Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-11 Thread Tony Mountifield
In article 1483a20e-66b7-4ecc-8c14-34de4b24b...@gmail.com,
Markus Falb wne...@gmail.com wrote:
 
  No vulnerability on the
  server can expose a private client certificate, only a vulnerability on
  the client can.
 
 With malicious server I did not meant one that was affected
 by heartbleed but a server which is run by bad people that want to exploit
 vulnerable clients.
 
 If it's easy to write a malicious client to read the server's ram, it's maybe 
 easy to
 write a malicious server that can read the client's ram? Does heartbleed work
 in both directions?
 
 Assume that the client uses a vulnerable openssl, and it connects to a 
 malicious 
 server, can the server read the ram of the client?

https://reverseheartbleed.com/

Cheers
Tony
-- 
Tony Mountifield
Work: t...@softins.co.uk - http://www.softins.co.uk
Play: t...@mountifield.org - http://tony.mountifield.org
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread David Hrbáč
Dne 9.4.2014 17:27, Johnny Hughes napsal(a):
 It is only things that actually used SSL in memory (like httpd, imaps,
 pop3s, etc) . those certificates COULD have been impacted. openssh was
 not impacted (based on my reading).

What about the user credentials sent over this insecure communication
channel. They could be also compromised...
DH
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread Johnny Hughes
On 04/10/2014 05:17 AM, David Hrbáč wrote:
 Dne 9.4.2014 17:27, Johnny Hughes napsal(a):
 It is only things that actually used SSL in memory (like httpd, imaps,
 pop3s, etc) . those certificates COULD have been impacted. openssh was
 not impacted (based on my reading).
 What about the user credentials sent over this insecure communication
 channel. They could be also compromised...
 DH
Anything in the actual memory of the process can be retrieved in random
64KB chunks, when/if someone uses an exploit against your server on the
https or one of the other ports (imaps, pop3s, etc).

The exploiter does not get to choose the memory check they get (it is
random), so they would need to run the exploit, in a loop, dump the
data, and grab the info in chunks. Then they would need to string the
data together or grab pieces out of the data.

So, yes, older transactions on that process could be seen. So some user
names, passwords, credit card numbers, any other traffic someone posted
on a connection to the machine could be read in the data that was dumped
and saved, including the server's private key as that key is used to
decrypt the connection.

That is one part of the exploit ... gleaning info from a service that is
running in real time.

If you are patched now, and if you restarted all services that were
running the old version of ssl, then that can no longer be done to your
machine. It could have been done as long as someone was exploiting the
port in question from the time any from the installation of the 6.5
openssl's were installed until at least version
openssl-1.0.1e-16.el6_5.4.0.1.centos.el6 (or openssl-1.0.1e-16.el6_5.7)
was installed ... AND all applicable services were restarted.

All of the chunks of up to 64KB that someone gathered, they can look
back through.

==

Another potential thing that someone who had access to your network
traffic could have done was dump/save that IP traffic, regardless of if
it was encrypted or not.

They could then use, if they obtained it, the private key for an https
server you connected to (one of the things they could have gotten while
a server was vulnerable). If someone did get a private key and if they
did save encrypted traffic that was on going, then they could at that
point decrypt the traffic that they have.

Those are the two possible things that could have happened.

=

In the case of CentOS servers, the time period where that could have
occurred is from December 1, 2013 (when openssl-1.0.1e-15.el6 was
released in CentOS-6.5) until people using 6.5 upgrade to
openssl-1.0.1e-16.el6_5.7 (available on April 8th, 2014). In the case of
some other distributions, the possible time frame is from March 2012
until April 2014.



signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread David Hrbáč
Dne 10.4.2014 14:47, Johnny Hughes napsal(a):
 Those are the two possible things that could have happened. 

 = 

 In the case of CentOS servers, the time period where that could have
 occurred is from December 1, 2013 (when openssl-1.0.1e-15.el6 was
 released in CentOS-6.5) until people using 6.5 upgrade to
 openssl-1.0.1e-16.el6_5.7 (available on April 8th, 2014). In the case
 of some other distributions, the possible time frame is from March
 2012 until April 2014.

Yes, that's I wanted to point out. And that's why we are going to
replace all the SSL certificates. But this is not enough, we have to and
are going to regenerate the user passwords and ssh keys. What more we
are also going to regenerate server ssh keys, they could be compromised
because of GSISSHD.

DH
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread Stephen Harris
On Thu, Apr 10, 2014 at 03:10:31PM +0200, David Hrbá?? wrote:
 are going to regenerate the user passwords and ssh keys. What more we

SSH keys were not compromised by heartbleed (unless you had a management
tool that was vulnerable or an alternative ssh daemon that used libssl).
Nothing in the standard SSH was vulnerable so if your only encrypted
traffic was via OpenSSH then you have no problems.

Web servers, POP3, IMAP etc that were vulnerable may have potentially leaked
user passwords, but they can't leak SSH keys.

 are also going to regenerate server ssh keys, they could be compromised
 because of GSISSHD.

If the GSI patches used libssl then you might be vulnerable, but if they
only used libcrypt then you weren't exposed.

-- 

rgds
Stephen
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-10 Thread Markus Falb

On 09.Apr.2014, at 22:12, Peter pe...@pajamian.dhs.org wrote:

 On 04/10/2014 03:09 AM, Markus Falb wrote:
 
 I am assuming that client certificates are handed out to staff. Basically 
 you can't
 really control where people install client certificates and which client 
 software is used.
 If one is tricked to do a SSL Handshake with a malicious server, the key of 
 the client
 certificate is leaked. Reissue of the cert won't help because on the other 
 day there
 would be another malicious handshake with another bad server...
 
 No, the server never sees a private client certificate, it only ever has
 access to the public certificate, which by its very nature of being
 public doesn't really matter if it gets leaked.  

I know.

 No vulnerability on the
 server can expose a private client certificate, only a vulnerability on
 the client can.

With malicious server I did not meant one that was affected
by heartbleed but a server which is run by bad people that want to exploit
vulnerable clients.

If it's easy to write a malicious client to read the server's ram, it's maybe 
easy to
write a malicious server that can read the client's ram? Does heartbleed work
in both directions?

Assume that the client uses a vulnerable openssl, and it connects to a 
malicious 
server, can the server read the ram of the client?

-- 
Markus
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-09 Thread Johnny Hughes
On 04/07/2014 08:30 PM, Always Learning wrote:
 Thank you.

 What will the temporary packages be called ?




Since this is the first post about the openssl update, I want to answer
a couple questions here:

1.  The first susceptible version of openssl in a CentOS release was
openssl-1.0.1e-15.el6, released on December 1, 2013.

2.  The version of openssl that you should install to fix the issue is
openssl-1.0.1e-16.el6_5.7, released on April 8, 2014.

3.  Versions of CentOS-6.5 openssl that were affected are: 
openssl-1.0.1e-15.el6, openssl-1.0.1e-16.el6_5,
openssl-1.0.1e-16.el6_5.1, openssl-1.0.1e-16.el6_5.4.

4.  Only CentOS-6.5 was affected.  CentOS-6 at versions 6.4 or earlier
was not affected.  No versions of CentOS-5 (or any other CentOS) were
affected.

Besides doing updates, things you should do include:

1.  Besides doing the updates, you should replace any certificates using
SSL or TLS that are openssl based.  This includes VPN, HTTPD, etc.  See
http://heartbleed.com/ for more info on impacted keys.

2.  See this page for figuring out which services you should restart
after applying updates .. or just reboot the machine which will restart
all services:

https://access.redhat.com/site/solutions/781793





signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-09 Thread Markus Falb

On 09.Apr.2014, at 15:54, Johnny Hughes joh...@centos.org wrote:

 On 04/07/2014 08:30 PM, Always Learning wrote:
 Thank you.
 
 What will the temporary packages be called ?
 
 
 
 
 Since this is the first post about the openssl update, I want to answer
 a couple questions here:
 
 1.  The first susceptible version of openssl in a CentOS release was
 openssl-1.0.1e-15.el6, released on December 1, 2013.
 
 2.  The version of openssl that you should install to fix the issue is
 openssl-1.0.1e-16.el6_5.7, released on April 8, 2014.
 
 3.  Versions of CentOS-6.5 openssl that were affected are: 
 openssl-1.0.1e-15.el6, openssl-1.0.1e-16.el6_5,
 openssl-1.0.1e-16.el6_5.1, openssl-1.0.1e-16.el6_5.4.
 
 4.  Only CentOS-6.5 was affected.  CentOS-6 at versions 6.4 or earlier
 was not affected.  No versions of CentOS-5 (or any other CentOS) were
 affected.
 
 Besides doing updates, things you should do include:
 
 1.  Besides doing the updates, you should replace any certificates using
 SSL or TLS that are openssl based.  This includes VPN, HTTPD, etc.  See
 http://heartbleed.com/ for more info on impacted keys.

update openssl, reissue the certificates (with new key!), revoke the old 
certificates.
So far so good, but it goes further, doesn't it? Not only the ssl key could 
have been 
leaked, but also other sensible data. session keys, passwords, ... to handle 
this bug 
consequently, not only the ssl key and certificate has to be replaced, but also
passwords, etc., i.e. every piece of sensible data that could have been 
transported
over tls encrypted connections. Am I correct?

This was about server side certificates, and that's a controlled environment. 
After
you fixed your server it is not vulnerable anymore. Another issue is client 
certificates,
and I am quite unsure the implications on these.

I am assuming that client certificates are handed out to staff. Basically you 
can't
really control where people install client certificates and which client 
software is used.
If one is tricked to do a SSL Handshake with a malicious server, the key of the 
client
certificate is leaked. Reissue of the cert won't help because on the other day 
there
would be another malicious handshake with another bad server...

Does this bug render authentication with client certificates 
obsolete/insecure/useless ?

How does you handle client certificates after this heartbleed thing?
Your opinions and knowlegde or specific links about client certificates and 
heartbleed would be appreciated.

-- 
Markus
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-09 Thread Johnny Hughes
On 04/09/2014 09:09 AM, Markus Falb wrote:
 On 09.Apr.2014, at 15:54, Johnny Hughes joh...@centos.org wrote:

 On 04/07/2014 08:30 PM, Always Learning wrote:
 Thank you.

 What will the temporary packages be called ?



 Since this is the first post about the openssl update, I want to answer
 a couple questions here:

 1.  The first susceptible version of openssl in a CentOS release was
 openssl-1.0.1e-15.el6, released on December 1, 2013.

 2.  The version of openssl that you should install to fix the issue is
 openssl-1.0.1e-16.el6_5.7, released on April 8, 2014.

 3.  Versions of CentOS-6.5 openssl that were affected are: 
 openssl-1.0.1e-15.el6, openssl-1.0.1e-16.el6_5,
 openssl-1.0.1e-16.el6_5.1, openssl-1.0.1e-16.el6_5.4.

 4.  Only CentOS-6.5 was affected.  CentOS-6 at versions 6.4 or earlier
 was not affected.  No versions of CentOS-5 (or any other CentOS) were
 affected.

 Besides doing updates, things you should do include:

 1.  Besides doing the updates, you should replace any certificates using
 SSL or TLS that are openssl based.  This includes VPN, HTTPD, etc.  See
 http://heartbleed.com/ for more info on impacted keys.
 update openssl, reissue the certificates (with new key!), revoke the old 
 certificates.
 So far so good, but it goes further, doesn't it? Not only the ssl key could 
 have been 
 leaked, but also other sensible data. session keys, passwords, ... to handle 
 this bug 
 consequently, not only the ssl key and certificate has to be replaced, but 
 also
 passwords, etc., i.e. every piece of sensible data that could have been 
 transported
 over tls encrypted connections. Am I correct?

If someone actually got a copy of your old private-key and if they also
had the ability to log all the traffic to and from your site, they could
decrypt that.  Not likely to have happened.  They could also use that 
old private key to act as if they are your site until that certificate
is revoked.

If someone actually used the exploit against your server before you
installed the update, they can see the things in memory (in random
chunks) ... so they could see a username and password or other data that
might be in memory at that time.  The ultra safe thing would be to
assume all your passwords for SSL/TLS things are compromised.

 This was about server side certificates, and that's a controlled environment. 
 After
 you fixed your server it is not vulnerable anymore. Another issue is client 
 certificates,
 and I am quite unsure the implications on these.

It is only things that actually used SSL in memory (like httpd, imaps,
pop3s, etc) . those certificates COULD have been impacted.

openssh was not impacted (based on my reading).

 I am assuming that client certificates are handed out to staff. Basically you 
 can't
 really control where people install client certificates and which client 
 software is used.
 If one is tricked to do a SSL Handshake with a malicious server, the key of 
 the client
 certificate is leaked. Reissue of the cert won't help because on the other 
 day there
 would be another malicious handshake with another bad server...

 Does this bug render authentication with client certificates 
 obsolete/insecure/useless ?

 How does you handle client certificates after this heartbleed thing?
 Your opinions and knowlegde or specific links about client certificates and 
 heartbleed would be appreciated.


 If you change a private key with any of those things on the server,
then the public (client) keys that access them would also need to be
changed as well.  (The old ones would not work anyway).  If someone (bad
guy who stole your private key) set up a server with the old key, the
old clients would work with those (so that is why you need to change AND
revoke your cert, not just change it on your machine :D)




signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-09 Thread Paul Heinlein

On Wed, 9 Apr 2014, Johnny Hughes wrote:


1.  Besides doing the updates, you should replace any certificates
   using SSL or TLS that are openssl based.  This includes VPN,
   HTTPD, etc.  See http://heartbleed.com/ for more info on impacted
   keys.


The OpenVPN folks note that if your configuration uses the additional 
TLS auth configuration bits (tls-auth), then OpenVPN certificates were 
not exposed to a heartbeat attach.


--
Paul Heinlein
heinl...@madboa.com
45°38' N, 122°6' W___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-09 Thread Johnny Hughes
On 04/09/2014 09:27 AM, Johnny Hughes wrote:
 On 04/09/2014 09:09 AM, Markus Falb wrote:
 On 09.Apr.2014, at 15:54, Johnny Hughes joh...@centos.org wrote:

 On 04/07/2014 08:30 PM, Always Learning wrote:
 Thank you.

 What will the temporary packages be called ?


 Since this is the first post about the openssl update, I want to answer
 a couple questions here:

 1.  The first susceptible version of openssl in a CentOS release was
 openssl-1.0.1e-15.el6, released on December 1, 2013.

 2.  The version of openssl that you should install to fix the issue is
 openssl-1.0.1e-16.el6_5.7, released on April 8, 2014.

 3.  Versions of CentOS-6.5 openssl that were affected are: 
 openssl-1.0.1e-15.el6, openssl-1.0.1e-16.el6_5,
 openssl-1.0.1e-16.el6_5.1, openssl-1.0.1e-16.el6_5.4.

 4.  Only CentOS-6.5 was affected.  CentOS-6 at versions 6.4 or earlier
 was not affected.  No versions of CentOS-5 (or any other CentOS) were
 affected.

 Besides doing updates, things you should do include:

 1.  Besides doing the updates, you should replace any certificates using
 SSL or TLS that are openssl based.  This includes VPN, HTTPD, etc.  See
 http://heartbleed.com/ for more info on impacted keys.
 update openssl, reissue the certificates (with new key!), revoke the old 
 certificates.
 So far so good, but it goes further, doesn't it? Not only the ssl key could 
 have been 
 leaked, but also other sensible data. session keys, passwords, ... to handle 
 this bug 
 consequently, not only the ssl key and certificate has to be replaced, but 
 also
 passwords, etc., i.e. every piece of sensible data that could have been 
 transported
 over tls encrypted connections. Am I correct?
 If someone actually got a copy of your old private-key and if they also
 had the ability to log all the traffic to and from your site, they could
 decrypt that.  Not likely to have happened.  They could also use that 
 old private key to act as if they are your site until that certificate
 is revoked.

 If someone actually used the exploit against your server before you
 installed the update, they can see the things in memory (in random
 chunks) ... so they could see a username and password or other data that
 might be in memory at that time.  The ultra safe thing would be to
 assume all your passwords for SSL/TLS things are compromised.

 This was about server side certificates, and that's a controlled 
 environment. After
 you fixed your server it is not vulnerable anymore. Another issue is client 
 certificates,
 and I am quite unsure the implications on these.
 It is only things that actually used SSL in memory (like httpd, imaps,
 pop3s, etc) . those certificates COULD have been impacted.

 openssh was not impacted (based on my reading).
 I am assuming that client certificates are handed out to staff. Basically 
 you can't
 really control where people install client certificates and which client 
 software is used.
 If one is tricked to do a SSL Handshake with a malicious server, the key of 
 the client
 certificate is leaked. Reissue of the cert won't help because on the other 
 day there
 would be another malicious handshake with another bad server...

 Does this bug render authentication with client certificates 
 obsolete/insecure/useless ?

 How does you handle client certificates after this heartbleed thing?
 Your opinions and knowlegde or specific links about client certificates and 
 heartbleed would be appreciated.

  If you change a private key with any of those things on the server,
 then the public (client) keys that access them would also need to be
 changed as well.  (The old ones would not work anyway).  If someone (bad
 guy who stole your private key) set up a server with the old key, the
 old clients would work with those (so that is why you need to change AND
 revoke your cert, not just change it on your machine :D)

This is an excellent write up:

http://www.theregister.co.uk/2014/04/09/heartbleed_vuln_analysis



signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-09 Thread Peter
On 04/10/2014 03:09 AM, Markus Falb wrote:
 
 I am assuming that client certificates are handed out to staff. Basically you 
 can't
 really control where people install client certificates and which client 
 software is used.
 If one is tricked to do a SSL Handshake with a malicious server, the key of 
 the client
 certificate is leaked. Reissue of the cert won't help because on the other 
 day there
 would be another malicious handshake with another bad server...

No, the server never sees a private client certificate, it only ever has
access to the public certificate, which by its very nature of being
public doesn't really matter if it gets leaked.  No vulnerability on the
server can expose a private client certificate, only a vulnerability on
the client can.


Peter
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-07 Thread Always Learning
Thank you.

What will the temporary packages be called ?


-- 
Paul.
England,
EU.

   Our systems are exclusively Centos. No Micro$oft Windoze here.

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] [CentOS-announce] CVE-2014-0160 CentOS 6 openssl heartbleed workaround

2014-04-07 Thread Always Learning

On Tue, 2014-04-08 at 03:30 +0100, Always Learning wrote:
 Thank you.
 
 What will the temporary packages be called ?#

I've answered my own question: openssl*

-- 
Paul.
England,
EU.

   Our systems are exclusively Centos. No Micro$oft Windoze here.

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos