http://www.securityfocus.com/archive/1/531779/30/0/threaded


  




> Date: Wed, 9 Apr 2014 11:35:26 -0500
> From: [email protected]
> To: [email protected]
> Subject: Re: [NTSysADM] Heartbleed vulnerability
> 
> On Wed, 9 Apr 2014, Richard Stovall wrote:
> 
> > Please to be explaining or providing links.  It would be great to know how
> > to do this.
> 
> this was on the bugtraq list this morning.. I haven't had a chance to test
> yet today...
> 
> 
> 
> From: Fabien Bourdaire <[email protected]>
> To: [email protected]
> Subject: CVE-2014-0160 mitigation using iptables
> 
> 
> Following up on the CVE-2014-0160 vulnerability, heartbleed. We've
> created some iptables rules to block all heartbeat queries using the
> very powerful u32 module.
> 
> The rules allow you to mitigate systems that can't yet be patched by
> blocking ALL the heartbeat handshakes. We also like the capability to
> log external scanners :)
> 
> The rules have been specifically created for HTTPS traffic and may be
> adapted for other protocols; SMTPS/IMAPS/...
> 
> # Log rules
> iptables -t filter -A INPUT  -p tcp --dport 443  -m u32 --u32 \
> "52=0x18030000:0x1803FFFF" -j LOG --log-prefix "BLOCKED: HEARTBEAT"
> 
> # Block rules
> iptables -t filter -A INPUT  -p tcp --dport 443  -m u32 --u32 \
> "52=0x18030000:0x1803FFFF" -j DROP
> 
> # Wireshark rules
> $ tshark  -i interface port 443 -R 'frame[68:1] == 18'
> $ tshark  -i interface port 443 -R 'ssl.record.content_type == 24'
> 
> 
> We believe that this should only be used as a temporary fix to decrease
> the exposure window. The log rule should allow you to test the firewall
> rules before being used in production. It goes without saying that if
> you have any suggested improvements to these rules we would be grateful
> if you could share them with the security community.
> 
> Clearly, use of these rules is at your own risk ;)
> 
> 
> ECSC SOC Team Researchers:
> Adam Shore
> Alex Innes
> Fabien Bourdaire
> 
> 
> 
> 
                                          

Reply via email to