Singletrack vulnera...
 

MegaSack DRAW - This year's winner is user - rgwb
We will be in touch

[Closed] Singletrack vulnerable to heartbleed

87 Posts
30 Users
0 Reactions
540 Views
Posts: 894
Free Member
Topic starter
 

I'm sure some of you have read about the recently discovered 'heart bleed' vulnerability found in the OpenSSL protocol that exposes potentially all secured data that passes through an exposed server.
There is a site checker available here.. [url= http://filippo.io/Heartbleed/ ]Heartbleed Checker[/url]

Unfortunately, singletrack is vulnerable and will remain so until the server is patched and a new certificate is issued.
While this may not seem all that important for those of us that simply log in to post nonsense on the forum, anyone with a subscription has potentially exposed private information.
It is recommended by the security experts that you not use the sites affected until they are patched and re-certified. There is no real point in changing passwords until the server is patched as any new password would be immediately exposed.

If you are interested in reading more there is information available here.. [url= http://heartbleed.com ]Heartbleed Bug[/url]

Mod Edit: You can read our response here http://singletrackworld.com/forum/topic/important-info-about-your-st-account-please-read


 
Posted : 09/04/2014 9:11 am
Posts: 251
Full Member
 

*reported*

[edit] is this spam? Or just odd.


 
Posted : 09/04/2014 9:15 am
 Tom
Posts: 0
Free Member
 

Thank you for bringing this to our attention. We have patched our SSL and all indications are that we are not vulnerable to this bug. In the future, PLEASE send concerns to security@ singletrackworld.com or tech@
Thanks.


 
Posted : 09/04/2014 9:56 am
Posts: 0
Free Member
 

Really, genuinely, not what I was expecting of this thread.


 
Posted : 09/04/2014 9:58 am
 DezB
Posts: 54367
Free Member
 

Awesome! I thought this was a cutting post about the "bleeding hearts" on here, but it's actually a real network vulnerability. (I think) 😀


 
Posted : 09/04/2014 9:59 am
Posts: 894
Free Member
Topic starter
 

Apologies for the alerting you to this via the forum. As far as I can see you are correctly patched now.
I assume you are considering whether to recommend that everyone changes their passwords. Does your credit card validation run through a seperate server and was it also compromised for a while.?


 
Posted : 09/04/2014 9:59 am
Posts: 0
Full Member
 

Sinister poster freaks everyone out?

Or a Trollist?

Eitherway..

I..B...T....


 
Posted : 09/04/2014 10:01 am
Posts: 0
Free Member
 

Was hoping for an advert for a singles ride. Scuttles off...


 
Posted : 09/04/2014 10:03 am
Posts: 8937
Full Member
 

Alas chaps, this is a valid and genuine concern across the internet right now. In fact, I've spent the last 24 hours doing seemingly nothing else but dealing with the fallout from this wonderful finding...

Still, it pays the bills.


 
Posted : 09/04/2014 10:08 am
 Tom
Posts: 0
Free Member
 

Yes, quite a bug. We do not process credit cards or bank details on our servers, so they will not have been exposed. We also limit other data stored on them. It is possible that passwords entered over the last day may have been exposed. We recommend regularly changing your password, and not using the same password on this site as you do on others.


 
Posted : 09/04/2014 10:11 am
Posts: 894
Free Member
Topic starter
 

On the plus side, thanks to the publicity it has gotten in the last few days, it seems that the fixes are rolling out very quickly as everyone is ensuring they are patched.
Even those that are taking a little longer to patch the bug seem to have taken the sensible precaution to simply disable the feature that is exploited in order to minimise risk while they patch and get recertified.

It should be pointed out that the recertification part is important here as the bug allows anyone who gains access to the server to get hold of your private key and therefore they can access the secure data even after the patch is applied unless a key is generated and a new certificate issued.


 
Posted : 09/04/2014 10:23 am
Posts: 0
Full Member
 

If I'm reading this right (and not just this page and links) we should be looking at revoking certificates and reissuing as well as patching, on a risjk assessed basis? Is that what others here are looking at too? As you can't be sure what has already been compromised.. if 'they' have the keys patching alone isn't sufficient to prevent reading the encrypted content.

EDIT: LoL, cross over of posts 🙂


 
Posted : 09/04/2014 10:32 am
Posts: 894
Free Member
Topic starter
 

Exactly right. If you have been compromised while unpatched then it's literally like having your house broken into and your keys stolen, getting the broken window fixed but not changing the locks.!


 
Posted : 09/04/2014 10:35 am
Posts: 5807
Free Member
 

On the plus side, thanks to the publicity it has gotten in the last few days, it seems that the fixes are rolling out very quickly as everyone is ensuring they are patched.

I think this has had remarkably little publicity for such a serious vulnerability, I only heard about it last night.


 
Posted : 09/04/2014 10:49 am
Posts: 894
Free Member
Topic starter
 

The vulnerability only became public knowledge on the 7th April.


 
Posted : 09/04/2014 10:53 am
Posts: 0
Full Member
 

In that case, oh balls. Bit of work to do then..


 
Posted : 09/04/2014 11:00 am
Posts: 894
Free Member
Topic starter
 

What I do find concerning is that so far there has been little to no rollout of information to potentially compromised customers with advice on changing passwords/login details and c/card details that may have been compromised.
I'd also been a bit concerned about how many 'less well informed' admins are simply patching the error without having their private key re-generated and a certifaicate reissue. As always in these cases it's a battle between customers who want all the information so they can decide how far they need to go in securing themselves and the business that does not want to appear 'unsecure' by issuing a blanket 'we may have been compromised and given away all your data' notice to all their customers.

I mean to put the severity of this in perspective, the people who administer the TOR network are recommending not using the Internet AT ALL until the fixes have been rolled out across the network. Now they are highly security conscious and therefore likely to err on the side of extreme caution in these cases, but that gives you an idea of how potentially serious this is.
Any compromised site has NO WAY of knowing what data they may have given up or how many people have taken it..


 
Posted : 09/04/2014 11:00 am
 D0NK
Posts: 592
Full Member
 

How are paypal fairing in this? (fingers crossed it's [i]probably[/i] the only one I need to worry about)


 
Posted : 09/04/2014 11:18 am
Posts: 12330
Full Member
 

[url= http://filippo.io/Heartbleed/#paypal.com ]Seems ok[/url]


 
Posted : 09/04/2014 11:23 am
Posts: 894
Free Member
Topic starter
 

Paypal seems to be patched. No way of knowing if they were compromised in the past. With them I would highly recommend enabling their 2 factor authentication for your login as a way of further securing your account. I'd actually recommend enabling 2 factor authentication whenever you can. I know that Google, Dropbox, Apple, Paypal and Microsoft offer it on their accounts, there are likely more but you'd have to check with accounts that you have.


 
Posted : 09/04/2014 11:25 am
Posts: 8937
Full Member
 

Aye, two-factor auth makes a lot of sense in any sort of internet facing deployment.


 
Posted : 09/04/2014 11:29 am
 D0NK
Posts: 592
Full Member
 

Paypal seems to be patched. No way of knowing if they were compromised in the past.
yeah as you said further up even if they are patched [i]right now[/i] accounts may still be compromised.


 
Posted : 09/04/2014 11:30 am
Posts: 894
Free Member
Topic starter
 

The tricky thing with this problem is that there is no real way of knowing just how long the 'crooks' have been aware of it and taking advantage of it, the bug has been 'in the wild' since 14th of March 2012, it was only discovered and patched by the honest folks a matter of days ago but someone dishonest could have known about it for going on 2years.!!!!
Additionally there is no way for a site to know if it has been compromised, the bug exposes the data in a way that shows up as normal usage in the server logs and it is therefore impossible to know if a site has lost data. Normally in a situation like this something abnormal shows up that exposes the attack and allows the site to identify what data has been compromised, in this case that is not possible.
Theoretically, there should be a blanket resetting of all passwords on all sites once they have patched themselves. I'd probably be looking at having any c/cards used online reissued once the leak is plugged too as there is a good chance that it's gotten out somewhere.
For example, I believe Amazon only patched itself yesterday, and I'm not sure what the status of their SSL certificate is


 
Posted : 09/04/2014 11:34 am
Posts: 894
Free Member
Topic starter
 

For those of you using Chrome, there is an extension that checks any site you are visiting for this vulnerability.

[url= https://chrome.google.com/webstore/detail/chromebleed/eeoekjnjgppnaegdjbcafdggilajhpic ]Chrome Heartbleed Extension[/url]


 
Posted : 09/04/2014 11:39 am
Posts: 894
Free Member
Topic starter
 

I'd like to see a LOT more of these in the next few days..

[url= http://arstechnica.com/security/2014/04/dear-readers-please-change-your-ars-account-passwords-asap/ ]Ars Technica issues password reset[/url]


 
Posted : 09/04/2014 11:48 am
Posts: 30656
Free Member
 

*reported*
[edit] is this spam? Or just odd.

Note to self: Don't go to wwaswas for IT security updates. 8)


 
Posted : 09/04/2014 12:01 pm
Posts: 0
Free Member
 

Have any exploits for this bug been seen in the wild yet?


 
Posted : 09/04/2014 12:08 pm
Posts: 894
Free Member
Topic starter
 

A list of most(all?) sites that support 2 factor authentication and how to enable it..

[url= http://evanhahn.com/2fa/ ]2 Factor Authentication list[/url]


 
Posted : 09/04/2014 12:09 pm
 Tom
Posts: 0
Free Member
 

Note to self

Don't laugh... 🙂
wwaswas was probably personally responsible for preserving a lot of privacy today.


 
Posted : 09/04/2014 12:11 pm
Posts: 251
Full Member
 

[i]Note to self: Don't go to wwaswas for IT security updates[/i]

It just seemed to have the classic spam pattern - seemingly random thread title, 'hidden' links to a non standard url (.io).

More like one of those 'visit our site and we'll infect your pc' posts.

I'm more than happy for lots and lots of people not to come to me for IT security updates 🙂

[thanks Tom!]


 
Posted : 09/04/2014 12:15 pm
Posts: 894
Free Member
Topic starter
 

It's going to be difficult if not impossible to tell if there have been exploits as it leaves no evidence. The only real way to tell would be for someone to steal the data and then exploit it en-mass thereby exposing the hack by virtue of so much data being compromised at once. Any sensible criminal is going to sit on the data and pick and choose what he steals and when.
The more I read up on this the scarier it sounds. It's possible that every currently issued SSL certificate will have to be revoked and blacklisted in order to be certain of re-established security. Unless this happens then there is a way to use the compromised private key to initiate a 'Man in the middle' attack even after a new certificate is issued.
As i read on another IT site, in terms of disaster level from 1-10, this bug registers an 11..


 
Posted : 09/04/2014 12:17 pm
Posts: 894
Free Member
Topic starter
 

Just so everyone knows, if you check the issue date of the certificate on any website you login to and the issue date is before 07/04/2014 then it has been potentially compromised and your data is at risk even if you update your password.

This is a HUGE deal folks, please don't fob this off as not affecting you. For example Amazon cannot be considered safe as of now. I am looking at there certificate information now and the certificate is almost a year old.!!!

If you don't know how to check, when you get to a login page on any site, BEFORE you login click on the little padlock next to the URL on the address bar of your browser, you can view the certificate information from there, if the issue date is before 7/4/2014 then the site cannot be considered safe and anything you do there is potentially at risk for being stolen.


 
Posted : 09/04/2014 12:40 pm
Posts: 251
Full Member
 

So given that all our sites run on Windows servers we're ok as we don't use open ssl?

or can someone stick something in an open source router that gives them the info they need?


 
Posted : 09/04/2014 12:41 pm
Posts: 0
Free Member
 

Ah.

Is this why I have been getting a security warning popup from Windows when using the STW login and search functions for the past few weeks?


 
Posted : 09/04/2014 12:45 pm
Posts: 894
Free Member
Topic starter
 

The server has to use OpenSSL for security, indications are that IIS is ok.
This is why it's only 66% of the internet that's potentially compromised rather than all of it. OpenSSL is the most popular implementation and is part of the standard install of Apache web server.


 
Posted : 09/04/2014 12:47 pm
Posts: 894
Free Member
Topic starter
 

Does this qualify as enough publicity.. currently on the front page @ BBC news..

[url= http://www.bbc.co.uk/news/technology-26954540 ]http://www.bbc.co.uk/news/technology-26954540[/url]


 
Posted : 09/04/2014 1:15 pm
Posts: 251
Full Member
 

xkcd did well;

[img] [/img]


 
Posted : 09/04/2014 1:30 pm
Posts: 12330
Full Member
 

Public urged to reset all passwords

Well that's blown it; anarchy iminent.


 
Posted : 09/04/2014 2:32 pm
Posts: 0
Free Member
 

Thanks for the warning, Highlander. Muchos membranos or something...


 
Posted : 09/04/2014 3:22 pm
Posts: 30656
Free Member
 

wwaswas was probably personally responsible for preserving a lot of privacy today.

You're right. He has been a true hero.

*salutes*

Does this qualify as enough publicity.. currently on the front page @ BBC news..

http://www.bbc.co.uk/news/technology-26954540

My only concern about that link, is:

Several tech firms are urging people to change all their passwords after the discovery of a major security flaw.

Probably best to make sure the site in question has patched to the newest version of OpenSSL, otherwise you're back to square one with having potentially compromised information.


 
Posted : 09/04/2014 4:31 pm
Posts: 77708
Free Member
 

You're behind square one. If you change your password on a compromised site you're giving it fresh credentials; ie, you're *more* at risk.


 
Posted : 09/04/2014 4:35 pm
Posts: 30656
Free Member
 

Well, like an ass, I was assuming the site had not been compromised yet. But you're correct, if the site has already had it's pants pulled down, and not been patched then...

[img] [/img]


 
Posted : 09/04/2014 4:35 pm
Posts: 894
Free Member
Topic starter
 

This is where I am starting to see some resistance. I got intouch with my hosting provider asking if they were patched and whether they are recertifying and got quite a snitty response saying that updates were done on a daily basis, the OpenSSL vulnerablilty had been patched and that revoking the SSL certificate was not necessary.!

This is where this could be a long running issue, any servers that do not recertify are essentially still open if their private key has been compromised. If that's the case then the patch is useless and their systems are wide open. As I understand it even where the certificate expires and is renewed the problem may still exist. The certificate has to be revoked to close the hole..


 
Posted : 09/04/2014 4:44 pm
Posts: 26
Full Member
 

It's not all sites out there mind, even those runing Apache/Nginx plenty are sat behind hardware load balancers (especially big, high throuput sites), which often use dedicated hardware, which usually isn't vulnerable.


 
Posted : 09/04/2014 5:03 pm
Posts: 894
Free Member
Topic starter
 

Could you elaborate.? I'm not sure exactly how a hardware load balancer would prevent this.?


 
Posted : 09/04/2014 5:05 pm
Posts: 12330
Full Member
 

Paypal gift suddenly gallops from the back of the field as the most secure payment option.


 
Posted : 09/04/2014 5:08 pm
Posts: 0
Free Member
 

I'm trying (and failing) to get a handle on the difference between potential leaks of data and guaranteed leaks of data.
The stories talk about being able to download private keys along with usernames and passwords.
As I understand, through a flaw you can download 64K chunks of data from the application.
What I can't seem to find out is -
Are these addressable chunks, random chunks, or do they all have the same memory offset?
Presumably the data memory downloadable is compiler dependent? (though I guess gcc does mem allocation in a fairly standard manner) So do all compilers / os / hardware platforms have the same vulnerable data in the same 64K segment?
Or am I misunderstanding something?


 
Posted : 09/04/2014 5:24 pm
Posts: 894
Free Member
Topic starter
 

Just typed out a huge explanatory post and realised that I was likely just going to make things more confusing..

Look here for a decent technical explanation..

[url= http://blog.existentialize.com/diagnosis-of-the-openssl-heartbleed-bug.html ]http://blog.existentialize.com/diagnosis-of-the-openssl-heartbleed-bug.html[/url]


 
Posted : 09/04/2014 5:39 pm
Posts: 894
Free Member
Topic starter
 

The upshot of it is, because of the nature of the bug, there is no way to know if or what has been stolen. Therefore you have to assume that EVERYTHING was stolen. Hence the calls for blanket revoking of SSL/TLS certificates and blanket changing of all passwords.

As the man said.. 'Nuke it from orbit, it's the only way to be sure!!'


 
Posted : 09/04/2014 5:43 pm
Posts: 77708
Free Member
 

Assuming the author can be trusted, the tweet on that explanation page is interesting.

@neelmehta

Heap allocation patterns make private key exposure unlikely for #heartbleed #dontpanic.

Though,

Neel Mehta has validated some of my concerns, but there are many reports of secret key discovery out there.


 
Posted : 09/04/2014 5:50 pm
Posts: 894
Free Member
Topic starter
 

It is unlikely in most circumstances.
You have to remember though that by running a relatively simple script someone could have been monitoring the contents of that memory basically constantly for the last 2 years.!! It's not inconceivable to assume that the data collected in that time can be reconstructed to form critical data.

The key here and the one that I hope sites are going to take to heart is that there is no way to know what might have been taken. However unlikely, they are going to have to assume that the keys to the kingdom have been copied and respond accordingly.


 
Posted : 09/04/2014 6:26 pm
Posts: 13594
Free Member
 

Probably find the whole thing was a bug added by the NSA and they've been leaching data for years......


 
Posted : 09/04/2014 6:38 pm
Posts: 894
Free Member
Topic starter
 

Interesting you should say that. OpenSSL is open source software and one of the key advantages of such is supposed to be that things like this don't happen due to the peer review like process that the code goes through. Given what everyone has been assuming about open source software for many years there has to be some serious questions asked about how it is written and maintained in mission critical situations. I can only imagine what kind of gleeful meetings they are having at Microsoft today. Their server infrastructure business might just have gotten a massive boost.


 
Posted : 09/04/2014 6:43 pm
Posts: 13594
Free Member
 

Nothing to stop the NSA anonymously checking in code to OS projects. They pretty much ran one of the encryption standards bodies and rigged one of the random number gens.


 
Posted : 09/04/2014 7:04 pm
Posts: 0
Free Member
 

Look here for a decent technical explanation..

http://blog.existentialize.com/diagnosis-of-the-openssl-heartbleed-bug.html

Thanks!


 
Posted : 09/04/2014 7:04 pm
Posts: 894
Free Member
Topic starter
 

Nothing at all.. but in theory they should be prevented from checking in malicious code as it would be spotted by other coders who look at it and figure out what they were up to.. Clearly something that isn't working as well as it should in this case.

Oh and you are very welcome Ian. 🙂


 
Posted : 09/04/2014 7:20 pm
Posts: 0
Free Member
 

My understanding is patching and new cents are required. I don't see how sticking an LB in front helps. Sure the LB depending on OpenSSL version itself may not be vulnerable but what's behind it is.
Happy to be corrected by someone more geeky 🙂

Don't see the point in changing passwords until it's verified all aspects of the vulnerability are removed.


 
Posted : 09/04/2014 7:22 pm
Posts: 894
Free Member
Topic starter
 

In actual fact, changin passwords before the site is patched and certificate re-issued could actually make you MORE vulnerable. If the site is being monitored this way then you logging in to change your password makes you more likely to be caught than by simply staying away until it's fixed.. Basically everyone needs to unplug and go for a ride for a day or two until this is fixed..


 
Posted : 09/04/2014 7:29 pm
Posts: 0
Free Member
 

+1 and the most sense I've heard all day


 
Posted : 09/04/2014 7:32 pm
 Tom
Posts: 0
Free Member
 

if the issue date is before 7/4/2014 then the site cannot be considered safe
My understanding is that certificates are often reissued with the original issue date.


 
Posted : 09/04/2014 8:02 pm
Posts: 894
Free Member
Topic starter
 

My understanding is that this is possible but is not the default way it works.
Yahoo for example has had a new certificate issued that started yesterday. I'm not up to speed with the way certificates are issued but I believe it may need to be issued as a new certificate because the private key needs to be regenerated, a standard re-issue of a cert would not regenerate this key. Seeing as the key is what's been stolen potentially, getting a new cert issued without a new key is totally pointless.

Please note I could be wrong on that point. However getting keys re-issued with the original start date is hardly going to help rebuild shattered confidence. I'd have thought affected sites would be trumpeting about their shiny new, secure certificate.


 
Posted : 09/04/2014 8:11 pm
 dh
Posts: 0
Free Member
 

captainslow - depending on the load balancer config, that will normally terminate the ssl connection first then start the connection to the next destination, using its implementation of ssl (perhaps it is openssl or not), sometimes offloading the calculations to dedicated hardware cards.

e.g. my citrix load balancers run openssl, but dont run the affected versions (slightly older) so its all a-ok for me.

Where are all the open-source zealots today? 😯

oh if you have cisco read this: [url= http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed ]cisco[/url]

vsphere [url= http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2076225 ]this[/url]

Its just a ploy for us to take our eyes of the XP systems that will be getting pwoned today of course.


 
Posted : 09/04/2014 8:18 pm
Posts: 894
Free Member
Topic starter
 

😆

If you believe the speculation, pwoned is an understatement. The theory is that the hacker groups have been saving up all the undocumented exploits, security holes and bugs in XP until today. Now that Microsoft has washed their hands of it, it's open season.!!


 
Posted : 09/04/2014 8:32 pm
 dh
Posts: 0
Free Member
 

yup - theory. where are they all then?


 
Posted : 09/04/2014 8:42 pm
Posts: 30656
Free Member
 

The first of many I assume.

[img] [/img]


 
Posted : 09/04/2014 9:07 pm
Posts: 0
Free Member
 

Thx dh


 
Posted : 09/04/2014 9:55 pm
 dh
Posts: 0
Free Member
 

well if you use strava you certainly might be asking questions...

[url= https://lastpass.com/heartbleed/?h=strava.com ]too busy with KOMs strava admin team?[/url]


 
Posted : 09/04/2014 10:05 pm
Posts: 6773
Full Member
 

I feel old.........


 
Posted : 09/04/2014 10:06 pm
Posts: 894
Free Member
Topic starter
 

Here's another one.. glad to see that at least some sites are attacking this headon..

[url= https://www.wunderlist.com/blog/how-we-fixed-the-heartbleed-bug ]Wunderlist[/url]


 
Posted : 09/04/2014 10:19 pm
Posts: 894
Free Member
Topic starter
 

Not sure if this makes it better or worse but it looks like there is some evidence that the bug has been exploited for at least several months... Better, because it looks like it may be possible to identify an attack (assuming you were logging to the right level), much much worse because it means that it was a known exploit in the community and has been used in anger.!!

[url= http://arstechnica.com/security/2014/04/heartbleed-vulnerability-may-have-been-exploited-months-before-patch/ ]Heartbleed may have been exploited[/url]


 
Posted : 10/04/2014 12:32 am
Posts: 26
Full Member
 

@Highlander -sorry been busy.

Most times if you're using a hardware (or 'clever' software) load balancer, you're going to terminate SSL on that device. While some lower end devices might use OpenSSL, the bigger payers will have something like a Cavium Nitrox SSL processing chip, which won't be vulnerable to this attack (but might be to others, of course). Better software load balancers might have a different proprietary stack also.

Often,the range of ciphers supported by hardware is smaller than OpenSSl so it's possible if the device is configured away from the default that it might fall back to OpenSSL, which could be a vulnerable version.

However, I'd say that in general sites which are using high end Application Delivery Controllers (posh load balancers) are less likely to be vulnerable to this and other TLS based attacks.


 
Posted : 10/04/2014 4:02 am
Posts: 13251
Full Member
 

It would appear that both ebay and PayPal still have old certificates in place.

On a work related note I'm in for some headaches today.


 
Posted : 10/04/2014 4:40 am
 Tom
Posts: 0
Free Member
 

There is some useful information about certificate issue dates here:
https://news.ycombinator.com/item?id=7563095

Our Digicert cert has been revoked, rekeyed, and reissued, retaining the original date. There are some other high profile sites who were previously vulnerable, and must surely have revoked and rekeyed, but have retained old issue dates. Lastpass.eu and stackoverflow for example.


 
Posted : 10/04/2014 4:59 am
Posts: 1048
Free Member
 

I'm looking forward to work today. There's going to be more dancing around the issue than a Michael Flately production.


 
Posted : 10/04/2014 6:30 am
Posts: 251
Full Member
 

One thing to bear in mind that this is going to give the people who email you fake 'reset your password and give us your bank details' emails a field day. Everyone will believe they are genuine.

If you're going to reset your password as a result of an email notification type the url into a browser, don't follow a link.


 
Posted : 10/04/2014 6:46 am
Posts: 0
Free Member
 

Easy way to test whether sites of interest are potentially at risk

https://www.ssllabs.com/ssltest/


 
Posted : 10/04/2014 7:00 am
Posts: 41
Free Member
 

If you're like me and have a passing interest into the background of this, but struggle to understand all the connected elements, I thought this was quite a good "plain-English" explanation of what has happened:

[url= http://www.newyorker.com/online/blogs/elements/2014/04/the-internets-telltale-heartbleed.html ]http://www.newyorker.com/online/blogs/elements/2014/04/the-internets-telltale-heartbleed.html[/url]


 
Posted : 10/04/2014 12:08 pm
Posts: 0
Free Member
 

I am still getting a security warning when logging into STW -

[i]Although this page is encrypted, the information you have entered is to be sent over an unencrypted connection and could easily be read by a third party.

Are you sure you want to continue sending this information?[/i]

Never used to get this until the past week or so. Not computer savvy really. Is this related to the current problem or something else?


 
Posted : 10/04/2014 12:13 pm
Posts: 12500
Full Member
 

Thanks, rj2dj, good article.


 
Posted : 10/04/2014 12:35 pm
Posts: 1048
Free Member
 

As expected. Apparently our VPN having the vulnerability is 'not a big deal'.

🙄


 
Posted : 10/04/2014 7:38 pm
Page 1 / 2