1 / 12

Open SSL Heartbleed bug

RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL session. 2. Used in MTU path discovery Why is this a problem? Heartbeat requests can be sent WITHOUT authentication to the server.

phuoc
Download Presentation

Open SSL Heartbleed bug

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL session. 2. Used in MTU path discovery Why is this a problem? Heartbeat requests can be sent WITHOUT authentication to the server. Open SSL Heartbleed bug

  2. CVE-2014-0160 describes the SSL Heartbleed bug • Vulnerable versions of OpenSSL do not validate user input for the memory length value. • Bug was introduced into OpenSSL version 1.0.1 code in March 2012 • Non affected versions; .99 and 1.0.0 forks • Affected version 1.0.1 through 1.0.1f • Patched in 1.0.1g • Introduced to the code in Nov 2011, it was committed to the code on Dec 31, 2011 just before midnight.

  3. What exactly is bleeding? • The bug allows attackers to grab 64K chunks of memory contents near the SSL heartbeat on a vulnerable host. • It is random chunks of data in this memory space – ASLR helps in this situation • Attack can be repeated many times to grab different random chunks of data • 64k does seem like much - but it is!

  4. Memory disclosure: what exactly can an attacker get? • 1. Private crypto keys - the keys to the kingdom, or at least the server. • 2. Usernames and Passwords • 3. Session identifiers • 4. Private data – data payloads • 5. Meta data for the SSL session, programming structure pointers - may defeat other exploit protections.

  5. Geeky details, the 4 part heartbeat • 1. SSL V3 RECORD LENGTH (should be limited to 4 bytes) • 2. Heartbeat Message Type (1Byte) • 3. HEARTBEAT MESSAGE (should be limited to 2 bytes BUT IT'S NOT) • When the victim machine replies there is an extra 64k (-1byte) of memory of the server process returned to the attacker. • 4. Message Data (variable bytes)

  6. Untraceable and undetectable = No! • Many news media sites are saying this attack is untraceable. Not exactly true. • There is no logging of the session beyond normal SSL negotiation. • The attack is detectable.

  7. So what can I do? • Coordinate with vendors to get vulnerable devices patched or replaced. At a minimum, revoke and reissue vulnerable certs. • IT did this late last week for the Juniper VPN concentrator. • Change passwords - even if a vendor says their product was not vulnerable, they CANNOT guarantee any business partners products were not vulnerable. • Monitor carefully for any evidence of identity theft. • Prepare for phishing and social engineering campaigns leveraging Heartbleed into scaring people into divulging credentials.

  8. Server side attacks • But I'm not running a web server so I'm safe. Yeah right! • But Windows products are not affected so I'm safe. Not even! • While Windows servers are not directly affected, many use SSL to link to other servers. • I checked everything using TCP port 443. I'm safe right? No.

  9. Client side attacks • A full accounting of vulnerable clients is not yet known. • An attacker can redirect traffic to a vulnerable server they control and exploit this vulnerability. • this hasn't been seen yet but it's only a matter of time. • Be wary of "secure" network clients. • Restrict use of unknown public wireless unless you know your client is safe.

  10. Safe(r) Browsers • Firefox, Chrome, and IE (on Windows) use the Microsoft implementation of SSL not OpenSSL. • Internet Informations Server/Services (IIS) are not vulnerable. • Yeah Microsoft! • Don't even think about asking about XP.

  11. What else? • Most Android devices are vulnerable. - No word on Chrome Books yet. • iOS and Mac OSX are not vulnerable. • -but some 3rd party iOS apps are. • Most Linux browsers are probably vulnerable. • 3rd party code using OpenSSL could be vulnerable - this will take time to discover.

  12. What is Information Security doing? • Continuous monitoring for this vulnerability with both IDS and IPS devices. • Vulnerability scans. - not as effective since it's a snapshot in time but a good starting point.

More Related