Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • Servers

    Heartbleed SSL Encryption Vulnerability Requires Quick Attention

    Written by

    Wayne Rash
    Published April 10, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      According to our report on the discovery of a significant vulnerability to the Secure Sockets Layer (SSL) encryption service as it’s implemented in some versions of Linux, an exploit could reveal up to 64 kilobytes of memory in the affected server.

      The good news is that the OpenSSL Project issued a fix almost immediately, and passed it out as an update to Linux distributors. The bad news is that this vulnerability has been around for two years.

      There’s more good news: There’s no evidence that this vulnerability was ever exploited. But there’s more bad news, too: Because of the way this vulnerability works, we might not see evidence even if it had been exploited. Just how serious is this?

      Tatu Ylönen, Inventor of SSH encryption and CEO of the SSH security protocol, said that the problem is potentially bad. “This is an extremely serious vulnerability in OpenSSL,” Ylönen said in an email from his home in Helsinki, Finland.

      “An attacker can use it to obtain the encryption keys used by a web site, allowing an attacker or spy agency to read all communications. It can practically be used to obtain the server private key used for securing the server and communications to it, essentially breaching the certificates used for protecting the web site, which in turn allows decrypting past sessions as well as performing man-in-the-middle attacks (including banking fraud and identity theft) in most cases.”

      Ylönen said that about two-thirds of the world’s Websites use the encryption library affected by the vulnerability, which is OpenSSL 1.0.1. Any of those sites could have been compromised. He said that these include major commerce sites, social networking and banking sites.

      Because the encryption keys themselves may have been stolen from compromised Websites, the importance of keeping keys safe is underscored. Unless the keys were kept secure and encrypted, the chance that they could be stolen during a breach is high, according to Richard Mould, vice president of Strategy for Thales e-Security.

      “Once again the importance of sound key management has been brought into sharp focus,” Mould told eWEEK. “The Heartbleed bug found in OpenSSL, one of the most common means of encrypting data on the internet, increases the risk that encryption keys can be stolen. An attacker that can access these keys can decrypt any data that has been previously encrypted using those keys and probably any future data until each key is changed. Updating keys is expensive and time consuming and the impact of a loss can be very damaging.”

      Ylönen said that once the SSL encryption had been broken, it’s likely that passwords normally protected by SSL had also been compromised.

      Heartbleed SSL Encryption Vulnerability Requires Quick Attention

      “THIS PARTICULARLY INCLUDES NATIONAL AND INTERNATIONAL INTELLIGENCE AGENCIES [emphasis his] who routinely record all traffic and can now use or have used the vulnerability to read the private keys needed for decrypting the recorded historic data,” he wrote.

      This means that if someone, such as a national spy agency or organized cyber-criminals, was trying to read the data from your company as it crossed the public Internet and recorded it, they can go back and decrypt the material they’ve captured.

      So now what? If the Heartbleed exploit was used against any site with which you connect, it means that at the very least you need to change your security credentials. This includes changing all of those passwords that you never could remember.

      If your company is vulnerable, meaning you were running a Linux server or otherwise using OpenSSL, Ylönen has some suggestions:

      Companies should “upgrade their OpenSSL library to version 1.0.1g” and “create a new private key, generate a certificate request, and purchase a new certificate from their CA (certificate authority) and install the new key,” Ylönen wrote, noting that “this must be done for each web site supporting SSL/TLS (https: addresses).”

      At this point, as I said earlier, there’s no evidence that cyber-criminals have exploited this vulnerability, but you need to be sure. This means that if you’re using a Linux server running Web services from an open source server, you likely are vulnerable. If you connect to such a server using SS:/TLS, your protected data may have been compromised.

      However, if the server in question runs Windows Server of some sort, chances are you weren’t compromised as the vulnerability exists only on open source platforms. Ylönen said that a Website has been set up to provide information about this problem. He also noted that the SSH protocol used by system administrators was not affected.

      Sadly, this is one of those situations in which a minor change designed to make life easier for users of SSL turned out to be the problem. This particular bug surfaced as part of an effort to provide a steady “heartbeat” from a secure system so that the server on the other end of a connection would realize the connection was alive and wouldn’t need to perform a credentials handshake again.

      What’s worse, this is a situation where you could have done everything right, and still have been compromised. Of course, best practices recommend that you encrypt everything before its transmitted anywhere, regardless of whether you’re using SSL. That would have made all the difference in this case.

      To follow Wayne Rash on Google Plus, click here.

      To follow Wayne Rash on Twitter, click here.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.