PDA

View Full Version : Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping



Serpo
8th April 2014, 03:28 PM
Risk Assessment / Security & Hacktivism (http://arstechnica.com/security/) Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping Exploits allow attackers to obtain private keys used to decrypt sensitive data. by Dan Goodin (http://arstechnica.com/author/dan-goodin/) - Apr 8 2014, 10:10am AUSEST



http://cdn.arstechnica.net/wp-content/uploads/2014/04/ssl-eavesdropping.jpg Aurich Lawson / Thinkstock
For a more detailed analysis of this catastrophic bug, see this update (http://arstechnica.com/security/2014/04/critical-crypto-bug-exposes-yahoo-mail-passwords-russian-roulette-style/), which went live about 18 hours after Ars published this initial post.
Researchers have discovered an extremely critical defect in the cryptographic software library an estimated two-thirds of Web servers use to identify themselves to end users and prevent the eavesdropping of passwords, banking credentials, and other sensitive data.
The warning about the bug in OpenSSL coincided with the release of version 1.0.1g of the open-source program (https://www.openssl.org/source/openssl-1.0.1g.tar.gz.asc), which is the default cryptographic library used in the Apache and nginx Web server applications, as well as a wide variety of operating systems and e-mail and instant-messaging clients. The bug, which has resided in production versions of OpenSSL for more than two years, could make it possible for people to recover the private encryption key at the heart of the digital certificates used to authenticate Internet servers and to encrypt data traveling between them and end users. Attacks leave no traces in server logs, so there's no way of knowing if the bug has been actively exploited. Still, the risk is extraordinary, given the ability to disclose keys, passwords, and other credentials that could be used in future compromises.
"Bugs in single software or library come and go and are fixed by new versions," the researchers who discovered the vulnerability wrote in a blog post published Monday (http://heartbleed.com/). "However this bug has left a large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitations and attacks leaving no trace this exposure should be taken seriously."
The researchers, who work at Google and software security firm Codenomicon, said even after vulnerable websites install the OpenSSL patch, they may still remain vulnerable to attacks. The risk stems from the possibility that attackers already exploited the vulnerability to recover the private key of the digital certificate, passwords used to administer the sites, or authentication cookies and similar credentials used to validate users to restricted parts of a website. Fully recovering from the two-year-long vulnerability may also require revoking any exposed keys, reissuing new keys, and invalidating all session keys and session cookies. Members of the Tor anonymity project have a brief write-up of the bug here (https://blog.torproject.org/blog/openssl-bug-cve-2014-0160), and a this analysis (http://blog.existentialize.com/diagnosis-of-the-openssl-heartbleed-bug.html) provides useful technical details.
OpenSSL is by far the Internet's most popular open-source cryptographic library and TLS implementation. It is the default encryption engine for Apache, nginx, which according to Netcraft runs 66 percent of websites (http://news.netcraft.com/archives/2014/04/02/april-2014-web-server-survey.html). OpenSSL also ships in a wide variety of operating systems and applications, including the Debian Wheezy, Ubuntu, CENTOS, Fedora, OpenBSD, FreeBSD, and OpenSUSE distributions of Linux. The missing bounds check (https://www.openssl.org/news/secadv_20140407.txt) in the handling of the Transport Layer Security (TLS) heartbeat extension affects OpenSSL 1.0.1 through 1.0.1f.
The bug, which is officially referenced as CVE-2014-0160, makes it possible for attackers to recover up to 64 kilobytes of memory from the server or client computer running a vulnerable OpenSSL version. Nick Sullivan, a systems engineer at CloudFlare, a content delivery network that patched the OpenSSL vulnerability last week (http://blog.cloudflare.com/staying-ahead-of-openssl-vulnerabilities), said his company is still evaluating the likelihood that private keys appeared in memory and were recovered by attackers who knew how to exploit the flaw before the disclosure. Based on the results of the assessment, the company may decide to replace its underlying TLS certificate or take other actions, he said.
Attacking from the outside The researchers who discovered the vulnerability, however, were less optimistic about the risks, saying the bug makes it possible for attackers to surreptitiously bypass virtually all TLS protections and to retrieve sensitive data residing in the memory of computers or servers running OpenSSL-powered software.
"We attacked ourselves from outside, without leaving a trace," they wrote. "Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication."
They called on white-hat hackers to set up "honeypots" of vulnerable TLS servers designed to entrap attackers in an attempt to see if the bug is being actively exploited in the wild. The researchers have dubbed the vulnerability Heartbleed because the underlying bug resides in the OpenSSL implementation of the TLS heartbeat extension as described in RFC 6520 (http://tools.ietf.org/html/rfc6520) of the Internet Engineering Task Force.
The OpenSSL vulnerability is the latest to threaten the HTTPS scheme that's the default and often only method for cryptographically protecting websites, e-mail, an other Internet communications from attacks that allow hackers to eavesdrop on end users or impersonate trusted websites. Last month, developers of the GnuTLS library disclosed an equally catastrophic bug that left hundreds of open-source applications open to similar attacks (http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/). And in February, Apple fixed an extremely critical vulnerability in the iOS and OS X operating systems (http://arstechnica.com/security/2014/02/new-ios-flaw-makes-devices-susceptible-to-covert-keylogging-researchers-say/) that also made it possible for hackers to bypass HTTPS protections.


http://arstechnica.com/security/2014/04/critical-crypto-bug-in-openssl-opens-two-thirds-of-the-web-to-eavesdropping/

Glass
8th April 2014, 05:31 PM
wow this is extremely serious. The internet has been compromised and the certification authorities are compromised well so as things stand at the moment there is mode of recovery from this that can be relied upon.

There is an exchange of comments on the more detailed link provided that explains the problem. The CA organisations cannot be used to obtain new certificates for patched servers.

At this time, people could do a lot of work patching and changing use credentials but there is no fix on that path as the CA's are compromised.

Serpo
8th April 2014, 11:43 PM
http://www.sitepronews.com/wp-content/themes/2013-sitepronews/images/currents.png (http://www.sitepronews.com/cgi-bin/ct.cgi?ad=7049)

April 8, 2014 Heart Bleed Bug Could Compromise Large Part of the Internet (http://www.sitepronews.com/2014/04/08/heart-bleed-bug-compromise-large-part-internet/) By Jennifer Cowan (http://www.sitepronews.com/author/jcowan/) in Breaking News (http://www.sitepronews.com/category/articles/breaking-news-articles/) Technology (http://www.sitepronews.com/category/articles/technology/)
http://www.sitepronews.com/wp-content/uploads/2014/04/security.jpg

There is a major flaw in the security of the World Wide Web — one that has even Internet security firms feeling a little panicked.
A massive vulnerability has been found in OpenSSL, the open-source software package broadly used to encrypt Web communications. The flaw allows attackers to steal the information that is normally protected by SSL/TLS encryption, which is used to protect Web applications, e-mail communications, instant messaging (IM) and some virtual private networks (VPNs).
Essentially, that means a lot of Internet users are affected. And potentially, passwords, private communications and even credit card information could be available to hackers courtesy of this newly-discovered bug.
http://www.sitepronews.com/wp-content/uploads/2014/04/heartbleed.png (http://www.sitepronews.com/wp-content/uploads/2014/04/heartbleed.png)Dubbed the Heart Bleed Bug, the flaw was jointly discovered by a team of security engineers at Codenomicon (http://www.codenomicon.com/) and Neel Mehta of Google Security.
“The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software,” reads a Web page (http://heartbleed.com/) devoted to explaining the massive bug.
“This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users.”
The security researches added that they tested their own services to see how bad the flaw is — and it is BAD.
“We attacked ourselves from outside, without leaving a trace,” the post reads (http://heartbleed.com/). “Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, e-mails and business critical documents and communication.”
The security experts say the Internet will remain vulnerable as long as the flawed version of OpenSSL is in use. Although Fixed OpenSSL (https://www.openssl.org/news/secadv_20140407.txt) has been released, it must be deployed.
“Operating system vendors and distribution, appliance vendors, independent software vendors have to adopt the fix and notify their users,” the post says. “Service providers and users have to install the fix as it becomes available for the operating systems, networked appliances and software they use.”
The following is an excerpt from the website’s Q&A on the Heart Bleed Bug and how it affects the average user:
Q: Am I affected by the bug?
A: You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet. Your popular social site, your company’s site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL. Many of online services use TLS to both to identify themselves to you and to protect your privacy and transactions. You might have networked appliances with logins secured by this buggy implementation of the TLS. Furthermore you might have client side software on your computer that could expose the data from your computer if you connect to compromised services.
Q: Can I detect if someone has exploited this against me? A: Exploitation of this bug leaves no traces of anything abnormal happening to the logs.
Q: Is there a bright side to all this? A: For those service providers who are affected this is a good opportunity to upgrade security strength of the secret keys used. A lot of software gets updates which otherwise would have not been urgent. Although this is painful for the security community, we can rest assured that infrastructure of the cyber criminals and their secrets have been exposed as well.

http://www.sitepronews.com/2014/04/08/heart-bleed-bug-compromise-large-part-internet/

vacuum
9th April 2014, 12:09 AM
I think this bug has been there for about 2 years...

Glass
9th April 2014, 01:27 AM
this could be just a move to get everyone to move into a new certificate model that incorporates a .Gov back door?

Horn
9th April 2014, 08:47 AM
this could be just a move to get everyone to move into a new certificate model that incorporates a .Gov back door?

It might be worse if it was the .gov backdoor that was discovered.

steyr_m
9th April 2014, 01:02 PM
Well that's better than what we have now at GSUS. At least it will be patched. If using wireless, our username/passwords will be transmitted in the clear, and easily sniffed.

I thought after the NSA debacle, I thought we might migrate to HTTPS. Guess not...