TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSSL Security Advisory: TLS heartbeat read overrun

297 pointsby moonbootsabout 11 years ago

21 comments

tptacekabout 11 years ago
Ugh, that's a horrible vulnerability. We found something similar in nginx a few years ago, and the result is that you can repeatedly open up client connections and dump server memory as it changes, revealing keys and, without any real effort, authentication info and cookies.
评论 #7550723 未加载
dmixabout 11 years ago
I had to google what &quot;heartbeat extension&quot; does:<p><pre><code> DTLS is designed to secure traffic running on top of unreliable transport protocols. Usually such protocols have no session management. The only mechanism available at the DTLS layer to figure out if a peer is still alive is performing a costly renegotiation. If the application uses unidirectional traffic there is no other way. TLS is based on reliable protocols but there is not necessarily a feature available to keep the connection alive without continuous data transfer. The Heartbeat Extension as described in this document overcomes these limitations. The user can use the new HeartbeatRequest message which has to be answered by the peer with a HeartbeartResponse immediately. </code></pre> <a href="https://tools.ietf.org/html/draft-ietf-tls-dtls-heartbeat-01" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-ietf-tls-dtls-heartbeat-01</a><p>Edit: here is the commit patching the bug <a href="https://github.com/openssl/openssl/commit/7e840163c06c7692b796a93e3fa85a93136adbb2" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;commit&#x2F;7e840163c06c7692b7...</a>
nlyabout 11 years ago
&quot;Don&#x27;t roll your own parsers&quot; should really be up there with &quot;Don&#x27;t roll your own crypto&quot;. This advisory is scant on details, but this extension protocol[0] neither looks complex nor beyond mechanical code generation to me. Just simple enough to be dangerous. And it&#x27;s pretty new, so this must be recently authored vulnerable code.<p>[0] <a href="http://tools.ietf.org/html/draft-ietf-tls-dtls-heartbeat-04" rel="nofollow">http:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-ietf-tls-dtls-heartbeat-04</a>
评论 #7549424 未加载
评论 #7549829 未加载
评论 #7553355 未加载
评论 #7551803 未加载
评论 #7549083 未加载
gryabout 11 years ago
&quot;Heartbleed Bug&quot; Q&amp;A: <a href="http://heartbleed.com/" rel="nofollow">http:&#x2F;&#x2F;heartbleed.com&#x2F;</a>
评论 #7549852 未加载
Silhouetteabout 11 years ago
Ouch. Does this mean almost every Debian 7 web server out there is probably vulnerable to having its private data for supporting HTTPS compromised?<p><a href="https://security-tracker.debian.org/tracker/CVE-2014-0160" rel="nofollow">https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2014-0160</a><p>If so, that must be an awful lot of web servers, with a horrendous cost for everyone to buy new certificates etc. if there&#x27;s no reliable way to determine what if anything was compromised.<p>Would any of our resident security experts like to suggest best practices under such circumstances?<p>(Edit: It looks like the page I linked above has been updated and a patch is going into Wheezy security as I write this.)<p>(Edit 2: Confirmed that Wheezy security updates now include openssl 1.0.1e-2+deb7u5 and related libssl changes.)
评论 #7549547 未加载
cpercivaabout 11 years ago
In case anyone was wondering why I wrote spiped...
评论 #7549343 未加载
评论 #7549812 未加载
评论 #7550091 未加载
评论 #7550610 未加载
tlrobinsonabout 11 years ago
Apparent introduction of the bug: <a href="https://github.com/openssl/openssl/commit/bd6941cfaa31ee8a3f8661cb98227a5cbcc0f9f3" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;commit&#x2F;bd6941cfaa31ee8a3f...</a>
mappuabout 11 years ago
So they managed to notify Cloudflare in advance, but not debian&#x2F;ubuntu security teams?
评论 #7549859 未加载
redbeard0x0aabout 11 years ago
Unfortunately, if you have been using an AWS ELB to terminate SSL traffic, they are vulnerable to this particular exploit. See this forum post: <a href="https://forums.aws.amazon.com/thread.jspa?threadID=149690" rel="nofollow">https:&#x2F;&#x2F;forums.aws.amazon.com&#x2F;thread.jspa?threadID=149690</a>
jvehentabout 11 years ago
Check for the extension:<p><pre><code> $ echo -e &quot;quit\n&quot; | openssl s_client -connect google.com:443 -tlsextdebug 2&gt;&amp;1| grep &#x27;TLS server extension &quot;heartbeat&quot; (id=15), len=1&#x27; TLS server extension &quot;heartbeat&quot; (id=15), len=1 </code></pre> This doesn&#x27;t tell you that the server uses OpenSSL, or that it is vulnerable, simply that it supports the extension.
评论 #7549626 未加载
评论 #7549496 未加载
评论 #7551886 未加载
grittygreaseabout 11 years ago
If your site is protected by CloudFlare (like HN is), you are automatically protected from this vulnerability (see: <a href="http://blog.cloudflare.com/staying-ahead-of-openssl-vulnerabilities" rel="nofollow">http:&#x2F;&#x2F;blog.cloudflare.com&#x2F;staying-ahead-of-openssl-vulnerab...</a>).
评论 #7550278 未加载
评论 #7549706 未加载
评论 #7549879 未加载
michhabout 11 years ago
An Ubuntu update would be nice right about now. Outside of disabling everything that uses openssl or compiling a new one manually, there&#x27;s not much I can do to secure my servers at this moment. Meanwhile, I&#x27;m guessing a lot of not so nice people are racing to scan IP ranges for this bug.
评论 #7550116 未加载
评论 #7550107 未加载
评论 #7550287 未加载
0x0about 11 years ago
Are Android or iOS affected? Android seems to ship openssl 1.0.<p>Could a malicious server attack clients? Perhaps expose a browser&#x27;s cookie jar or other saved passwords in memory?<p>The number of installed openssl clients across all devices and computers must be quite large.
评论 #7552936 未加载
评论 #7550519 未加载
评论 #7550601 未加载
zrailabout 11 years ago
How does one go about installing this update on Ubuntu? &quot;sudo apt-get upgrade openssl&quot; didn&#x27;t do it.
评论 #7550055 未加载
评论 #7549388 未加载
评论 #7552638 未加载
ceejayozabout 11 years ago
Is this something I have to worry about as someone who uses AWS ELB SSL offloading? Hard to tell from the docs.
评论 #7550783 未加载
anaphorabout 11 years ago
If one were using ASLR would this have mostly mitigated this? (I just rebuilt without the heartbeat extension but I&#x27;m curious). Also how exploitable is this?
评论 #7551196 未加载
评论 #7552342 未加载
FiloSottileabout 11 years ago
It should really be possible to easily detect what functionalities your deploy of OpenSSL is using and recompile only those.
acqqabout 11 years ago
Anybody knows if the bug can be triggered in OpenSSH (I believe it uses the same lib?)
评论 #7551920 未加载
zurnabout 11 years ago
Go C!<p>Hope everyone had forward secrecy on by now.
ctzabout 11 years ago
I wonder how many service providers with big OpenSSL deployments (cloudflare, google, facebook, etc.) will do the sane thing and roll their authenticity keys. I&#x27;m guessing zero.<p>(Assuming they are deployed in such a way that their long-term authenticity keys are in the memory space of the network service, and not kept on another system or HSM.)
midas007about 11 years ago
If you&#x27;d like to update the keg-only OpenSSL brew on osx, and dont care for legacy and crap:<p><pre><code> ( export CONFIGURE_OPTS=&#x27;no-hw no-rdrand \ no-sctp no-md4 no-mdc2 no-rc4 no-fips no-engine&#x27;; \ brew install https:&#x2F;&#x2F;gist.github.com&#x2F;steakknife&#x2F;8228264&#x2F;raw&#x2F;openssl.rb ) </code></pre> Beware, that by default on osx&#x2F;ios, pretty much everything links to sketchy CommonCrypto or a crusty, quasi-deprecated 0.9.8.
评论 #7553158 未加载