$quoted_author = "Rick Welykochy" ;
> 
> The Heartbleed Bug has been plaguing Apache and nginx web servers
> for a couple of years.

Actually, the bug was in OpenSSL so those web servers may just be the
highest profile, but not the only, software affected...

 
> The press has gone wild with announcements today. From what I have read
> there is no evidence that the bug has been exploited in the wild. But 
> attacking
> communication system that have this bug leaves no trace in logs, i.e. attacks
> are undetectable.
 
It's trivial to exploit and undetectable without a network level packet capture.

Who or what was exploited is one of those "known unknowns" so everyone
should just follow the recommended course of actions:

- patch the software
- regenerate new keys
- create new certificates and revoke the old ones
- revoke existing access tokens, session cookies etc.etc
- trigger password resets

This may seem like overkill but it's realistically the only way to restore a
semblance of security and is not overly onerous given the alternative
possibilities.


> Detecting the bug on web services you use:
> 
> https://www.ssllabs.com/ssltest/analyze.html

The only issue I have with this is it only checks the *current* status of
the bug itself. It should also be checking the issue date of the certificate
and warning that if it was not generated recently with a new key *and* the
server was previously vulnerable then the server may still be at risk due to
any previously retrieved key material or access tokens.

cheers
Marty
_______________________________________________
Link mailing list
Link@mailman.anu.edu.au
http://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to