INFOCon Green: Heartbleed - on the mend
We are going back to INFOCon Green today. Things have stabilized and the INFOCon is used to indicate change. Awareness of Heartbleed is well saturated and Internet teams everywhere appear to be responding appropriately.
Some points to be aware:
- Patching will continue and hopefully fill remaining gaps.
- Certificate Revocation Lists (CRLs) will grow, which may lead to slower load times in some cases. Please let us know if you are observing CRL issues.
- There is no practical way to identify if a certificate has actually been updated, unless you recorded the certificate serial number. It is common to check the creation date, BUT a CA can re-issue a new certificate and keep the original creation date. This is silly but should be noted.
- The client side (wget, curl, etc...) of Heartbleed is mostly a non-issue, but there are a few exceptions. Watch for VPN client updates.
- Certificates continue to be revoked. We have taken the liberty to look at the CRL counts of sixteen different CA's since April 1, 2014.
In summary, please keep scanning and patching all of your servers and encourage all end users to change their passwords after a site's certificate has been updated.
-Kevin
--
ISC Handler on Duty
×
Diary Archives
Comments
Anonymous
Apr 14th 2014
1 decade ago
- https://blogs.akamai.com/2014/04/heartbleed-update-v3.html
April 13, 2014 7:20 PM
.
Anonymous
Apr 14th 2014
1 decade ago
I'm assuming the former, as I'm not immediately sure why the numbers would drop unless it just happened that some certificates expired on those dates.
Anonymous
Apr 15th 2014
1 decade ago
I have seen certificates issued with a start date 1-1-1980, as otherwise PDAs would fail conncting to WiFi, verifying the AP certificate. The PDAs would reset their own date when running out of battery.
Only 2 other solutions would be to let the usrrs get out of the dedicated app, and into the clock setting app, or to disable validation of APs certificate. Both lowering security.
Anonymous
Apr 15th 2014
1 decade ago
Anonymous
Apr 15th 2014
1 decade ago
HSM devices could have reduced the impact a lot if used correctly, but no-one actually seems to use those for web related stuff. It would be interesting to read some stories about experiences of those who did use HSM (or TPM) devices to protect their private keys.
Anonymous
Apr 15th 2014
1 decade ago
Anonymous
Apr 15th 2014
1 decade ago
CRLs are not updated often. For example, one of the Godaddy CRLs is updated every 36 hrs. Let me add that data to the new CRL page we just put together (https://isc.sans.edu/crls.html ). should be there in a couple hours. Right now, I am pulling the CRL data every 5 hrs but should probably start using the "next update" data instead.
Anonymous
Apr 16th 2014
1 decade ago
August 21, 2014
Although the Heartbleed bug was revealed months ago, it continues to cause security problems for companies.
The most recent example is the data breach at Community Health Systems, which resulted in the largest theft of civilian patient records in U.S. history.
CMS claimed that the theft was carried out by a Chinese hacker group that injected malware into the hospital's computer network and siphoned off the patient data.
Reports are now circulating that the hackers exploited the Heartbleed bug to gain initial access to the CHS network. In a blog posted this week, TrustedSec said analysis it conducted indicates that the "initial attack vector" was through Heartbleed.
"This confirmation of the initial attack vector was obtained from a trusted and anonymous source close to the CHS investigation. Attackers were able to glean user credentials from memory on a CHS Juniper device via the Heartbleed vulnerability (which was vulnerable at the time) and use them to login via a VPN," the blog relates.
Heartbleed continues to pose a grave security risk to firms. According to a study by security firm Venafi release in August, a disturbing "97 percent of Global 2000 organizations remain vulnerable to Heartbleed because they have not replaced vulnerable keys or revoked and replaced digital certificates."
In addition, an advisory issued last month by the Industrial Control Systems Cyber Emergency Response Team warned that critical industrial control systems made by Siemens remain vulnerable to Heartbleed.
It's time for enterprises to take Heartbleed seriously and implement the steps needed to plug the vulnerability--or risk being front-page news for another record-breaking data breach.
Anonymous
Aug 26th 2014
1 decade ago