Cryddit (OP)
Legendary
Offline
Activity: 924
Merit: 1132
|
|
April 08, 2014, 05:41:20 PM |
|
OpenSSL has been revealed to have a huge gaping hole. http://www.bbc.com/news/technology-26935905Those who have been securing communications using https (which is essentially all of us) should change all passwords they have used with those systems. Those who have used the same password in https that they have used to encrypt their wallets - yeah, you can figure that out, right? An attacker may have the old password. You should be using a different one.
|
|
|
|
blacksails
|
|
April 08, 2014, 06:03:40 PM |
|
OpenSSL has been revealed to have a huge gaping hole. http://www.bbc.com/news/technology-26935905Those who have been securing communications using https (which is essentially all of us) should change all passwords they have used with those systems. Those who have used the same password in https that they have used to encrypt their wallets - yeah, you can figure that out, right? An attacker may have the old password. You should be using a different one. This is quite bad. That'd mean I'd have to change almost all of my passwords… Geez, that will take some time! At least my wallet is encrypted with a completely different password.
|
|
|
|
bitcoiner49er
|
|
April 08, 2014, 06:04:44 PM |
|
Nevermind
|
Homo doctus is se semper divitias habet
|
|
|
bitpop
Legendary
Offline
Activity: 2912
Merit: 1060
|
|
April 08, 2014, 08:07:54 PM |
|
|
|
|
|
Bit_Happy
Legendary
Offline
Activity: 2114
Merit: 1040
A Great Time to Start Something!
|
|
April 08, 2014, 08:26:43 PM |
|
|
|
|
|
windpath
Legendary
Offline
Activity: 1258
Merit: 1027
|
|
April 08, 2014, 08:52:10 PM |
|
|
|
|
|
Bit_Happy
Legendary
Offline
Activity: 2114
Merit: 1040
A Great Time to Start Something!
|
|
April 08, 2014, 09:17:45 PM |
|
Next up is huge concern about the exchanges that have not updated. EDIT: The vulnerability does not affect the bitcoin protocol or wallet. It may affect auxilary usage of TLS in RPC-over-SSL and when fetching payment requests over HTTPS. Not a big deal, but we are going to release a 0.9.1 that updates OpenSSL (see pull #4023 if you want to test) and fixes some other minor issues from 0.9.0.
|
|
|
|
Cryddit (OP)
Legendary
Offline
Activity: 924
Merit: 1132
|
|
April 08, 2014, 09:23:38 PM Last edit: April 09, 2014, 02:47:40 AM by Cryddit |
|
As far as I can see, this bug affects bitcoind in the case that you use RPC over a network to access your wallet.
If you don't, I don't believe there's any vulnerability that this exposes. (This is a quick examination only; there could be something I missed). If you have, and someone who knew about this bug was paying attention at the time, then that person may have your password.
OTOH, I think this explains the widespread SSL break implied by the Snowden papers.
EDIT:
I had not looked at the new payment protocol stuff with the recent client. It is also exposed to this bug. So, if you have used the payment prototocol over the network, you have been exposed.
|
|
|
|
bitpop
Legendary
Offline
Activity: 2912
Merit: 1060
|
|
April 08, 2014, 09:34:42 PM |
|
This bug must be intentional
|
|
|
|
bitpop
Legendary
Offline
Activity: 2912
Merit: 1060
|
|
April 08, 2014, 09:45:24 PM |
|
|
|
|
|
turio
Newbie
Offline
Activity: 14
Merit: 0
|
|
April 08, 2014, 09:55:24 PM |
|
this is a serious concern and everyone should patch up
|
|
|
|
Robert Paulson
|
|
April 08, 2014, 09:56:51 PM |
|
SSL can now be considered as dead, this bug leaks the private SSL key of all the websites that use SSL. even if they patch the server anyone who dumped enough of the server's memory would likely be able to recover the SSL private key of the server.
|
|
|
|
bitpop
Legendary
Offline
Activity: 2912
Merit: 1060
|
|
April 08, 2014, 09:58:31 PM |
|
SSL can now be considered as dead, this bug leaks the private SSL key of all the websites that use SSL. even if they patch the server anyone who dumped enough of the server's memory would likely be able to recover the SSL private key of the server.
Re keying is easy if the site cares
|
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
April 08, 2014, 10:04:03 PM |
|
SSL can now be considered as dead, this bug leaks the private SSL key of all the websites that use SSL. even if they patch the server anyone who dumped enough of the server's memory would likely be able to recover the SSL private key of the server.
Generating a new key and cert as well as revoking the old cert takes less than an hour (honestly more like ten minutes but was being conservative). Of course many website were completely unaffected as they didn't use the compromised version of OpenSSL. BitSimple (among many other Bitcoin related sites) for example is unaffected.
|
|
|
|
Bit_Happy
Legendary
Offline
Activity: 2114
Merit: 1040
A Great Time to Start Something!
|
|
April 08, 2014, 10:06:41 PM |
|
Does anyone know if Cryptsy updated yet? EDIT: We have updated all of our OpenSSL servers and our DDOS provider has also updated. More information here: http://blog.cryptsy.com...or btc-e? On April 6th "We updated SSL certificate" ...That may have simply been expiring. Cannot tell what version of OpenSSL they are running.
|
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
April 08, 2014, 10:14:00 PM |
|
Does anyone know if Cryptsy updated yet? EDIT: We have updated all of our OpenSSL servers and our DDOS provider has also updated. More information here: http://blog.cryptsy.com...or btc-e? On April 6th "We updated SSL certificate" ...That may have simply been expiring. Cannot tell what version of OpenSSL they are running. I don't vouch for the accuracy of this test but it indicates no vulnerability http://filippo.io/Heartbleed/#cryptsy.com
|
|
|
|
awesomeami
Member
Offline
Activity: 98
Merit: 10
|
|
April 08, 2014, 10:18:32 PM |
|
|
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
April 08, 2014, 10:24:15 PM Last edit: April 08, 2014, 10:49:02 PM by DeathAndTaxes |
|
Most users have absolutely no reason to upgrade. SSL isn't used in the Bitcoin protocol.
Only users who use bitcoind RPC calls over SSL/TSL connection have any potential vulnerability.
Do you not use bitcoind RPC? Then there is no urgent need to upgrade. Do you use bitcoind RPC but don't use SSL? Then there is no urgent need to upgrade. Do you use bitcoind RPC over SSL? Then you should halt your bitcoind server and upgrade before restoring access.On edit: Bad information. The payment protocol uses SSL any user could already be compromised if they used the new payment protocol "feature". Upgrade now or if you can't shutdown the client and don't restart it until such time as you can upgrade.
|
|
|
|
Bit_Happy
Legendary
Offline
Activity: 2114
Merit: 1040
A Great Time to Start Something!
|
|
April 08, 2014, 10:27:32 PM |
|
Does anyone know if Cryptsy updated yet? EDIT: We have updated all of our OpenSSL servers and our DDOS provider has also updated. More information here: http://blog.cryptsy.com...or btc-e? On April 6th "We updated SSL certificate" ...That may have simply been expiring. Cannot tell what version of OpenSSL they are running. I don't vouch for the accuracy of this test but it indicates no vulnerability http://filippo.io/Heartbleed/#cryptsy.comIt says you need to know the hostname (i.e. server.domain.com) not just the domain name. cryptsy tweeted about the update, but not sure about btc-e
|
|
|
|
turio
Newbie
Offline
Activity: 14
Merit: 0
|
|
April 08, 2014, 10:33:54 PM |
|
thank you I am updating now
|
|
|
|
|