Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. The Heartbleed Bug

The Heartbleed Bug

Scheduled Pinned Locked Moved The Lounge
sysadminsecuritycomperformancehelp
22 Posts 9 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • E Offline
    E Offline
    Espen Harlinn
    wrote on last edited by
    #1

    I guess just about all of us have now heard about the heartbleed bug[^]. From the rather massive media coverage it appears that this can be exploited in ways that allows an attacker to potentially retrieve logon information such as user names and passwords. If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server - and that the actual real password is kept in memory, and that it is either stored locally by the server, or the server can retrieve the password from another server on the network, or farward it to another server for authentication. Even if there was no heartbleed bug, this sounds like a f***up on a much grander scale than the heartbleed bug, because it makes it likely that a lot of people believe they have implemented strong security, while actually implementing something that is quite vulnerable. Thoughts anybody? or jokes (if you can come up with good ones) [Update] Just to be clear: I think we should allways use transport level security, and even then we should never send the password in a form that can be easily reconstructed.

    Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

    J OriginalGriffO M D A 5 Replies Last reply
    0
    • E Espen Harlinn

      I guess just about all of us have now heard about the heartbleed bug[^]. From the rather massive media coverage it appears that this can be exploited in ways that allows an attacker to potentially retrieve logon information such as user names and passwords. If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server - and that the actual real password is kept in memory, and that it is either stored locally by the server, or the server can retrieve the password from another server on the network, or farward it to another server for authentication. Even if there was no heartbleed bug, this sounds like a f***up on a much grander scale than the heartbleed bug, because it makes it likely that a lot of people believe they have implemented strong security, while actually implementing something that is quite vulnerable. Thoughts anybody? or jokes (if you can come up with good ones) [Update] Just to be clear: I think we should allways use transport level security, and even then we should never send the password in a form that can be easily reconstructed.

      Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

      J Offline
      J Offline
      Jorgen Andersson
      wrote on last edited by
      #2

      Obligatory XKCD link[^].

      Espen Harlinn wrote:

      Thoughts anybody? or jokes

      Covering all bases here.

      Wrong is evil and must be defeated. - Jeff Ello[^]

      E 1 Reply Last reply
      0
      • E Espen Harlinn

        I guess just about all of us have now heard about the heartbleed bug[^]. From the rather massive media coverage it appears that this can be exploited in ways that allows an attacker to potentially retrieve logon information such as user names and passwords. If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server - and that the actual real password is kept in memory, and that it is either stored locally by the server, or the server can retrieve the password from another server on the network, or farward it to another server for authentication. Even if there was no heartbleed bug, this sounds like a f***up on a much grander scale than the heartbleed bug, because it makes it likely that a lot of people believe they have implemented strong security, while actually implementing something that is quite vulnerable. Thoughts anybody? or jokes (if you can come up with good ones) [Update] Just to be clear: I think we should allways use transport level security, and even then we should never send the password in a form that can be easily reconstructed.

        Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

        OriginalGriffO Offline
        OriginalGriffO Offline
        OriginalGriff
        wrote on last edited by
        #3

        Go to QA, and you will see that the "next generation" of developers not only store clear text passwords, but that they access them by concatenating strings:

        string sql = "SELECT * FROM Users WHERE UserId='" + tbUser.Text + "' AND Password='" + tbPassword.Text+"'";

        So not only is the site vulnerable to Heartbleed, but SQL Injection and password bypass. So if I type:

        Chris Maunder';--

        in the Username textbox, I could log in as the Admins...(Needless to say, that won't work here on CP!) Worse, if you pick them up on it they give the keyboard equivalent of a shrug and ignore you... :sigh:

        Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952) Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)

        "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
        "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

        L E C 3 Replies Last reply
        0
        • OriginalGriffO OriginalGriff

          Go to QA, and you will see that the "next generation" of developers not only store clear text passwords, but that they access them by concatenating strings:

          string sql = "SELECT * FROM Users WHERE UserId='" + tbUser.Text + "' AND Password='" + tbPassword.Text+"'";

          So not only is the site vulnerable to Heartbleed, but SQL Injection and password bypass. So if I type:

          Chris Maunder';--

          in the Username textbox, I could log in as the Admins...(Needless to say, that won't work here on CP!) Worse, if you pick them up on it they give the keyboard equivalent of a shrug and ignore you... :sigh:

          Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952) Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #4

          OriginalGriff wrote:

          developers

          Feeling generous are we? More like "copy/pasters". :)

          OriginalGriffO 1 Reply Last reply
          0
          • L Lost User

            OriginalGriff wrote:

            developers

            Feeling generous are we? More like "copy/pasters". :)

            OriginalGriffO Offline
            OriginalGriffO Offline
            OriginalGriff
            wrote on last edited by
            #5

            To you and I (and the majority of Lounge inhabitants) they are "copy'n'paste" merchants. To themselves, and their lecturers - and worse, their bosses - they are developers par excellence! :doh:

            Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952) Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)

            "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
            "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

            D L 2 Replies Last reply
            0
            • E Espen Harlinn

              I guess just about all of us have now heard about the heartbleed bug[^]. From the rather massive media coverage it appears that this can be exploited in ways that allows an attacker to potentially retrieve logon information such as user names and passwords. If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server - and that the actual real password is kept in memory, and that it is either stored locally by the server, or the server can retrieve the password from another server on the network, or farward it to another server for authentication. Even if there was no heartbleed bug, this sounds like a f***up on a much grander scale than the heartbleed bug, because it makes it likely that a lot of people believe they have implemented strong security, while actually implementing something that is quite vulnerable. Thoughts anybody? or jokes (if you can come up with good ones) [Update] Just to be clear: I think we should allways use transport level security, and even then we should never send the password in a form that can be easily reconstructed.

              Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

              M Offline
              M Offline
              Munchies_Matt
              wrote on last edited by
              #6

              Espen Harlinn wrote:

              If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server

              The way I read it is that the key pair can be read and thus the pwd decrypted. So the pwd is stored in an encrypted form so it doesn't look as bad as you think. At least that's my take, but I don't know jack about security stuff. :)

              "The whole idea that carbon dioxide is the main cause of the recent global warming is based on a guess that was proved false by empirical evidence during the 1990s." climate-models-go-cold

              E 1 Reply Last reply
              0
              • E Espen Harlinn

                I guess just about all of us have now heard about the heartbleed bug[^]. From the rather massive media coverage it appears that this can be exploited in ways that allows an attacker to potentially retrieve logon information such as user names and passwords. If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server - and that the actual real password is kept in memory, and that it is either stored locally by the server, or the server can retrieve the password from another server on the network, or farward it to another server for authentication. Even if there was no heartbleed bug, this sounds like a f***up on a much grander scale than the heartbleed bug, because it makes it likely that a lot of people believe they have implemented strong security, while actually implementing something that is quite vulnerable. Thoughts anybody? or jokes (if you can come up with good ones) [Update] Just to be clear: I think we should allways use transport level security, and even then we should never send the password in a form that can be easily reconstructed.

                Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                D Offline
                D Offline
                dan sh
                wrote on last edited by
                #7

                I have had LinkedIn account for some time. I don't care too much about security issues anymore.

                My CP workspace with simple code samples[^]

                E 1 Reply Last reply
                0
                • OriginalGriffO OriginalGriff

                  To you and I (and the majority of Lounge inhabitants) they are "copy'n'paste" merchants. To themselves, and their lecturers - and worse, their bosses - they are developers par excellence! :doh:

                  Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952) Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)

                  D Offline
                  D Offline
                  dan sh
                  wrote on last edited by
                  #8

                  I think you have way too less confidence in your abilities. Just because you know you are worse than me, you cannot call me names.

                  My CP workspace with simple code samples[^]

                  1 Reply Last reply
                  0
                  • J Jorgen Andersson

                    Obligatory XKCD link[^].

                    Espen Harlinn wrote:

                    Thoughts anybody? or jokes

                    Covering all bases here.

                    Wrong is evil and must be defeated. - Jeff Ello[^]

                    E Offline
                    E Offline
                    Espen Harlinn
                    wrote on last edited by
                    #9

                    :laugh: Nearly as good as littel bobby tables[^]

                    Jörgen Andersson wrote:

                    Covering all bases here

                    Thanks :thumbsup:

                    Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                    1 Reply Last reply
                    0
                    • OriginalGriffO OriginalGriff

                      Go to QA, and you will see that the "next generation" of developers not only store clear text passwords, but that they access them by concatenating strings:

                      string sql = "SELECT * FROM Users WHERE UserId='" + tbUser.Text + "' AND Password='" + tbPassword.Text+"'";

                      So not only is the site vulnerable to Heartbleed, but SQL Injection and password bypass. So if I type:

                      Chris Maunder';--

                      in the Username textbox, I could log in as the Admins...(Needless to say, that won't work here on CP!) Worse, if you pick them up on it they give the keyboard equivalent of a shrug and ignore you... :sigh:

                      Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952) Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)

                      E Offline
                      E Offline
                      Espen Harlinn
                      wrote on last edited by
                      #10

                      OriginalGriff wrote:

                      Worse, if you pick them up on it they give the keyboard equivalent of a shrug and ignore you...

                      I know - and they'll continue to get paid for it ... it's like 2013 never happened[^]

                      Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                      1 Reply Last reply
                      0
                      • M Munchies_Matt

                        Espen Harlinn wrote:

                        If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server

                        The way I read it is that the key pair can be read and thus the pwd decrypted. So the pwd is stored in an encrypted form so it doesn't look as bad as you think. At least that's my take, but I don't know jack about security stuff. :)

                        "The whole idea that carbon dioxide is the main cause of the recent global warming is based on a guess that was proved false by empirical evidence during the 1990s." climate-models-go-cold

                        E Offline
                        E Offline
                        Espen Harlinn
                        wrote on last edited by
                        #11

                        Munchies_Matt wrote:

                        so it doesn't look as bad as you think

                        Errhm ... hearbleed lets you read memory from the server:When it is exploited it leads to the leak of memory contents from the server There shouldn't be any passwords to read from the memory on the server - only the cryptographic digest, which, on it's own should be worthless ...

                        Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                        D M J C 4 Replies Last reply
                        0
                        • E Espen Harlinn

                          Munchies_Matt wrote:

                          so it doesn't look as bad as you think

                          Errhm ... hearbleed lets you read memory from the server:When it is exploited it leads to the leak of memory contents from the server There shouldn't be any passwords to read from the memory on the server - only the cryptographic digest, which, on it's own should be worthless ...

                          Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                          D Offline
                          D Offline
                          dan sh
                          wrote on last edited by
                          #12

                          Referring to a SoapBox thread I read today, if it ain't got to do with kernel, it is stupid.

                          My CP workspace with simple code samples[^]

                          1 Reply Last reply
                          0
                          • OriginalGriffO OriginalGriff

                            To you and I (and the majority of Lounge inhabitants) they are "copy'n'paste" merchants. To themselves, and their lecturers - and worse, their bosses - they are developers par excellence! :doh:

                            Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952) Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)

                            L Offline
                            L Offline
                            Lost User
                            wrote on last edited by
                            #13

                            OriginalGriff wrote:

                            developers par excellence!

                            Unfortunately, all too true. I know of at least 2 members that have been here for multiples years. One such person has gotten his entire application written by copying and pasting code around in questions getting people to write and rewrite his code for him. Even more sadly, this person cannot write code, cannot debug his code or anything else (by his own admission BTW), but for some strange reason, thinks he is qualified to teach students how to program! WTE? I have said it before and I will say it again, Griff my old friend, you Sir could probably teach Job a thing or two. I don't know how you do it. But my hat is off to you!

                            1 Reply Last reply
                            0
                            • D dan sh

                              I have had LinkedIn account for some time. I don't care too much about security issues anymore.

                              My CP workspace with simple code samples[^]

                              E Offline
                              E Offline
                              Espen Harlinn
                              wrote on last edited by
                              #14

                              I guess you tried for a joke - and being perhaps a bit slow tonight, I'm having a bit of a struggle ... :sigh:

                              Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                              1 Reply Last reply
                              0
                              • E Espen Harlinn

                                I guess just about all of us have now heard about the heartbleed bug[^]. From the rather massive media coverage it appears that this can be exploited in ways that allows an attacker to potentially retrieve logon information such as user names and passwords. If this is possible, it also means that the actual password, and not a cryptographic digest, has been sendt to the server - and that the actual real password is kept in memory, and that it is either stored locally by the server, or the server can retrieve the password from another server on the network, or farward it to another server for authentication. Even if there was no heartbleed bug, this sounds like a f***up on a much grander scale than the heartbleed bug, because it makes it likely that a lot of people believe they have implemented strong security, while actually implementing something that is quite vulnerable. Thoughts anybody? or jokes (if you can come up with good ones) [Update] Just to be clear: I think we should allways use transport level security, and even then we should never send the password in a form that can be easily reconstructed.

                                Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                                A Offline
                                A Offline
                                Andy Brummer
                                wrote on last edited by
                                #15

                                The issue is that it is in the SSL protocol which is usually safe. Because of that passwords are not typically hashed in javascript on the client, but the hash is generated on the server. That's why the servers might have passwords in memory. The bigger issue is that someone might have gotten the server's private key and been able to decrypt all the traffic to the server.

                                Curvature of the Mind now with 3D

                                1 Reply Last reply
                                0
                                • E Espen Harlinn

                                  Munchies_Matt wrote:

                                  so it doesn't look as bad as you think

                                  Errhm ... hearbleed lets you read memory from the server:When it is exploited it leads to the leak of memory contents from the server There shouldn't be any passwords to read from the memory on the server - only the cryptographic digest, which, on it's own should be worthless ...

                                  Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                                  M Offline
                                  M Offline
                                  Munchies_Matt
                                  wrote on last edited by
                                  #16

                                  Your link says as much "This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet" It doesnt say stealing passwords, it says stealing the encryption keys, and thus decrypting the traffic and thus effecting a 'man in the middle' attack.

                                  Espen Harlinn wrote:

                                  which, on it's own should be worthless

                                  See 'man in the middle' attacks.

                                  "The whole idea that carbon dioxide is the main cause of the recent global warming is based on a guess that was proved false by empirical evidence during the 1990s." climate-models-go-cold

                                  1 Reply Last reply
                                  0
                                  • E Espen Harlinn

                                    Munchies_Matt wrote:

                                    so it doesn't look as bad as you think

                                    Errhm ... hearbleed lets you read memory from the server:When it is exploited it leads to the leak of memory contents from the server There shouldn't be any passwords to read from the memory on the server - only the cryptographic digest, which, on it's own should be worthless ...

                                    Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                                    J Offline
                                    J Offline
                                    J Adam Armstrong
                                    wrote on last edited by
                                    #17

                                    Espen Harlinn wrote:

                                    There shouldn't be any passwords to read from the memory on the server - only the cryptographic digest, which, on it's own should be worthless ...

                                    Hashed passwords (even salted) can be cracked much faster than you think in may cases because people are bad at generating randomness. As such by going through likely passwords it is possible to crack thousands of passwords in a few hours.

                                    E 1 Reply Last reply
                                    0
                                    • OriginalGriffO OriginalGriff

                                      Go to QA, and you will see that the "next generation" of developers not only store clear text passwords, but that they access them by concatenating strings:

                                      string sql = "SELECT * FROM Users WHERE UserId='" + tbUser.Text + "' AND Password='" + tbPassword.Text+"'";

                                      So not only is the site vulnerable to Heartbleed, but SQL Injection and password bypass. So if I type:

                                      Chris Maunder';--

                                      in the Username textbox, I could log in as the Admins...(Needless to say, that won't work here on CP!) Worse, if you pick them up on it they give the keyboard equivalent of a shrug and ignore you... :sigh:

                                      Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952) Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)

                                      C Offline
                                      C Offline
                                      Chris Maunder
                                      wrote on last edited by
                                      #18

                                      OriginalGriff wrote:

                                      So if I type:

                                      Chris Maunder';--

                                      in the Username textbox,

                                      Uh, 'Griff? Can I have my password back now? Please?

                                      cheers Chris Maunder

                                      OriginalGriffO 1 Reply Last reply
                                      0
                                      • E Espen Harlinn

                                        Munchies_Matt wrote:

                                        so it doesn't look as bad as you think

                                        Errhm ... hearbleed lets you read memory from the server:When it is exploited it leads to the leak of memory contents from the server There shouldn't be any passwords to read from the memory on the server - only the cryptographic digest, which, on it's own should be worthless ...

                                        Espen Harlinn Principal Architect, Software - Goodtech Projects & Services AS Projects promoting programming in "natural language" are intrinsically doomed to fail. Edsger W.Dijkstra

                                        C Offline
                                        C Offline
                                        Chris Maunder
                                        wrote on last edited by
                                        #19

                                        Espen Harlinn wrote:

                                        There shouldn't be any passwords to read from the memory on the server

                                        What happens when someone logs in? The password is sent to the server (over SSL) and so the server may have have it in a variable in memory for a period of time. How long the variable lives depends on the platform and scope (Allocated on the stack? Allocated on a memory managed heap? Static buffer constantly being overwritten?)

                                        cheers Chris Maunder

                                        E 1 Reply Last reply
                                        0
                                        • C Chris Maunder

                                          OriginalGriff wrote:

                                          So if I type:

                                          Chris Maunder';--

                                          in the Username textbox,

                                          Uh, 'Griff? Can I have my password back now? Please?

                                          cheers Chris Maunder

                                          OriginalGriffO Offline
                                          OriginalGriffO Offline
                                          OriginalGriff
                                          wrote on last edited by
                                          #20

                                          Oh... All right... ;)

                                          Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952) Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)

                                          "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                                          "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups