
>
> Steve Gibson explained that the heartbeat feature was introduced in openssl to
> allow *UDP* connections to mimic the 'keepalive' function of the TCP protocol.
>
> IIRC Steve didn't explain how UDP bugs can compromise TCP connections.
>
> Anyone here really understand the underlying principles? If so, please explain!
>
> Thanks.
Yes, but no, actually. It's main use is in DTLS, over UDP and similar
protocols, however it is also supported in TLS (over TCP). From the RFC
[0]:
DTLS is designed to secure traffic running on top of unreliable
transport protocols. Usually, such protocols have no session
management. The only mechanism available at the DTLS layer to figure
out if a peer is still alive is a costly renegotiation, particularly
when the application uses unidirectional traffic[...]
TLS is based on reliable protocols, but there is not necessarily a
feature available to keep the connection alive without continuous
data transfer.
The Heartbeat Extension as described in this document overcomes these
limitations.
So the heartbeat in [D]TLS, as implemented in OpenSSL, is
standard-compliant. It's more useful in datagram communication (i.e. UDP,
connectionless) but it is available for connection-oriented protocols
(i.e. TCP), as well. It was the TLS heartbeat-implementation that
suffered from this vulnerability. You can see the patch-fix here[1], if
you're interested.
[0] https://tools.ietf.org/html/rfc6520
[1]
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] Re: 'Heartbleed' bug
2014-04-10 22:59 ` Alan McKinnon
@ 2014-04-10 23:38 ` Chris Walters
0 siblings, 0 replies; 18+ messages in thread
From: Chris Walters @ 2014-04-10 23:38 UTC (permalink / raw
To: gentoo-user
On 4/10/2014 6:59 PM, Alan McKinnon wrote:
>> Steve Gibson explained that the heartbeat feature was introduced in openssl to
>> allow *UDP* connections to mimic the 'keepalive' function of the TCP protocol.
>>
>> IIRC Steve didn't explain how UDP bugs can compromise TCP connections.
>>
>> Anyone here really understand the underlying principles? If so, please explain!
>>
>> Thanks.
>
> UDP is not compromising TCP connections.
> The software bug allows malicious connecting code to determine the
> contents of memory, which is in use by sshd. How that memory got to be
> there is irrelevant.
>
> There are many lengthy discussions on the internet on how this vuln
> works. You should read them.
While there may be many OpenSSL experts on this list, I believe that the BEST
source of information on this bug, how it works, what it does, and so forth
would be the OpenSSL mailing lists. The official Heartbleed web page has some
information on it that is a good beginning for researching this bug, the the
lists I mentioned above are probably the best source of information, after you
understand the basics from the web page.
Chris Walters
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] Re: 'Heartbleed' bug
2014-04-10 22:55 ` [gentoo-user] " walt
2014-04-10 22:59 ` Alan McKinnon
2014-04-10 23:37 ` Matthew Finkel
@ 2014-04-10 23:42 ` Ralf
2014-04-11 8:05 ` Philip Webb
3 siblings, 0 replies; 18+ messages in thread
From: Ralf @ 2014-04-10 23:42 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 879 bytes --]
Hi,
On 04/11/2014 12:55 AM, walt wrote:
> Steve Gibson explained that the heartbeat feature was introduced in openssl to
> allow *UDP* connections to mimic the 'keepalive' function of the TCP protocol.
>
> IIRC Steve didn't explain how UDP bugs can compromise TCP connections.
>
> Anyone here really understand the underlying principles? If so, please explain!
yes, a TCP connection is stateful, so imho heartbeat is not necessary.
But you don't always speak "UDP" or "TCP".
Imagine some sort of direct connection without any type of
transportation layer.
As a generic cryptographic library, OpenSSL is designed to be adaptable
and universal. That broke OpenSSL's neck.
We only can hope, that the heartbeat exploit was not widely used before
they published that zero-day.
But we can be sure, that this is not going to be the last vulnerability
of this kind.
Regards
Ralf
[-- Attachment #2: Type: text/html, Size: 1416 bytes --]
^ permalink raw reply [flat|nested] 18+ messages in thread
* Re: [gentoo-user] Re: 'Heartbleed' bug
2014-04-10 22:55 ` [gentoo-user] " walt
` (2 preceding siblings ...)
2014-04-10 23:42 ` Ralf
@ 2014-04-11 8:05 ` Philip Webb
3 siblings, 0 replies; 18+ messages in thread
From: Philip Webb @ 2014-04-11 8:05 UTC (permalink / raw
To: gentoo-user
140410 walt wrote:
> Anyone here really understand the underlying principles?
There's an excellent description of the bug + the fix here :
http://blog.cryptographyengineering.com/2014/04/attack-of-week-openssl-heartbleed.html
--
========================,,============================================
SUPPORT ___________//___, Philip Webb
ELECTRIC /] [] [] [] [] []| Cities Centre, University of Toronto
TRANSIT `-O----------O---' purslowatchassdotutorontodotca
^ permalink raw reply [flat|nested] 18+ messages in thread
end of thread, other threads:[~2014-04-11 8:05 UTC | newest]
Thread overview: 18+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-04-10 0:06 [gentoo-user] 'Heartbleed' bug Joseph
2014-04-10 0:13 ` Ralf
2014-04-10 0:32 ` Michael Orlitzky
2014-04-10 5:48 ` Pavel Volkov
2014-04-10 9:03 ` Adam Carter
2014-04-10 9:53 ` Ján Zahornadský
2014-04-10 10:52 ` Matthew Finkel
2014-04-10 10:51 ` Nilesh Govindrajan
2014-04-10 11:00 ` Randolph Maaßen
2014-04-10 11:06 ` Ján Zahornadský
2014-04-10 11:06 ` Neil Bothwick
2014-04-10 10:42 ` Marc Joliet
2014-04-10 22:55 ` [gentoo-user] " walt
2014-04-10 22:59 ` Alan McKinnon
2014-04-10 23:38 ` Chris Walters
2014-04-10 23:37 ` Matthew Finkel
2014-04-10 23:42 ` Ralf
2014-04-11 8:05 ` Philip Webb
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox