test content
What is the Arc Client?
Install Arc

Should we all be worried?!

jumpingjsjumpingjs Member Posts: 0 Arc User
edited April 2014 in Ten Forward
http://heartbleed.com/


http://www.bbc.co.uk/news/technology-26954540

How bad is it? Should I / we really reset all our passwords?
Hopefully I'll come back from my break; this break is fun; I play intellectual games.

I hope STO get's better ...
Post edited by jumpingjs on

Comments

  • gofasternowgofasternow Member Posts: 1,390 Arc User
    edited April 2014
    No, no, no, you're good! Here, if you're worried: http://filippo.io/Heartbleed/ This site right here will tell you if you need to worry. Just type in the webpage's address and it'll tell ya.
  • mindshadow999mindshadow999 Member Posts: 241 Arc User
    edited April 2014
    jumpingjs wrote: »
    How bad is it? Should I / we really reset all our passwords?

    Heartbleed is, er, pretty bad. At least if you're a system administrator who doesn't get overtime. :rolleyes:

    Since it works as an interesting sort of round-robin attack, it's not clear what has been exposed, but the list of things which could have been exposed on a site with that vulnerability is, well, everything that happened on that site. Including the certificate data, which means that sites which were hit now need new SSL certificates or they could be vulnerable to traffic interception and decryption even after patching heartbleed.

    You should probably reset passwords on affected sites; also, you should expect to need to do it again after everyone is done patching. Thirdly, if you're one of those people who uses the same name/pw combination everywhere, now would be an exceedingly good time to remedy that error.

    Resetting your password before the site in question has patched the bug only returns the current horse to the barn but does not close the door to keep him getting out again. As it were.

    You should also be extra vigilant if you use online banking at all; now would be a good time to discover the free credit report request stuff.
  • mimey2mimey2 Member Posts: 0 Arc User
    edited April 2014
    So...since that BBC link doesn't want to work (get a 'certificate error' thing), anyone mind explaining for me?

    Whatever it is, it seems pretty huge. I mean, I can't get on some pretty big websites like Youtube or Google, they also give me a certificate error thing.

    *isn't techno-savy*
    I remain empathetic to the concerns of my community, but do me a favor and lay off the god damn name calling and petty remarks. It will get you nowhere.
    I must admit, respect points to Trendy for laying down the law like that.
  • markhawkmanmarkhawkman Member Posts: 35,236 Arc User
    edited April 2014
    mimey2 wrote: »
    So...since that BBC link doesn't want to work (get a 'certificate error' thing), anyone mind explaining for me?

    Whatever it is, it seems pretty huge. I mean, I can't get on some pretty big websites like Youtube or Google, they also give me a certificate error thing.

    *isn't techno-savy*
    It's basically a way of bypassing security by tricking the software into giving you the security key. Thus letting you access anything you want. But.... as bad as that is, it's not a universal issue.
    -=-=-=-=-=-=-=-
    My character Tsin'xing
    Costume_marhawkman_Tsin%27xing_CC_Comic_Page_Blue_488916968.jpg
  • mindshadow999mindshadow999 Member Posts: 241 Arc User
    edited April 2014
    It's basically a way of bypassing security by tricking the software into giving you the security key. Thus letting you access anything you want. But.... as bad as that is, it's not a universal issue.

    That's kind of too much of an oversimplification. What the heartbleed bug does is allows the unencrypted program memory of a system running that version of OpenSSL to be read in random chunks. Those chunks could be nothing, they could be the site certificate, they could be your username/password, they could be the raw web traffic (imagine someone looking over your shoulder at your online banking, or online health care, for example...).

    It's worse than tricking the system into giving up the key. It doesn't even require a key at all. It's just riffling randomly through whatever is going on, which may include giving you the key - which would allow you to continue access even after the bug is patched.

    It only affects certain versions of OpenSSL, though, so anyone not running OpenSSL (for once, Microsoft's version is more secure?) or who was lazy and didn't upgrade yet is safe.

    Compromising the certificates of that many sites is, to put it mildly, a giant cluster-pancake though.

    It's not a cause for panic (save that for the admins of unpatched systems) but certainly cause for increased vigilance.

    If you want to worry about something, worry about how this apparently got inserted into an open source project two years ago and then sat there in plain sight until now.
  • mandoknight89mandoknight89 Member Posts: 1,687 Arc User
    edited April 2014
    It's basically a way of bypassing security by tricking the software into giving you the security key. Thus letting you access anything you want. But.... as bad as that is, it's not a universal issue.

    Steam was vulnerable until yesterday. If you're a developer who used Steam (the most likely group to be targeted), change your password (and the passwords of any service that had the same password), and reset Steam Guard.

    As for it not being a universal issue, anything running OpenSSL 1.0.1 through 1.0.1f is vulnerable.

    Should you be concerned? Yes. Should you panic? Panic never helps.
  • centersolacecentersolace Member Posts: 11,178 Arc User
    edited April 2014
    Oh this thing. This isn't that big of a deal. Most sites with this loophole were fixed pretty quickly.
  • steamwrightsteamwright Member Posts: 2,820
    edited April 2014
    Should you be concerned? Yes. Should you panic? Panic never helps.

    Having a good towel helps.
  • futurepastnowfuturepastnow Member Posts: 3,660 Arc User
    edited April 2014
    No, no, no, you're good! Here, if you're worried: http://filippo.io/Heartbleed/ This site right here will tell you if you need to worry. Just type in the webpage's address and it'll tell ya.

    All that can do is tell you if a site is vulnerable now. Many have been patched in the last day, and none of those testers will be able to tell you if it was exploitable before.

    So... change all of your passwords.
Sign In or Register to comment.