Heartbleed?

Glocky

Drinking your tears
If you read until the end, you'll note that OSSL older than 2yrs is not impacted, and an emergency patch was released today for newer OSSL.
A lot of banking uses TLS (not OSSL or SSL). I've checked my sites: banking, Rogers, all on TLS 1.0 to 1.2, so I don't care too much. Even PayPal, FaceBook, Twitter are on TSL.

That's the good news. The bad news, there's no way of knowing if the exploit was used or where.
Check if your sites have been updated, then update all your passwords. Cross your fingers and hope.
 

Steve

TD Admin | Bacon
All my bank passwords are 123456qwerty. No fucks to give.

Then again, no money to be taken.
Or credit.


:feelscry:
 

OG buckshot jr

TD Admin
Fuck, I came late to the party. As glocky already stated, this affects SSL, which is open source. Most major institutions/companies will pay for TLS, which as we know it, isn't broken. Those who want your data already have it, the only difference this time around is things like the Canadian Revenue Agency and a few other important ones had a breach, which is quite significant. But that's the IT game, cat and mouse all day every day...
 

zackychuu

TD Admin / Wanker
Helpful list, Cock
Seems I would only have to change Facebook, Instagram, Tumblr, Google (although they said you may not need too) and Minecraft.
None of which are particularly important but I should get round to that either way.
 

MetalLobster

TD Admin
The bug is poor implementation of the TLS heartbeat extension. Read the relevant RFC...

"If a received HeartbeatResponse message does not contain the expected payload, the message MUST be discarded silently. If it does contain the expected payload, the retransmission timer MUST be stopped." - RFC 6520, Sec. 4

"If the payload_length of a received HeartbeatMessage is too large, the received HeartbeatMessage MUST be discarded silently." - RFC 6520, Sec 4.

The source code in OpenSSL didn't do this. It just checked the payload if it's not zero and memcpy the request. Also, the code only checked if the request surpassed 64K. It did not do any kind of comparison AFAIK.
 

Siege918

I'm New Here
Might be easy to overlook, but don't forget that you should change any passwords anywhere that uses the same password as a social network. I started using a password manager after this, just so I'll always have a list of every password I need to change and ensure that I don't have duplicates. LastPass seems to work pretty well.
 
Top