cancel
Showing results forย 
Search instead forย 
Did you mean:ย 

Heartbleed Bug: Which Websites Recommend Changing Passwords?

1492
Moderator
Moderator
Facebook, Yahoo, Instagram, NetFlix, Dropbox, and GoDaddy are among those sites recommended changing passwords due to the Heartbleed SSL Bug.

Test a website server status for Heartbleed vulnerability.

See Mashable.com article The Heartbleed Hit List: The Passwords You Need to Change Right Now.
24 REPLIES 24

magicbus
Explorer II
Explorer II
Well it is tough to argue with the knowledge of the Internet... I guess I better get back to my day job since it seems I am way behind!

Dave
Current: 2018 Winnebago Era A
Previous: Selene 49 Trawler
Previous: Country Coach Allure 36

bwanshoom
Explorer
Explorer
I guess I was replying to your statement that 95% are new features and the URL was a list of security vulnerabilites (openssl's words, not mine.) Vulnerabilities are holes in security, not just run of the mill bugs.

With security it's often quite difficult to tell if a given vulnerability might apply to features you're using in a product. In order to make that decision, you have to research the specifics of the issue and have a pretty intimate understanding of what it refers to. It's very challenging even for the most seasoned sysadmins.

For example, CVE-2014-0076 (CVE stands for Common Vulnerabilities and Exposures) is listed as "Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" Reported by Yuval Yarom and Naomi Benger." The listing in the NVD isn't that much clearer: "The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack."

Just at first read it's pretty difficult to say whether or not this is something I would care about. Further research would help determine the risk, often defined as "Risk = Threat x Vulnerability x Impact" and then the business cost has to be weighed as well.

You would have to go through the same process for each of the 9 security vulnerabilities that were fixed in the past 2 years to determine if you needed to upgrade or not. And then all your systems would have to be thoroughly tested to make sure the ugprade doesn't break anything.

But I still believe my original statement was accurate: "If you didn't update openssl in more than 2 years you were missing many vulnerability fixes."
2010 Cougar 322 QBS
2008 Chevy Silverado 2500HD LMM CC/SB 4x4 LTZ
Pullrite SuperGlide 18K

magicbus
Explorer II
Explorer II
bwanshoom wrote:

I based my response on the list of vulnerabilties from openssl listed here. It appears there were at least 9 security vulnerabilities resolved in the past 2 years not including Heartbleed. While what you say is true for most software, openssl is pretty much all security or security-related.
Since we are looking at the same list it is easy to see where we disagree. I see a difference between "security" and "vulnerability", you lump them together. Being exposed to a DoS or a crash is a vulnerability, peeking into 64K of memory is a security hole. Much of the software "you don't see" is never exposed to situations where it would be vulnerable to a DoS or client/server crash so there is no concern for preventing it. If it was the fixes would be implemented.

Dave
Current: 2018 Winnebago Era A
Previous: Selene 49 Trawler
Previous: Country Coach Allure 36

bwanshoom
Explorer
Explorer
magicbus wrote:
bwanshoom wrote:
... If you didn't update openssl in more than 2 years you were missing many vulnerability fixes. Security software updates are generally pretty important.
You might think that but OpenSSL isn't Windows or OSX. I would venture a ballpark guess that 95+ percent of the changes are additional features and 99% of the remaining 5% concern specific features and their usage. The remaining .05% are fixes like correcting bugs introduced by the addition of a new feature (think heartbleed bug here).

The cost to properly test software is high and it is cheaper and safer to analyze the impact of not updating than it is to blindly update, test, and release.

Dave

I based my response on the list of vulnerabilties from openssl listed here. It appears there were at least 9 security vulnerabilities resolved in the past 2 years not including Heartbleed. While what you say is true for most software, openssl is pretty much all security or security-related.
2010 Cougar 322 QBS
2008 Chevy Silverado 2500HD LMM CC/SB 4x4 LTZ
Pullrite SuperGlide 18K

magicbus
Explorer II
Explorer II
bwanshoom wrote:
... If you didn't update openssl in more than 2 years you were missing many vulnerability fixes. Security software updates are generally pretty important.
You might think that but OpenSSL isn't Windows or OSX. I would venture a ballpark guess that 95+ percent of the changes are additional features and 99% of the remaining 5% concern specific features and their usage. The remaining .05% are fixes like correcting bugs introduced by the addition of a new feature (think heartbleed bug here).

The cost to properly test software is high and it is cheaper and safer to analyze the impact of not updating than it is to blindly update, test, and release.

Dave
Current: 2018 Winnebago Era A
Previous: Selene 49 Trawler
Previous: Country Coach Allure 36

mlts22
Explorer
Explorer
I use the Google Authenticator (which is a part of the EPEL library for RedHat) to log onto my own remote machines. Same with Gmail and Amazon's AWS.

For PayPal and eBay, I have both SMS authentication, and a keyfob. That way, if I lose my phone, I'm not utterly hosed.

For a couple games, I use a phone app.

For my virtualization host, I use IP address protection, where it will send E-mail to my gmail account (protected by two factor authentication) if I try to log on from a new IP range.

None of this is 100%, but it means an attacker has to do more than just yank a password out of RAM.

One nice thing about Android is that the apps that give the validation codes can be easily backed up encrypted using Titanium Backup, and stored on a cloud provider. That way, if the phone gets lost, I can get another Android phone, restore the data, and be back in business.

1492
Moderator
Moderator
I actually use Google Voice for phone authentications. Except for Google services.

bwanshoom
Explorer
Explorer
Reddog1 wrote:
How do you use the phone for authentication?

Wayne
There are a few ways. One is the site sends you an SMS message with a code that you enter. Another is to install an app that produces a number code every minute or so that you enter when prompted, similar to an RSA token. Twitter uses the former method. Google uses the latter method as do a few other sites that leverage Google's app such as Amazon Web Services and LastPass, if so configured.
2010 Cougar 322 QBS
2008 Chevy Silverado 2500HD LMM CC/SB 4x4 LTZ
Pullrite SuperGlide 18K

Reddog1
Explorer II
Explorer II
How do you use the phone for authentication?

Wayne


2004.5 Ram SLT LB 3500 DRW Quad Cab 4x4
1988 Bigfoot (C11.5) TC (1900# w/standard equip. per decal), 130 watts solar, 100 AH AGM, Polar Cub A/C, EU2000i Honda

Toad: 91 Zuke

mlts22
Explorer
Explorer
It might be wise to see about two factor authentication, assuming one has a phone that isn't going to be going away anytime soon. This way, if a bad guy snarfs a password, it will still keep the account secure. I do this with a number of websites (Google, Amazon, PayPal, eBay), and so far, so good. Nothing is perfect, but it is a notch above just one password keeping the bad guys at bay.

1492
Moderator
Moderator
Most banks and financial institutions don't use OpenSSL, so not affected by Heartbleed. However, online retailers who do use OpenSSL, say for instance for their shopping cart, could be vulnerable to exposing customer credit card and other personal info in memory.

The other issue is that many, unfortunately, use the same password for all web accounts for convenience. A hacker could conceivably extract an affected email provider's login/password to check an account for banking related communications. Then attempt to gain access to those financial sites using the same password. Which is a reason to have unique passwords for each website.

A forum account breach may not be harmful, more of an inconvenience if not an embarrassment to the account holder, as a hacker could use the opportunity to post spam. Access to a moderator account could initially be more damaging, but should be restoreable once discovered.

The Open Roads Forums apparently use Microsoft IIs servers which utilize its own encryption component Secure Channel, so not impacted by Heartbleed.

Reddog1
Explorer II
Explorer II
bwanshoom, thanks for the explanation. I have ask these questions on other forums, and they have been ignored. I guess most people really do not know the answers.

Thanks again.

Wayne


2004.5 Ram SLT LB 3500 DRW Quad Cab 4x4
1988 Bigfoot (C11.5) TC (1900# w/standard equip. per decal), 130 watts solar, 100 AH AGM, Polar Cub A/C, EU2000i Honda

Toad: 91 Zuke

bwanshoom
Explorer
Explorer
Reddog1 wrote:
If someone has my password to a Forum I visit, so what? If I have no personal info other than an email address on that site, what security should concerned about?

If it is the email address, then perhaps I should have an email address unique to those sites I do business with.

What am I missing?

Wayne
For end users Heartbleed's biggest impact would be on sites where you have financial or other personally identifiable information (like SSN, etc.) Because an affected server can be made to give up information it's possible someone could "harvest" a lot of account information. The sites you should be concerned with are those that have your credit card information stored or access to your financial accounts (banks, brokerages, etc.)

Also, you should change your password for any email sites that could be used for account verification of other sites. For example, many sites require that you click a specific link in an email they send you to reset your password so those email accounts should be updated.

For forums it doesn't matter unless that forum also has shopping that might have your credit card information stored.

I know most banks said "We're not impacted", but there's no harm in changing your password anyway.
2010 Cougar 322 QBS
2008 Chevy Silverado 2500HD LMM CC/SB 4x4 LTZ
Pullrite SuperGlide 18K

Reddog1
Explorer II
Explorer II
Reddog1 wrote:
If someone has my password to a Forum I visit, so what? If I have no personal info other than an email address on that site, what security should concerned about?

If it is the email address, then perhaps I should have an email address unique to those sites I do business with?

What am I missing?

Wayne

The Heartbleed information is very informative, but I am trying to put it in perspective. Can anyone answer the questions in my previous post?

Wayne


2004.5 Ram SLT LB 3500 DRW Quad Cab 4x4
1988 Bigfoot (C11.5) TC (1900# w/standard equip. per decal), 130 watts solar, 100 AH AGM, Polar Cub A/C, EU2000i Honda

Toad: 91 Zuke