Push-Nachrichten von MacTechNews.de
Würden Sie gerne aktuelle Nachrichten aus der Apple-Welt direkt über Push-Nachrichten erhalten?
Forum>Software>OpenSSL Bug lässt Internet zittern

OpenSSL Bug lässt Internet zittern

Dom Juan08.04.1423:43

Angreifer können damit seit 2011 ohne Spuren zu hinterlassen Passwörter, geheime Daten und so ziemlich alles andere abgreifen.

Sounds like fun…
This afternoon, many of the net security people I know are freaking out. A very serious bug in OpenSSL — a cryptographic library that is used to secure a very, very large percentage of the Internet’s traffic — has just been discovered and publicly disclosed.

Even if you’ve never heard of OpenSSL, it’s probably a part of your life in one way or another — or, more likely, in many ways. The apps you use, the sites you visit; if they encrypt the data they send back and forth, there’s a good chance they use OpenSSL to do it. The Apache web server that powers something like 50% of the Internet’s web sites, for example, utilizes OpenSSL.

Through a bug that security researchers have dubbed “Heartbleed“, it seems that it’s possible to trick almost any system running any version of OpenSSL from the past 2 years into revealing chunks of data sitting in its system memory.

Why that’s bad: very, very sensitive data often sits in a server’s system memory, including the keys it uses to encrypt and decrypt communication (read: usernames, passwords, credit cards, etc.) This means an attacker could quite feasibly get a server to spit out its secret keys, allowing them to read to any communication that they intercept like it wasn’t encrypted it all. Armed with those keys, an attacker could also impersonate an otherwise secure site/server in a way that would fool many of your browser’s built-in security checks.

And if an attacker was just gobbling up mountains of encrypted data from a server in hopes of cracking it at some point? They may very well now have the keys to decrypt it, depending on how the server they’re attacking was configured (like whether or not it’s set up to utilize Perfect Forward Secrecy.)

The exploit relies on a bug in the implementation of OpenSSL’s “heartbeat” feature, hence the “Heartbleed” name. Security firm Codenomicon has written an in-depth breakdown of the Heartbleed bug here.

To quote their findings:

We have tested some of our own services from attacker’s perspective. We attacked ourselves from outside, without leaving a trace. Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication.
It seems the bug has been in OpenSSL for 2+ years (since December 2011, OpenSSL versions 1.0.1 through 1.0.1f) before its publicly announced discovery today. Even worse, it appears that exploiting this bug leaves no trace in the server’s logs. So there’s no easy way for a system administrator to know if their servers have been compromised; they just have to assume that they have been.

The bug was discovered and reported to the OpenSSL team by Neel Mehta of Google’s security team. OpenSSL released an emergency patch for the bug along with a Security Advisory this afternoon.
0

Kommentare

sierkb09.04.1400:18
Lasse Dir im Terminal unter OSX (hier: 10.9.2) mal die Versionsnummer des systemeigenen OpenSSL anzeigen:

$ openssl version
OpenSSL 0.9.8y 5 Feb 2013
OpenSSL Security Advisory (07 Apr 2014)
OpenSSL Security Advisory (07 Apr 2014)
========================================

TLS heartbeat read overrun (CVE-2014-0160)
==========================================

A missing bounds check in the handling of the TLS heartbeat extension can be
used to reveal up to 64k of memory to a connected client or server.

Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
1.0.1f and 1.0.2-beta1.


Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
preparing the fix.

Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.

1.0.2 will be fixed in 1.0.2-beta2.

Quelle: OpenSSL Security Advisory (07 Apr 2014)

Versionen vor der aktuellen 1.0.1 wie das auf älteren Systemen noch verbreitete OpenSSL 0.9.8 sind offenbar nicht betroffen.


Also anscheinend kein aktuell dringender Handlungsbedarf bei OSX, weil hier ein veraltetes OpenSSL verwendet wird, das von diesem aktuellen Problem, das sich erst ab OpenSSL Version 1.0.1 zeigt, nicht betroffen zu sein scheint.
Mal sehen, ob es dabei bleibt.
0
flowgrow
flowgrow09.04.1401:41
es geht hier doch vor allem um die openssl version die am server rennt, nicht die die am client (dein mac) läuft
„Chuck Norris hat mehr Kreditkarten als Max Mustermann!“
0
sierkb09.04.1402:59
flowgrow:

Beide sind relevant. Server UND Client. Oder was nutzen z.B. Mail.app und Web-Browser wie z.B. Safari, wenn sie SSL-verschlüsselte Kommunikationsverbindungen herstellen wollen? Die nutzen dazu das systemseitig implementierte OpenSSL bzw. TLS/DTLS. Durch was sollten sie sonst die Fähigkeit dazu haben?
0
sierkb09.04.1403:46
Oben, in der von mir zitierten Eintragung auf OpenSSL.org steht zudem ja auch "A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server".

Und hier ist auf Nachfrage Folgendes zu lesen:
Yes, clients are vulnerable to attack.

A malicious server can use the Heartbleed vulnerability to compromise an affected client. Sources below (all emphasis below is mine).

heartbleed.com :
Why it is called the Heartbleed Bug?
Bug is in the OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). When it is exploited it leads to the leak of memory contents from the server to the client and from the client to the server.

Ubuntu Security Notice USN-2165-1 :
An attacker could use this issue to obtain up to 64k of memory contents from the client or server

RFC6520 :
5. Use Cases
Each endpoint sends HeartbeatRequest messages...

OpenSSL Security Advisory 07 Apr 2014 :
A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server.

Information on common clients:
  • Windows (all versions): Probably unaffected (uses SChannel/SSPI), but attention should be paid to the TLS implementations in individual applications. For example, Cygwin users should update their OpenSSL packages.
  • OSX and iOS (all versions): Probably unaffected. SANS implies it may be vulnerable by saying "OS X Mavericks has NO PATCH available", but others note that OSX 10.9 ships with OpenSSL 0.9.8y, which is not affected. Apple says : "OpenSSL libraries in OS X are deprecated, and OpenSSL has never been provided as part of iOS"
  • Chrome (all platforms except Android): Probably unaffected (uses NSS)
  • Chrome on Android: 4.1.1 may be affected (uses OpenSSL). 4.1.2 should be unaffected, as it is compiled with heartbeats disabled.
  • Mozilla products (e.g. Firefox, Thunderbird, SeaMonkey, Fennec): Probably unaffected, all use NSS

Siehe dazu auch:
Apple, iOS Developer Library
OpenSSL

Although OpenSSL is commonly used in the open source community, OpenSSL does not provide a stable API from version to version. For this reason, although OS X provides OpenSSL libraries, the OpenSSL libraries in OS X are deprecated, and OpenSSL has never been provided as part of iOS. Use of the OS X OpenSSL libraries by apps is strongly discouraged. If your app depends on OpenSSL, you should compile OpenSSL yourself and statically link a known version of OpenSSL into your app. This use of OpenSSL is possible on both OS X and iOS. However, unless you are trying to maintain source compatibility with an existing open source project, you should generally use a different API. Common Crypto and Security Transforms are the recommended alternatives for general encryption. CFNetwork and Secure Transport are the recommended alternatives for secure communications.
Quelle:

OSX und iOS sind also vom aktuellen OpenSSL-Heartbeat-Problem insofern nicht betroffen und aus der Schusslinie, als dass OSX einerseits eine veraltete OpenSSL-Implementierung mit sich trägt, die, so komisch das klingen mag, aufgrund ihres Alters nicht betroffen ist (dafür deshalb aber andere Dinge nicht kann wie z.B. TLS 1.2 und deshalb unsicherer ist als aktuellere Versionen) und die andererseits von Mac-Anwendungen gar nicht genutzt wird zugunsten einer Apple-eigenen TLS/SSL Secure Transport engine. Welche leider in der jüngsten Vergangenheit (Februar 2014) ihrerseits ihre ganz eigenen Fehler und seinen GAU gezeigt und für Aufsehen gesorgt hatte ("goto fail-Bug").
0
Semmelrocc
Semmelrocc09.04.1409:58
Es ist sicherlich nicht verkehrt, jetzt mal ein paar wichtige Passwörter von Online-Diensten auszutauschen. Wer weiß, wer die Informationen in den letzten zwei Jahren schon abgegriffen hat ...
0
sierkb09.04.1410:05
Semmelrocc:

Das ist sicherlich nicht das Falscheste. Sollte man sowieso mal alle paar Wochen oder Monate machen, völlig unabhängig von der momentanen Situation.
0
Dom Juan09.04.1412:46
Semmelrocc
Es ist sicherlich nicht verkehrt, jetzt mal ein paar wichtige Passwörter von Online-Diensten auszutauschen. Wer weiß, wer die Informationen in den letzten zwei Jahren schon abgegriffen hat ...
Nö. Da man die ja scheinbar völlig Problemlos umgehen kann, ist das Password irrelevant.
0

Kommentieren

Diese Diskussion ist bereits mehr als 3 Monate alt und kann daher nicht mehr kommentiert werden.