โApr-14-2014 07:33 AM
โApr-28-2014 02:27 PM
โApr-28-2014 02:15 PM
โApr-28-2014 01:57 PM
bwanshoom wrote:Since we are looking at the same list it is easy to see where we disagree. I see a difference between "security" and "vulnerability", you lump them together. Being exposed to a DoS or a crash is a vulnerability, peeking into 64K of memory is a security hole. Much of the software "you don't see" is never exposed to situations where it would be vulnerable to a DoS or client/server crash so there is no concern for preventing it. If it was the fixes would be implemented.
I based my response on the list of vulnerabilties from openssl listed here. It appears there were at least 9 security vulnerabilities resolved in the past 2 years not including Heartbleed. While what you say is true for most software, openssl is pretty much all security or security-related.
โApr-28-2014 01:24 PM
magicbus wrote:bwanshoom wrote:You might think that but OpenSSL isn't Windows or OSX. I would venture a ballpark guess that 95+ percent of the changes are additional features and 99% of the remaining 5% concern specific features and their usage. The remaining .05% are fixes like correcting bugs introduced by the addition of a new feature (think heartbleed bug here).
... If you didn't update openssl in more than 2 years you were missing many vulnerability fixes. Security software updates are generally pretty important.
The cost to properly test software is high and it is cheaper and safer to analyze the impact of not updating than it is to blindly update, test, and release.
Dave
โApr-28-2014 12:46 PM
bwanshoom wrote:You might think that but OpenSSL isn't Windows or OSX. I would venture a ballpark guess that 95+ percent of the changes are additional features and 99% of the remaining 5% concern specific features and their usage. The remaining .05% are fixes like correcting bugs introduced by the addition of a new feature (think heartbleed bug here).
... If you didn't update openssl in more than 2 years you were missing many vulnerability fixes. Security software updates are generally pretty important.
โApr-28-2014 10:33 AM
โApr-28-2014 10:25 AM
โApr-28-2014 10:11 AM
Reddog1 wrote:There are a few ways. One is the site sends you an SMS message with a code that you enter. Another is to install an app that produces a number code every minute or so that you enter when prompted, similar to an RSA token. Twitter uses the former method. Google uses the latter method as do a few other sites that leverage Google's app such as Amazon Web Services and LastPass, if so configured.
How do you use the phone for authentication?
Wayne
โApr-28-2014 10:07 AM
2004.5 Ram SLT LB 3500 DRW Quad Cab 4x4
1988 Bigfoot (C11.5) TC (1900# w/standard equip. per decal), 130 watts solar, 100 AH AGM, Polar Cub A/C, EU2000i Honda
Toad: 91 Zuke
โApr-28-2014 09:37 AM
โApr-28-2014 09:02 AM
โApr-28-2014 08:29 AM
2004.5 Ram SLT LB 3500 DRW Quad Cab 4x4
1988 Bigfoot (C11.5) TC (1900# w/standard equip. per decal), 130 watts solar, 100 AH AGM, Polar Cub A/C, EU2000i Honda
Toad: 91 Zuke
โApr-28-2014 07:43 AM
Reddog1 wrote:For end users Heartbleed's biggest impact would be on sites where you have financial or other personally identifiable information (like SSN, etc.) Because an affected server can be made to give up information it's possible someone could "harvest" a lot of account information. The sites you should be concerned with are those that have your credit card information stored or access to your financial accounts (banks, brokerages, etc.)
If someone has my password to a Forum I visit, so what? If I have no personal info other than an email address on that site, what security should concerned about?
If it is the email address, then perhaps I should have an email address unique to those sites I do business with.
What am I missing?
Wayne
โApr-28-2014 07:18 AM
Reddog1 wrote:
If someone has my password to a Forum I visit, so what? If I have no personal info other than an email address on that site, what security should concerned about?
If it is the email address, then perhaps I should have an email address unique to those sites I do business with?
What am I missing?
Wayne
2004.5 Ram SLT LB 3500 DRW Quad Cab 4x4
1988 Bigfoot (C11.5) TC (1900# w/standard equip. per decal), 130 watts solar, 100 AH AGM, Polar Cub A/C, EU2000i Honda
Toad: 91 Zuke