[ale] OpenSSL Broken, Upgrade Now

Lightner, Jeff JLightner at dsservices.com
Thu Apr 17 14:38:01 EDT 2014


By the way CLIENTS as well as SERVERS are affected.   That means if you have openssl on a server where you run “curl” or “wget” or other outbound utilities they are vulnerable.

From the curl site:
“Heartbleed is a flaw in OpenSSL in a certain version span. Clients are *also*
vulnerable to this flaw, which means that if you run curl or libcurl with a
vulnerable OpenSSL version a rogue server can read client memory.”

From: ale-bounces at ale.org [mailto:ale-bounces at ale.org] On Behalf Of Lightner, Jeff
Sent: Thursday, April 17, 2014 1:37 PM
To: Atlanta Linux Enthusiasts
Subject: Re: [ale] OpenSSL Broken, Upgrade Now

I think it is a bad idea to NOT do the update if you have the vulnerable version of openssl installed.   Assuming you’re ok because you’re only using ssh will be a bad idea.   You may someday start https for some reason (or may even already have it running with say RedHat or Apache’s default page).   Also openssl might be included in 3rd party tools you’re using or even in a specialized pam module.

Of course it does make sense to prioritize – SSL web servers on the internet first, then any other internet facing systems, then internal systems.


From: ale-bounces at ale.org [mailto:ale-bounces at ale.org] On Behalf Of Jim Kinney
Sent: Thursday, April 17, 2014 10:17 AM
To: Atlanta Linux Enthusiasts
Subject: Re: [ale] OpenSSL Broken, Upgrade Now



On Thu, Apr 17, 2014 at 12:56 AM, David Tomaschik <david at systemoverlord.com<mailto:david at systemoverlord.com>> wrote:
On Wed, Apr 16, 2014 at 5:36 AM, Jim Kinney <jim.kinney at gmail.com<mailto:jim.kinney at gmail.com>> wrote:
If I run ssh -v user at host  I see:

OpenSSH_6.4, OpenSSL 1.0.1e-fips 11 Feb 2013
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 51: Applying options for *
...
So is OpenSSH _using_ OpenSSL for encryption processes?

Yes, but OpenSSH is not vulnerable to Heartbleed.

OpenSSH uses OpenSSL for cryptographic primatives, but OpenSSH does not use TLS.  Heartbleed is a vulnerability in the TLS implementation within OpenSSL; specifically, an error in processing incoming TLS messages.  Since OpenSSH doesn't use TLS, it doesn't process TLS messages, so there's no risk from Heartbleed.


Thanks! So ssh uses it's own heartbeat function and not the one in OpenSSL which has the massive leak.

On Tue, Apr 15, 2014 at 1:07 PM, Jim Kinney <jim.kinney at gmail.com<mailto:jim.kinney at gmail.com>> wrote:
Heartbleed bug also affects android phones with Jelly Bean version

http://www.theguardian.com/technology/2014/apr/15/heartbleed-android-phones-vulnerable-data-shows

On Mon, Apr 7, 2014 at 7:14 PM, David Tomaschik <david at systemoverlord.com<mailto:david at systemoverlord.com>> wrote:
TL;DR: Upgrade OpenSSL to >= 1.0.1g immediately, consider replacing keys.  Not as bad as Debian OpenSSL bug, but worse than "goto fail;".

"The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users."

http://heartbleed.com

--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
david at systemoverlord.com<mailto:david at systemoverlord.com>





_______________________________________________
Ale mailing list
Ale at ale.org<mailto:Ale at ale.org>
http://mail.ale.org/mailman/listinfo/ale
See JOBS, ANNOUNCE and SCHOOLS lists at
http://mail.ale.org/mailman/listinfo



--
--
James P. Kinney III

Every time you stop a school, you will have to build a jail. What you gain at one end you lose at the other. It's like feeding a dog on his own tail. It won't fatten the dog.
- Speech 11/23/1900 Mark Twain

http://heretothereideas.blogspot.com/



--
--
James P. Kinney III

Every time you stop a school, you will have to build a jail. What you gain at one end you lose at the other. It's like feeding a dog on his own tail. It won't fatten the dog.
- Speech 11/23/1900 Mark Twain

http://heretothereideas.blogspot.com/

_______________________________________________
Ale mailing list
Ale at ale.org<mailto:Ale at ale.org>
http://mail.ale.org/mailman/listinfo/ale
See JOBS, ANNOUNCE and SCHOOLS lists at
http://mail.ale.org/mailman/listinfo



--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
david at systemoverlord.com<mailto:david at systemoverlord.com>

_______________________________________________
Ale mailing list
Ale at ale.org<mailto:Ale at ale.org>
http://mail.ale.org/mailman/listinfo/ale
See JOBS, ANNOUNCE and SCHOOLS lists at
http://mail.ale.org/mailman/listinfo



--
--
James P. Kinney III

Every time you stop a school, you will have to build a jail. What you gain at one end you lose at the other. It's like feeding a dog on his own tail. It won't fatten the dog.
- Speech 11/23/1900 Mark Twain

http://heretothereideas.blogspot.com/





Athena®, Created for the Cause™

Making a Difference in the Fight Against Breast Cancer





---------------------------------
CONFIDENTIALITY NOTICE: This e-mail may contain privileged or confidential information and is for the sole use of the intended recipient(s). If you are not the intended recipient, any disclosure, copying, distribution, or use of the contents of this information is prohibited and may be unlawful. If you have received this electronic transmission in error, please reply immediately to the sender that you have received the message in error, and delete it. Thank you.
----------------------------------


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20140417/8f8dfe76/attachment-0001.html>


More information about the Ale mailing list