Bitcoin Forum
May 10, 2024, 10:10:50 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: 1 2 3 4 5 6 [All]
  Print  
Author Topic: Users of Bitcoin Core on Linux must not upgrade to the latest version of OpenSSL  (Read 65989 times)
theymos (OP)
Administrator
Legendary
*
Offline Offline

Activity: 5194
Merit: 12982


View Profile
January 10, 2015, 05:58:29 AM
 #1

Greg Maxwell's announcement: 
http://sourceforge.net/p/bitcoin/mailman/message/33221963/

Summary:

There is a problem with the most recent release of OpenSSL which will cause issues for some users of Bitcoin Core on Linux. This is not a critical security issue, but everyone using Bitcoin Core on Linux should read the following information, especially if you're automatically processing Bitcoin payments. The worst-case scenario is that you might accept transactions as confirmed which are later reversed.

You are likely to be affected only if:

- You use Linux.
- You installed Bitcoin Core using your distro's package manager or you compiled Bitcoin Core yourself without using gitian. You are not affected if you use the binaries on bitcoin.org.
- You upgrade your system's OpenSSL to 1.0.0p or 1.0.1k. These were security-fix releases, so your package manager might have updated them automatically.

If you are affected, then your client might become stuck at a particular block, and you'll have to reindex the block chain to fix it. In some conceivable but unlikely scenarios, you might see incoming transactions as having 6+ confirmations when the transactions are actually invalid. If you are a pool operator, then you could conceivably start mining on a false chain, which would cause you to lose all of your future blocks until you fix this.

If you are using an affected version of Bitcoin Core, you should either make sure that your system OpenSSL does not get updated or shut down Bitcoin Core until an update fixing this is released in a day or two. If Bitcoin Core is already stuck and showing the "We do not appear to fully agree with our peers!" message, shut it down until an update fixing this is released; when you run that version, you'll have to run it with the -reindex switch.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
The forum strives to allow free discussion of any ideas. All policies are built around this principle. This doesn't mean you can post garbage, though: posts should actually contain ideas, and these ideas should be argued reasonably.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Remember remember the 5th of November
Legendary
*
Offline Offline

Activity: 1862
Merit: 1011

Reverse engineer from time to time


View Profile
January 10, 2015, 06:04:46 AM
 #2

Lol, what is this? OpenSSL is becoming more of a joke every day.

BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
bitcreditscc
Hero Member
*****
Offline Offline

Activity: 602
Merit: 501



View Profile
January 10, 2015, 06:38:18 AM
 #3

Lol, what is this? OpenSSL is becoming more of a joke every day.

Or maybe it is being done on purpose.

ghostlander
Legendary
*
Offline Offline

Activity: 1239
Merit: 1020


No surrender, no retreat, no regret.


View Profile WWW
January 10, 2015, 07:47:31 AM
 #4

The question is, why do the OpenSSL developers push compatibility breaking updates to the stable branches? They have 1.0.2-beta for all kinds of experiments.

"If you've got a problem and have to spread some coins to make it go away, you've got no problem. You've got an expence." ~ Phoenixcoin (PXC) and Orbitcoin (ORB) and Halcyon (HAL)
newIndia
Legendary
*
Offline Offline

Activity: 2212
Merit: 1049


View Profile
January 10, 2015, 09:23:19 AM
 #5

Lol, what is this? OpenSSL is becoming more of a joke every day.

Or maybe it is being done on purpose.

Seems so... Undecided

Christian1998
Sr. Member
****
Offline Offline

Activity: 474
Merit: 500


View Profile
January 10, 2015, 09:55:38 AM
 #6

Thank you theymos for this info.
Best regards
Christian
srgkrgkj
Legendary
*
Offline Offline

Activity: 1218
Merit: 1000



View Profile
January 10, 2015, 10:26:45 AM
 #7

thanks theymos OpenSSL lets me down once again Sad

hexafraction
Sr. Member
****
Offline Offline

Activity: 392
Merit: 259

Tips welcomed: 1CF4GhXX1RhCaGzWztgE1YZZUcSpoqTbsJ


View Profile
January 10, 2015, 10:27:22 AM
 #8

Is the issue having the new version of OpenSSL at compile-time, or at run-time? (My build of 0.10rc1 links dynamically to /lib/x86_64-linux-gnu/libssl.so.1.0.0, but I don't know about 0.9.3 or builds made on the PPA as part of a Debian build process).

Furthermore, to prevent such drama later if OpenSSL is still used down the road, is there a documented, secure, and feasible way to statically link to a known version of OpenSSL that is passing tests?

I have recently become active again after a long period of inactivity. Cryptographic proof that my account has not been compromised is available.
fenghush
Sr. Member
****
Offline Offline

Activity: 658
Merit: 250



View Profile
January 10, 2015, 11:11:09 AM
 #9

The question is, why do the OpenSSL developers push compatibility breaking updates to the stable branches? They have 1.0.2-beta for all kinds of experiments.


Because openssl is one giant mess, it's so horrid that it is immune to auditing but it is so widely used that we're just stuck with it.
I for one commend the developers for at least trying to fix it, anyone else would have given up years ago.

Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
January 10, 2015, 11:16:31 AM
 #10

Arch Linux just updated to 1.0.1k so this affects my node.
Think I'll just shut my node down till the patch.

ShadowOfHarbringer
Legendary
*
Offline Offline

Activity: 1470
Merit: 1005


Bringing Legendary Har® to you since 1952


View Profile
January 10, 2015, 11:46:57 AM
 #11

This is serious.

Anybody knows when is a patch coming ?

boinc
Full Member
***
Offline Offline

Activity: 224
Merit: 100


View Profile
January 10, 2015, 12:57:43 PM
 #12

ubuntu 14.04
Quote
affected?

BTC 12P9LaA7eciiPCx68qFEFarpfrF8mcrNmY
shorena
Copper Member
Legendary
*
Offline Offline

Activity: 1498
Merit: 1520


No I dont escrow anymore.


View Profile WWW
January 10, 2015, 01:12:18 PM
 #13

ubuntu 14.04
Quote
affected?

Start openssl from terminal wait for it start and use version to see if you have one of the versions in question. Close openssl with quit

Im not really here, its just your imagination.
stolendata
Sr. Member
****
Offline Offline

Activity: 264
Merit: 250


View Profile
January 10, 2015, 01:30:45 PM
 #14

Lol, what is this? OpenSSL is becoming more of a joke every day.

This is actually a twofold problem - Bitcoin Core's use of signature validation plays an equal part in this.
boinc
Full Member
***
Offline Offline

Activity: 224
Merit: 100


View Profile
January 10, 2015, 01:32:43 PM
 #15

ubuntu 14.04
Quote
affected?

Start openssl from terminal wait for it start and use version to see if you have one of the versions in question. Close openssl with quit
I know how to check openssl version, question was about bitcoin-qt binary package from ppa

BTC 12P9LaA7eciiPCx68qFEFarpfrF8mcrNmY
Jay_Pal
Legendary
*
Offline Offline

Activity: 1493
Merit: 1003



View Profile
January 10, 2015, 02:06:06 PM
 #16

Just for checking, I have version 1.0.1f in ubuntu but I'm using bitcoin core 0.9.2.1 from bitcoin.org, so no need to change or panic, is that right? Smiley
And thanks for the heads up, theymos - this is exactly what makes this community awesome!

Best faucet EVER! - Freebitco.in
Don't Panic... - 1G8zjUzeZBfJpeCbz1MLTc6zQHbLm78vKc
Why not mine from the browser?
cr1776
Legendary
*
Offline Offline

Activity: 4032
Merit: 1301


View Profile
January 10, 2015, 02:12:45 PM
Last edit: January 10, 2015, 08:36:15 PM by cr1776
 #17

ubuntu 14.04
Quote
affected?

Start openssl from terminal wait for it start and use version to see if you have one of the versions in question. Close openssl with quit
I know how to check openssl version, question was about bitcoin-qt binary package from ppa

Perhaps try apt-get upgrade and see if it wants to install the new version. Then do not hit Y to install?

I think it showed up on my ec2 server this morning and I installed it since it is just a web server.  I didn't note it though and am not in a position to check right now.

It looks like there is now a patch for it from Wladimir, per the mail list, btw.

edit:
I did check to see if 14.04 was offering to install the update via apt-get and it was not as of now. 
stolendata
Sr. Member
****
Offline Offline

Activity: 264
Merit: 250


View Profile
January 10, 2015, 02:15:13 PM
 #18

Because openssl is one giant mess, it's so horrid that it is immune to auditing but it is so widely used that we're just stuck with it.
I for one commend the developers for at least trying to fix it, anyone else would have given up years ago.

http://www.libressl.org/
siameze
Legendary
*
Offline Offline

Activity: 1064
Merit: 1000



View Profile
January 10, 2015, 02:19:15 PM
 #19

Kind of makes me glad I haven't bothered upgrading openssl in some time.


                     ▀▀█████████▀████████████████▄
                        ████▄      ▄████████████████
                     ▄██████▀  ▄  ███████████████████
                  ▄█████████▄████▄███████████████████
                ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀████████
                                               ▀▀███▀
    ▄█▀█       ▄▀  ▄▀▀█  ▄▀   █████████████████▄ ██▀         ▄▀█
   ▄█ ▄▀      ▀█▀ █▀ █▀ ▀█▀  ███████████████████ █▀ ▀▀      ▄▀▄▀
  ▄█    ▄███  █     █   █   ████████████████████  ▄█     ▄▀▀██▀ ▄███
███▄▄▄  █▄▄▄ █▄▄ ▄▄▀   █▄▄ ██████████████████▀▀   █▄▄ ▄▄ █▄▄█▄▄▄█▄▄▄
                           ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                            ▀▀█████████████▄
                                █████████████▄
                                  █████████████▄
                                    ▀███████▀▀▀▀▀
                                      ▀████▀
                                        ▀█▀
LetItRideINNOVATIVE ▬▬▬
DICE GAME
                        ▄███████████▄
                       ██  ██████████▄
                     ▄█████████████  ██▄
            ▄▄▀█▄▄▄▄▄████████████████████▄
        ▄▄█▀   ███████████  █████  ████  █
    ▄██████ ▄▄███████████████████████████▀
 ▄▀▀ ██████████████████████████  ████  █
█  ▄███████████▀▀▀█████████████████████
██████████████    ████████▀▀██████  █▀
██████████████▄▄▄██████████   ▀▀▀▀▀▀▀
███▀ ▀██████████████████████
██    ███████████████████████
██▄▄██████████████████████████
██████████████▀   ██████████
  █████████████   ▄██████▀▀
     ▀▀██████████████▀▀
         ▀▀██████▀▀
PROVABLY
F A I R
▄█████████████▀ ▄█
██            ▄█▀
██          ▄██ ▄█
██ ▄█▄    ▄███  ██
██ ▀███▄ ▄███   ██
██  ▀███████    ██
██    █████     ██
██     ███      ██
██      ▀       ██
██              ██
▀████████████████▀
BUY  BACK
PLANS
[BTC]
stolendata
Sr. Member
****
Offline Offline

Activity: 264
Merit: 250


View Profile
January 10, 2015, 02:22:13 PM
 #20

I know how to check openssl version, question was about bitcoin-qt binary package from ppa

Just open the debug window and you will see what version of OpenSSL the executable was linked against.


Kind of makes me glad I haven't bothered upgrading openssl in some time.

*blank stare*
fenghush
Sr. Member
****
Offline Offline

Activity: 658
Merit: 250



View Profile
January 10, 2015, 02:32:08 PM
 #21

Kind of makes me glad I haven't bothered upgrading openssl in some time.

Heartbleed much?

siameze
Legendary
*
Offline Offline

Activity: 1064
Merit: 1000



View Profile
January 10, 2015, 02:35:59 PM
 #22

I know how to check openssl version, question was about bitcoin-qt binary package from ppa

Just open the debug window and you will see what version of OpenSSL the executable was linked against.


Kind of makes me glad I haven't bothered upgrading openssl in some time.

*blank stare*


Like you said, there is LibreSSL.  Cheesy


                     ▀▀█████████▀████████████████▄
                        ████▄      ▄████████████████
                     ▄██████▀  ▄  ███████████████████
                  ▄█████████▄████▄███████████████████
                ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀████████
                                               ▀▀███▀
    ▄█▀█       ▄▀  ▄▀▀█  ▄▀   █████████████████▄ ██▀         ▄▀█
   ▄█ ▄▀      ▀█▀ █▀ █▀ ▀█▀  ███████████████████ █▀ ▀▀      ▄▀▄▀
  ▄█    ▄███  █     █   █   ████████████████████  ▄█     ▄▀▀██▀ ▄███
███▄▄▄  █▄▄▄ █▄▄ ▄▄▀   █▄▄ ██████████████████▀▀   █▄▄ ▄▄ █▄▄█▄▄▄█▄▄▄
                           ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                            ▀▀█████████████▄
                                █████████████▄
                                  █████████████▄
                                    ▀███████▀▀▀▀▀
                                      ▀████▀
                                        ▀█▀
LetItRideINNOVATIVE ▬▬▬
DICE GAME
                        ▄███████████▄
                       ██  ██████████▄
                     ▄█████████████  ██▄
            ▄▄▀█▄▄▄▄▄████████████████████▄
        ▄▄█▀   ███████████  █████  ████  █
    ▄██████ ▄▄███████████████████████████▀
 ▄▀▀ ██████████████████████████  ████  █
█  ▄███████████▀▀▀█████████████████████
██████████████    ████████▀▀██████  █▀
██████████████▄▄▄██████████   ▀▀▀▀▀▀▀
███▀ ▀██████████████████████
██    ███████████████████████
██▄▄██████████████████████████
██████████████▀   ██████████
  █████████████   ▄██████▀▀
     ▀▀██████████████▀▀
         ▀▀██████▀▀
PROVABLY
F A I R
▄█████████████▀ ▄█
██            ▄█▀
██          ▄██ ▄█
██ ▄█▄    ▄███  ██
██ ▀███▄ ▄███   ██
██  ▀███████    ██
██    █████     ██
██     ███      ██
██      ▀       ██
██              ██
▀████████████████▀
BUY  BACK
PLANS
[BTC]
boinc
Full Member
***
Offline Offline

Activity: 224
Merit: 100


View Profile
January 10, 2015, 02:53:57 PM
 #23

Just open the debug window and you will see what version of OpenSSL the executable was linked against.
it seems system version of OpenSSL used

BTC 12P9LaA7eciiPCx68qFEFarpfrF8mcrNmY
bitmarket.io
Legendary
*
Offline Offline

Activity: 1204
Merit: 1001



View Profile WWW
January 10, 2015, 03:05:22 PM
 #24

thats like mega gay dude since we use bitcoind on debian.
curiosity81
Legendary
*
Offline Offline

Activity: 1778
Merit: 1070



View Profile
January 10, 2015, 06:06:04 PM
 #25

What does the "p" and "k" stand for in:

"[...] OpenSSL to 1.0.0p or 1.0.1k [...]"Huh

 Huh

          ▄▄██▄▄
      ▄▄██████████▄▄
  ▄▄██████▀▀  ▀▀██████▄▄

███████▀          ▀███████
████       ▄▄▄▄     ▄█████
████     ███████▄▄██████▀
████     ██████████████
████     ████████▀██████▄
████       ▀▀▀▀     ▀█████
███████▄          ▄███████
  ▀▀██████▄▄  ▄▄██████▀▀
      ▀▀██████████▀▀
          ▀▀██▀▀
COINVEST
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
WEBSITE  ●  WHITEPAPER  ●  DEMO
ANN  ●  TELEGRAM  ●  BLOG

▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
       ▄▄█████████▄▄
    ▄██████▀▀▀▀▀██████▄
  ▄████▀▀         ▀▀████▄
 ▄████    ▄▄███▄▄    ████▄
▄████  ▄███▀▀ ▀▀███▄  ████▄
████   ██▌  ▄▄▄  ███   ████
████   ██▌ ▐███████    ████
████   ██▌  ▀▀▀  ███   ████
▀████  ▀███▄▄ ▄▄███▀  ████▀

 ▀████    ▀▀███▀▀    ████▀
  ▀████▄▄         ▄▄████▀

    ▀██████▄▄▄▄▄██████▀
       ▀▀█████████▀▀
COINTOKEN
tuaris
Hero Member
*****
Offline Offline

Activity: 765
Merit: 500



View Profile WWW
January 10, 2015, 06:26:25 PM
 #26

You are likely to be affected only if:
- You use Linux.

I use FreeBSD, is it affected?

fenghush
Sr. Member
****
Offline Offline

Activity: 658
Merit: 250



View Profile
January 10, 2015, 06:46:14 PM
 #27

You are likely to be affected only if:
- You use Linux.

I use FreeBSD, is it affected?
Can you even autoupdate freebsd's ports?

Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
January 10, 2015, 07:32:40 PM
 #28

You can check if your compiled binary is working correctly by executing the command "make check" in the source code directory. This will then iterate through tests. It will return either pass or fail.

theymos (OP)
Administrator
Legendary
*
Offline Offline

Activity: 5194
Merit: 12982


View Profile
January 10, 2015, 07:33:39 PM
 #29

I use FreeBSD, is it affected?

Yes. I probably should have said "unix-like". The issue affects any system where you're dynamically linking Bitcoin Core against the system OpenSSL. This could even be done on Windows, though that'd be very unusual.

ubuntu 14.04
Quote
affected?

Yes.

Is the issue having the new version of OpenSSL at compile-time, or at run-time? (My build of 0.10rc1 links dynamically to /lib/x86_64-linux-gnu/libssl.so.1.0.0, but I don't know about 0.9.3 or builds made on the PPA as part of a Debian build process).

It's an issue of what Bitcoin Core will use. If it's statically linking an OK version of OpenSSL, then updated your system OpenSSL is OK. If it's dynamically linking, then you'll have problems. The binaries on bitcoin.org statically link OpenSSL. I think that almost all Linux distros distribute versions of bitcoind/bitcoin-qt that dynamically link.

If you're compiling Bitcoin Core using the normal configure+make, then it'll link dynamically. I'm not sure how to force this to link statically.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
tuaris
Hero Member
*****
Offline Offline

Activity: 765
Merit: 500



View Profile WWW
January 10, 2015, 08:13:57 PM
 #30

You are likely to be affected only if:
- You use Linux.

I use FreeBSD, is it affected?
Can you even autoupdate freebsd's ports?

It is possible with PKGNG, but I build my own package repositories to manage updates.


Yes. I probably should have said "unix-like". The issue affects any system where you're dynamically linking Bitcoin Core against the system OpenSSL. This could even be done on Windows, though that'd be very unusual.

Thank You.  I will watch out for this when building the next set of updates.

ShadowOfHarbringer
Legendary
*
Offline Offline

Activity: 1470
Merit: 1005


Bringing Legendary Har® to you since 1952


View Profile
January 11, 2015, 06:56:57 AM
 #31

I know how to check openssl version, question was about bitcoin-qt binary package from ppa

Just open the debug window and you will see what version of OpenSSL the executable was linked against.


Kind of makes me glad I haven't bothered upgrading openssl in some time.

*blank stare*
Like you said, there is LibreSSL.  Cheesy

Not stable or tested enough yet.
People, stop suggesting LibreSSL. One can seriously fuck up his/hers system by replacing a core library by an unstable solution.

Once LibreSSL is proven not to be dangerous, it can be used instead of OpenSSL

smoothie
Legendary
*
Offline Offline

Activity: 2492
Merit: 1473


LEALANA Bitcoin Grim Reaper


View Profile
January 11, 2015, 07:06:30 AM
 #32

I presume it doesn't matter what version of Linux you are running?

It is just Linux in general?

███████████████████████████████████████

            ,╓p@@███████@╗╖,           
        ,p████████████████████N,       
      d█████████████████████████b     
    d██████████████████████████████æ   
  ,████²█████████████████████████████, 
 ,█████  ╙████████████████████╨  █████y
 ██████    `████████████████`    ██████
║██████       Ñ███████████`      ███████
███████         ╩██████Ñ         ███████
███████    ▐▄     ²██╩     a▌    ███████
╢██████    ▐▓█▄          ▄█▓▌    ███████
 ██████    ▐▓▓▓▓▌,     ▄█▓▓▓▌    ██████─
           ▐▓▓▓▓▓▓█,,▄▓▓▓▓▓▓▌          
           ▐▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▌          
    ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓─  
     ²▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓╩    
        ▀▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▀       
           ²▀▀▓▓▓▓▓▓▓▓▓▓▓▓▀▀`          
                   ²²²                 
███████████████████████████████████████

. ★☆ WWW.LEALANA.COM        My PGP fingerprint is A764D833.                  History of Monero development Visualization ★☆ .
LEALANA BITCOIN GRIM REAPER SILVER COINS.
 
uki
Legendary
*
Offline Offline

Activity: 1358
Merit: 1000


cryptojunk bag holder


View Profile
January 11, 2015, 12:32:00 PM
 #33

ubuntu 14.04
Quote
affected?
same OS, my version is:
Code:
OpenSSL 1.0.1f 6 Jan 2014
I understand that this version is fine and I only don't need to upgrade to version 1.0.1k, but wait for the following one.
Did I understand that correctly?

this space is intentionally left blank
MarketNeutral
Sr. Member
****
Offline Offline

Activity: 392
Merit: 251


View Profile
January 11, 2015, 02:23:29 PM
 #34

I presume it doesn't matter what version of Linux you are running?

It is just Linux in general?
I second this question.

So this affects any flavor of linux or unix-like system, including the BSDs? Got it.

Theymos said it affects any system that dynamically links OpenSSL to Bitcoin Core. Ok. Good to know.



So how does one force a static link in lieu of a dynamic link?
fenghush
Sr. Member
****
Offline Offline

Activity: 658
Merit: 250



View Profile
January 11, 2015, 02:31:14 PM
 #35

Basically any OS even windows although highly unusual with a dynamically linked openssl versions 1.0.0p or 1.0.1k.
To build it statically you need to generate the object files with gcc, then use ar to bundle them into a static library. But you do need to use a version of openssl which is NOT 1.0.0p or 1.0.1k, otherwise the whole exercise is pointless.
I presume it doesn't matter what version of Linux you are running?

It is just Linux in general?
I second this question.

So this affects any flavor of linux or unix-like system, including the BSDs? Got it.

Theymos said it affects any system that dynamically links OpenSSL to Bitcoin Core. Ok. Good to know.



So how does one force a static link in lieu of a dynamic link?

MarketNeutral
Sr. Member
****
Offline Offline

Activity: 392
Merit: 251


View Profile
January 11, 2015, 02:34:43 PM
 #36

Basically any OS with a dynamically linked openssl versions 1.0.0p or 1.0.1k.
To build it statically you need to generate the object files with gcc, then use ar to bundle them into a static library. But you do need to use a version of openssl which is NOT 1.0.0p or 1.0.1k, otherwise the whole exercise is pointless.
I presume it doesn't matter what version of Linux you are running?

It is just Linux in general?
I second this question.

So this affects any flavor of linux or unix-like system, including the BSDs? Got it.

Theymos said it affects any system that dynamically links OpenSSL to Bitcoin Core. Ok. Good to know.



So how does one force a static link in lieu of a dynamic link?


Excellent. Thank you.
cjp
Full Member
***
Offline Offline

Activity: 210
Merit: 124



View Profile WWW
January 11, 2015, 02:52:27 PM
 #37

Debian published this update:
https://www.debian.org/security/2015/dsa-3125

For Wheezy, the version number is still 1.0.1e. However, the description says it solves CVE-2014-8275, which is exactly the change that should trigger the Bitcoin problem.

So, on Debian Wheezy, the latest patched 1.0.1e can also cause problems? I guess I should first apply the Bitcoin patch, before applying this OpenSSL upgrade...

Donate to: 1KNgGhVJx4yKupWicMenyg6SLoS68nA6S8
http://cornwarecjp.github.io/amiko-pay/
Balthazar
Legendary
*
Offline Offline

Activity: 3108
Merit: 1358



View Profile
January 11, 2015, 03:22:16 PM
 #38

Lol, what is this? OpenSSL is becoming more of a joke every day.
Subj. is not a problem of openssl itself. New versions of openssl are rejecting non-standard signatures, while Bitcoin allows them. As the result, you can create block which will be accepted by some nodes but rejected by others.
stolendata
Sr. Member
****
Offline Offline

Activity: 264
Merit: 250


View Profile
January 11, 2015, 04:39:32 PM
 #39

Not stable or tested enough yet.
People, stop suggesting LibreSSL. One can seriously fuck up his/hers system by replacing a core library by an unstable solution.

Once LibreSSL is proven not to be dangerous, it can be used instead of OpenSSL

Not sure where you've gotten "unstable" from, but I suspect you just didn't inform yourself before posting. LibreSSL is a new fork, yes, but it's beyond the "unstable" phase. The current version of OpenBSD has entirely replaced OpenSSL with their LibreSSL project, not just for the OS portion, but consequently also for every single package in the ~9000 items large repository making use of OpenSSL. All of it works, and it's stable.

That said, there are still a few odd cases of badly written OpenSSL-centric software that needs reworking before it's even possible to link against LibreSSL. This is a different matter.
fenghush
Sr. Member
****
Offline Offline

Activity: 658
Merit: 250



View Profile
January 11, 2015, 04:52:32 PM
 #40

IMHO bitcoin core should maintain it's own SSL library to avoid such issues in the future, in fact it shouldn't rely on 3rd party, regardless if they're open source or not dynamically linked libraries to avoid any possible attacks too. 
Not stable or tested enough yet.
People, stop suggesting LibreSSL. One can seriously fuck up his/hers system by replacing a core library by an unstable solution.

Once LibreSSL is proven not to be dangerous, it can be used instead of OpenSSL

Not sure where you've gotten "unstable" from, but I suspect you just didn't inform yourself before posting. LibreSSL is a new fork, yes, but it's beyond the "unstable" phase. The current version of OpenBSD has entirely replaced OpenSSL with their LibreSSL project, not just for the OS portion, but consequently also for every single package in the ~9000 items large repository making use of OpenSSL. All of it works, and it's stable.

That said, there are still a few odd cases of badly written OpenSSL-centric software that needs reworking before it's even possible to link against LibreSSL. This is a different matter.

stolendata
Sr. Member
****
Offline Offline

Activity: 264
Merit: 250


View Profile
January 11, 2015, 05:38:45 PM
 #41

IMHO bitcoin core should maintain it's own SSL library to avoid such issues in the future, in fact it shouldn't rely on 3rd party, regardless if they're open source or not dynamically linked libraries to avoid any possible attacks too.  

In software development, it's generally considered unwise to reinvent something that already exists in an established and scrutinized form.

LibreSSL isn't reinventing the wheel, but rather repairing a broken wheel. As LibreSSL grows more mature, and since it's a drop-in replacement for OpenSSL, it will with time deprecate OpenSSL and I'm sure the Bitcoin devs are wise enough to make the switch at some point.
fenghush
Sr. Member
****
Offline Offline

Activity: 658
Merit: 250



View Profile
January 11, 2015, 05:40:16 PM
 #42

I wasn't implying that they should reinvent the wheel, but to maintain their own fork of the libraries used.
The only reason why you want to build dynamically linked binaries is to reduce their size, but it's pointless for bitcoin since you have to download 30 or so gb blockchain data, so why not ship it with a bundle of all libraries used and statically link them, the binary file will be bigger by couple of megabytes but I don't see it as a big deal. And this will prevent issues such as this as well as prevent attacks from 3rd party developers who willingly or unwillingly introduce vulnerabilities in the bitcoin core via updates.
IMHO bitcoin core should maintain it's own SSL library to avoid such issues in the future, in fact it shouldn't rely on 3rd party, regardless if they're open source or not dynamically linked libraries to avoid any possible attacks too.  

In software development, it's generally considered unwise to reinvent something that already exists in an established and scrutinized form.

LibreSSL isn't reinventing the wheel, but rather repairing a broken wheen, and as LibreSSL grows more mature, and since it's a drop-in replacement for OpenSSL, it will with time deprecate OpenSSL and I'm sure the Bitcoin devs are wise enough to make the switch at some point.

cjp
Full Member
***
Offline Offline

Activity: 210
Merit: 124



View Profile WWW
January 11, 2015, 08:39:48 PM
 #43

So, on Debian Wheezy, the latest patched 1.0.1e can also cause problems?

I now confirmed this, by first successfully running the Bitcoin 0.9.3 test suite, then upgrading OpenSSL (it still says 1.0.1e), and then getting a failure from the test suite:
http://www.ultimatestunts.nl/bitcoin/bitcoin_openssl_unittest_result.txt

Donate to: 1KNgGhVJx4yKupWicMenyg6SLoS68nA6S8
http://cornwarecjp.github.io/amiko-pay/
cjp
Full Member
***
Offline Offline

Activity: 210
Merit: 124



View Profile WWW
January 11, 2015, 10:47:35 PM
 #44

...and after applying the patch, Bitcoin passes its test again.  Smiley Good work!

Donate to: 1KNgGhVJx4yKupWicMenyg6SLoS68nA6S8
http://cornwarecjp.github.io/amiko-pay/
HCLivess
Legendary
*
Offline Offline

Activity: 2114
Merit: 1090


=== NODE IS OK! ==


View Profile WWW
January 12, 2015, 12:34:14 AM
 #45

Kind of makes me glad I haven't bothered upgrading openssl in some time.

*blank stare*
[/quote]

 Cheesy I guess he's being sarcastic

doof
Hero Member
*****
Offline Offline

Activity: 765
Merit: 503


View Profile WWW
January 12, 2015, 05:53:43 AM
 #46

Appologies if its answered already, does this effect Mac OSX?
ShadowOfHarbringer
Legendary
*
Offline Offline

Activity: 1470
Merit: 1005


Bringing Legendary Har® to you since 1952


View Profile
January 12, 2015, 07:44:50 AM
 #47

Somebody knows ETA of a fix coming out ?

stolendata
Sr. Member
****
Offline Offline

Activity: 264
Merit: 250


View Profile
January 12, 2015, 04:03:10 PM
 #48

Appologies if its answered already, does this effect Mac OSX?

It affects all OSes. But unless you plan on updating your OS X-installation's openssl dylib yourself (and something tells me you're not), then you don't need to worry at this point. Everything is fine.
drizzt
Member
**
Offline Offline

Activity: 61
Merit: 10

Developer


View Profile WWW
January 12, 2015, 04:46:33 PM
 #49

Arch Linux users only needs to upgrade to 0.9.3-4 version.

Community manager of ABCore
Bitrated user: drizzt.
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
January 12, 2015, 04:51:32 PM
 #50

Gentoo 0.8.6-r1 and 0.9.3-r1 have the patch to workaround the issue.

LibreSSL isn't reinventing the wheel, but rather repairing a broken wheel. As LibreSSL grows more mature, and since it's a drop-in replacement for OpenSSL, it will with time deprecate OpenSSL and I'm sure the Bitcoin devs are wise enough to make the switch at some point.
Unless LibreSSL is guaranteeing bug-for-bug compatibility with old OpenSSL, it cannot safely be used with Bitcoin.
That means it MUST make sure all bugs in OpenSSL 1.0.1j are still bugs in LibreSSL.
As far as I know, that is not a goal of either OpenSSL nor LibreSSL, and is exactly why the new version of OpenSSL breaks Bitcoin by fixing a bug.

gmaxwell
Staff
Legendary
*
Offline Offline

Activity: 4172
Merit: 8419



View Profile WWW
January 12, 2015, 04:55:37 PM
 #51

The binaries from Bitcoin.org are not effected, not on any operating system.

Virtually all users on Windows and OSX are not impacted, because virtually all of them use provided binaries. The only way you are possibly effected on those platforms is if you built the software for yourself and if you update OpenSSL.

Unless LibreSSL is guaranteeing bug-for-bug compatibility with old OpenSSL, it cannot safely be used with Bitcoin.
I looked at that a while back and their massive house-keeping makes the _changes_ more or less impossible to review. (Of course, OpenSSL is more or less impossible to review to begin with; so for their purposes I cannot blame them.)

Keep in mind the Bitcoin protocol doesn't use SSL. That we're using a SSL library here is an accident of history, and a bad call in general. As this update demonstrates, our needs are at odds with the needs of a SSL library.
cjp
Full Member
***
Offline Offline

Activity: 210
Merit: 124



View Profile WWW
January 12, 2015, 06:36:00 PM
 #52

Somebody knows ETA of a fix coming out ?

For most people, this will be the answer:

The binaries from Bitcoin.org are not effected, not on any operating system.

Virtually all users on Windows and OSX are not impacted, because virtually all of them use provided binaries. The only way you are possibly effected on those platforms is if you built the software for yourself and if you update OpenSSL.

If you did compile your own software, then you can run "make check" in the source tree to see if you're affected. If all tests pass, you're not affected. You might want to check again after you update your system's OpenSSL.

Those who compile their own software can fix their software by applying a patch. The required changes are available on Github; e.g. here for the 0.9 branch.

I created a version of the 0.9 sources that's nearly identical to the official 0.9.3 source code release for Linux, but with the fix applied:
https://github.com/cornwarecjp/bitcoin/tree/b146f97935d6c17927406ea549409d232eb7ce3c

I wouldn't recommend doing development on that branch(*), but since it's nearly identical to the official release source code, it should be OK for compiling your own Bitcoin binary. Check for yourself with a diff tool what the differences are with the 0.9.3 sources and make sure you agree. In Linux desktops, you can e.g. use the "Meld" program for this, and use it to compare directories.

(*) The reason being that it's become quite different from development branches, which might make it more difficult to merge things.

Donate to: 1KNgGhVJx4yKupWicMenyg6SLoS68nA6S8
http://cornwarecjp.github.io/amiko-pay/
bronan
Hero Member
*****
Offline Offline

Activity: 774
Merit: 500


Lazy Lurker Reads Alot


View Profile
January 12, 2015, 07:53:54 PM
 #53

I was thinking about setting up a bitcoin node but i guess i'll wait till all these issues gets resolved
But i do not think anyone would have believed a year ago, that the most secure systems on the planet would get hacked.
This far we constant read about super secure systems being infiltrated.
Lets be honest the increase in calculate power and increased usage of the internet does open up doors we never had thought about.
Look at the power which modern graphic cards already have, i guess some people used the tech used for mining to make machines to break code as well.
As they did in the paste with graphics cards as well
dserrano5
Legendary
*
Offline Offline

Activity: 1974
Merit: 1029



View Profile
January 12, 2015, 07:56:51 PM
 #54

I was thinking about setting up a bitcoin node but i guess i'll wait till all these issues gets resolved

If you use the binaries from bitcoin.org you are safe (regarding this issue). Go on setting up your peer!
cr1776
Legendary
*
Offline Offline

Activity: 4032
Merit: 1301


View Profile
January 12, 2015, 11:52:02 PM
 #55

Somebody knows ETA of a fix coming out ?

I moved to 0.10rc2 this morning and if you are running that branch, the notes include preventive measures.
curiosity81
Legendary
*
Offline Offline

Activity: 1778
Merit: 1070



View Profile
January 13, 2015, 06:27:13 AM
 #56

*schnipp schnapp*

It's an issue of what Bitcoin Core will use. If it's statically linking an OK version of OpenSSL, then updated your system OpenSSL is OK. If it's dynamically linking, then you'll have problems. The binaries on bitcoin.org statically link OpenSSL. I think that almost all Linux distros distribute versions of bitcoind/bitcoin-qt that dynamically link.

I guess this answers my main question!

If you're compiling Bitcoin Core using the normal configure+make, then it'll link dynamically. I'm not sure how to force this to link statically.

This problem would also affect self-compiled altcoin-wallets for which no altcoin.org-version exist, wouldn't it?

          ▄▄██▄▄
      ▄▄██████████▄▄
  ▄▄██████▀▀  ▀▀██████▄▄

███████▀          ▀███████
████       ▄▄▄▄     ▄█████
████     ███████▄▄██████▀
████     ██████████████
████     ████████▀██████▄
████       ▀▀▀▀     ▀█████
███████▄          ▄███████
  ▀▀██████▄▄  ▄▄██████▀▀
      ▀▀██████████▀▀
          ▀▀██▀▀
COINVEST
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
WEBSITE  ●  WHITEPAPER  ●  DEMO
ANN  ●  TELEGRAM  ●  BLOG

▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
       ▄▄█████████▄▄
    ▄██████▀▀▀▀▀██████▄
  ▄████▀▀         ▀▀████▄
 ▄████    ▄▄███▄▄    ████▄
▄████  ▄███▀▀ ▀▀███▄  ████▄
████   ██▌  ▄▄▄  ███   ████
████   ██▌ ▐███████    ████
████   ██▌  ▀▀▀  ███   ████
▀████  ▀███▄▄ ▄▄███▀  ████▀

 ▀████    ▀▀███▀▀    ████▀
  ▀████▄▄         ▄▄████▀

    ▀██████▄▄▄▄▄██████▀
       ▀▀█████████▀▀
COINTOKEN
fenghush
Sr. Member
****
Offline Offline

Activity: 658
Merit: 250



View Profile
January 13, 2015, 09:05:50 AM
 #57

Run make test and see.
*schnipp schnapp*

It's an issue of what Bitcoin Core will use. If it's statically linking an OK version of OpenSSL, then updated your system OpenSSL is OK. If it's dynamically linking, then you'll have problems. The binaries on bitcoin.org statically link OpenSSL. I think that almost all Linux distros distribute versions of bitcoind/bitcoin-qt that dynamically link.

I guess this answers my main question!

If you're compiling Bitcoin Core using the normal configure+make, then it'll link dynamically. I'm not sure how to force this to link statically.

This problem would also affect self-compiled altcoin-wallets for which no altcoin.org-version exist, wouldn't it?

uki
Legendary
*
Offline Offline

Activity: 1358
Merit: 1000


cryptojunk bag holder


View Profile
January 13, 2015, 10:46:49 AM
 #58

ubuntu 14.04
Quote
affected?
same OS, my version is:
Code:
OpenSSL 1.0.1f 6 Jan 2014
I understand that this version is fine and I only don't need to upgrade to version 1.0.1k, but wait for the following one.
Did I understand that correctly?
well, apparently not.
Version 1.0.1f (6 Jan 2014) seems to be affected, too.
Running reindexing now.

this space is intentionally left blank
siameze
Legendary
*
Offline Offline

Activity: 1064
Merit: 1000



View Profile
January 13, 2015, 02:40:22 PM
 #59

Kind of makes me glad I haven't bothered upgrading openssl in some time.

*blank stare*


 Cheesy I guess he's being sarcastic

Well sarcasm is one of those things that doesn't translate well on forums sometimes. [/sarcasm] tags may be appropriate in the future.


                     ▀▀█████████▀████████████████▄
                        ████▄      ▄████████████████
                     ▄██████▀  ▄  ███████████████████
                  ▄█████████▄████▄███████████████████
                ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀████████
                                               ▀▀███▀
    ▄█▀█       ▄▀  ▄▀▀█  ▄▀   █████████████████▄ ██▀         ▄▀█
   ▄█ ▄▀      ▀█▀ █▀ █▀ ▀█▀  ███████████████████ █▀ ▀▀      ▄▀▄▀
  ▄█    ▄███  █     █   █   ████████████████████  ▄█     ▄▀▀██▀ ▄███
███▄▄▄  █▄▄▄ █▄▄ ▄▄▀   █▄▄ ██████████████████▀▀   █▄▄ ▄▄ █▄▄█▄▄▄█▄▄▄
                           ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                            ▀▀█████████████▄
                                █████████████▄
                                  █████████████▄
                                    ▀███████▀▀▀▀▀
                                      ▀████▀
                                        ▀█▀
LetItRideINNOVATIVE ▬▬▬
DICE GAME
                        ▄███████████▄
                       ██  ██████████▄
                     ▄█████████████  ██▄
            ▄▄▀█▄▄▄▄▄████████████████████▄
        ▄▄█▀   ███████████  █████  ████  █
    ▄██████ ▄▄███████████████████████████▀
 ▄▀▀ ██████████████████████████  ████  █
█  ▄███████████▀▀▀█████████████████████
██████████████    ████████▀▀██████  █▀
██████████████▄▄▄██████████   ▀▀▀▀▀▀▀
███▀ ▀██████████████████████
██    ███████████████████████
██▄▄██████████████████████████
██████████████▀   ██████████
  █████████████   ▄██████▀▀
     ▀▀██████████████▀▀
         ▀▀██████▀▀
PROVABLY
F A I R
▄█████████████▀ ▄█
██            ▄█▀
██          ▄██ ▄█
██ ▄█▄    ▄███  ██
██ ▀███▄ ▄███   ██
██  ▀███████    ██
██    █████     ██
██     ███      ██
██      ▀       ██
██              ██
▀████████████████▀
BUY  BACK
PLANS
[BTC]
Geronymo
Newbie
*
Offline Offline

Activity: 23
Merit: 0


View Profile
January 13, 2015, 07:22:30 PM
 #60

Sorry, but what is the actually BC version atm?
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
January 13, 2015, 07:47:35 PM
 #61

Sorry, but what is the actually BC version atm?
0.9.4 is current stable.
0.10.0rc3 is release candidate.

OnkelPaul
Legendary
*
Offline Offline

Activity: 1039
Merit: 1004



View Profile
January 13, 2015, 08:46:59 PM
 #62

Today Ubuntu 14.10 had the new bitcoin-qt and bitcoind binaries. Kudos to the package maintainers!
Now bitcoin-qt reindexes the blocks, it's taking forever  Angry
I'm all for using a less volatile EC library (and static linking) to avoid this in the future...

Onkel Paul

uki
Legendary
*
Offline Offline

Activity: 1358
Merit: 1000


cryptojunk bag holder


View Profile
January 13, 2015, 09:12:21 PM
 #63

Today Ubuntu 14.10 had the new bitcoin-qt and bitcoind binaries. Kudos to the package maintainers!
Now bitcoin-qt reindexes the blocks, it's taking forever  Angry
I'm all for using a less volatile EC library (and static linking) to avoid this in the future...

Onkel Paul
Ubuntu 14.04 myself, after the latest repository update of openssl 1.0.1f problems started.
I am reindexing right now, for the last 12+ hours (stacked somewhere in August 2014 with about 30k blocks to go).
Do you know if there is any way to speed it up?

this space is intentionally left blank
OnkelPaul
Legendary
*
Offline Offline

Activity: 1039
Merit: 1004



View Profile
January 13, 2015, 09:50:47 PM
 #64

I am reindexing right now, for the last 12+ hours (stacked somewhere in August 2014 with about 30k blocks to go).
Do you know if there is any way to speed it up?

Nope, I guess indexing the blocks just takes its time since it covers all transactions, and there are a lot of transactions by now...
Mine is in May 2014, 33 weeks to go.

Onkel Paul

cypherdoc
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
January 13, 2015, 10:54:11 PM
 #65

so i have openssl 1.0.1f but everything seems up to date with the blockchain w/o any obvious problems.  any need to reindex?
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
January 13, 2015, 10:55:53 PM
 #66

so i have openssl 1.0.1f but everything seems up to date with the blockchain w/o any obvious problems.  any need to reindex?
If you have 0.9.4 or 0.10.0rc3, and your blockchain isn't stuck already, you don't need to reindex.
If you're not on the latest versions, then if your blockchain isn't stuck, it will be eventually.

codyswanson4
Member
**
Offline Offline

Activity: 63
Merit: 10


View Profile
January 13, 2015, 11:03:42 PM
 #67

Damn...Saw this a little too late...oh well...I'm on the school's internet  Grin

Need something done in C??  PM me!!
cypherdoc
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
January 14, 2015, 01:05:28 AM
 #68

so i have openssl 1.0.1f but everything seems up to date with the blockchain w/o any obvious problems.  any need to reindex?
If you have 0.9.4 or 0.10.0rc3, and your blockchain isn't stuck already, you don't need to reindex.
If you're not on the latest versions, then if your blockchain isn't stuck, it will be eventually.

so i just upgraded from 0.9.3 to 0.9.4 but left openssl at 1.0.1f.  blockchain is not stuck at this pt.  ok?
davidpbrown
Sr. Member
****
Offline Offline

Activity: 531
Merit: 260


Vires in Numeris


View Profile WWW
January 14, 2015, 09:11:35 AM
 #69

For Linux users not on Ubuntu could we get https://bitcoin.org/en/download updated with the .tgz and/or some suggestion of which repository can be trusted.. and perhaps have the News alert on this site updated with a pointer to downloads, as that was always useful.

฿://12vxXHdmurFP3tpPk7bt6YrM3XPiftA82s
milly6
Legendary
*
Offline Offline

Activity: 1632
Merit: 1010



View Profile WWW
January 14, 2015, 04:29:42 PM
 #70

Kind of makes me glad I haven't bothered upgrading openssl in some time.

If you havent upgraded in some time you are likely vulnerable to heartbleed.

Eyes open, No Fear. Be Safe! Trinity: Currency Without Bias
rgenito
Full Member
***
Offline Offline

Activity: 140
Merit: 101


View Profile WWW
January 15, 2015, 01:46:16 AM
 #71

I thought OpenSSL has always been a joke...right?

https://geni.app - Genius – The Crypto Solution to Retirement
fenghush
Sr. Member
****
Offline Offline

Activity: 658
Merit: 250



View Profile
January 15, 2015, 12:50:01 PM
 #72

I thought OpenSSL has always been a joke...right?

A joke on which a lot of the internet relies on.

Cryddit
Legendary
*
Offline Offline

Activity: 924
Merit: 1129


View Profile
January 15, 2015, 10:12:54 PM
 #73

The problem is that we are using the current version of SSL (whatever's on the system/linked) to check the validity of blocks that were accepted with past versions of SSL.  

This is why the makefile for bitcoind specified static linking in the first place.

I am ... upset.  We should be using current versions of SSL for communications, because SSL gets valuable security upgrades.  But we should be using it for protocol only, because checking past blocks with a version that was not the version which governed their acceptance  risks exactly this sort of divergence.  Our need for SSL as a communications protocol does not affect the validity of data already transmitted.  

SSL will continue to change, and those changes cannot be allowed to affect data already transmitted and received, nor our software's opinion about whether that already-accepted data is valid.  Neither our stored blockchain data nor our ability to check our stored data should have anything to do with it.

Our need for cryptographic functions once a block is accepted are different, and absolutely NOT subject to revision.  That is, whatever's required to CHECK blockchain validity absolutely must not be something that can be altered by any change in a system library.  

I presume that SSL will continue to "tighten" its spec - that is, whatever is acceptable to future versions will also be acceptable to past versions. Therefore using routines from a three-year-old version of SSL to check data transmitted and received using the current version of SSL ought never fail, and using the current version for communications should get us the benefit of security fixes.  Updated routines can be compiled into the client NO SOONER THAN they are known to work with the entire current blockchain.


Cryddit


Blazr
Hero Member
*****
Offline Offline

Activity: 882
Merit: 1005



View Profile
January 20, 2015, 04:08:05 AM
 #74

I'm using 1.0.1h.

Is this version OK?
It's still finishing up syncing and hasn't stuck yet.

ShadowOfHarbringer
Legendary
*
Offline Offline

Activity: 1470
Merit: 1005


Bringing Legendary Har® to you since 1952


View Profile
January 21, 2015, 12:44:54 PM
 #75

New versions of OpenSSL such as 1.0.0Q and 1.0.0L came out.

Are they affected by the bug ?

Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
January 21, 2015, 04:42:33 PM
 #76

New versions of OpenSSL such as 1.0.0Q and 1.0.0L came out.

Are they affected by the bug ?
All new versions of OpenSSL for the foreseeable future will be affected.
They don't see it as a bug, as they never guaranteed consensus compatibility.

ShadowOfHarbringer
Legendary
*
Offline Offline

Activity: 1470
Merit: 1005


Bringing Legendary Har® to you since 1952


View Profile
January 21, 2015, 05:09:43 PM
 #77

New versions of OpenSSL such as 1.0.0Q and 1.0.0L came out.

Are they affected by the bug ?
All new versions of OpenSSL for the foreseeable future will be affected.
They don't see it as a bug, as they never guaranteed consensus compatibility.
Oh, that is just beautiful.

Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
January 21, 2015, 05:22:30 PM
 #78

New versions of OpenSSL such as 1.0.0Q and 1.0.0L came out.

Are they affected by the bug ?
All new versions of OpenSSL for the foreseeable future will be affected.
They don't see it as a bug, as they never guaranteed consensus compatibility.
Oh, that is just beautiful.
We're working on a 0.9.5 (and 0.10 of course) that will softfork to make us independent of OpenSSL so this can never happen again.
See sipa's proposal at http://www.mail-archive.com/bitcoin-development@lists.sourceforge.net/msg06744.html

ShadowOfHarbringer
Legendary
*
Offline Offline

Activity: 1470
Merit: 1005


Bringing Legendary Har® to you since 1952


View Profile
January 21, 2015, 08:40:59 PM
 #79

New versions of OpenSSL such as 1.0.0Q and 1.0.0L came out.

Are they affected by the bug ?
All new versions of OpenSSL for the foreseeable future will be affected.
They don't see it as a bug, as they never guaranteed consensus compatibility.
Oh, that is just beautiful.
We're working on a 0.9.5 (and 0.10 of course) that will softfork to make us independent of OpenSSL so this can never happen again.
See sipa's proposal at http://www.mail-archive.com/bitcoin-development@lists.sourceforge.net/msg06744.html
Yeah, I already know about this. Good work, guys. (Yes - you too, Luke - even though i really hate your Gentoo patches).

dexX7
Legendary
*
Offline Offline

Activity: 1106
Merit: 1024



View Profile WWW
January 25, 2015, 03:37:01 PM
 #80

ubuntu 14.04
Quote
affected?
same OS, my version is:
Code:
OpenSSL 1.0.1f 6 Jan 2014
I understand that this version is fine and I only don't need to upgrade to version 1.0.1k, but wait for the following one.
Did I understand that correctly?
well, apparently not.
Version 1.0.1f (6 Jan 2014) seems to be affected, too.
Running reindexing now.

I can confirm that Version 1.0.1f (6 Jan 2014) caused 4 test failures here as well.

bit_stacker
Full Member
***
Offline Offline

Activity: 141
Merit: 100


View Profile
January 27, 2015, 02:36:53 AM
 #81

Any word on 1.0.2 ? 

GPG ID: 45F781B4
najjmi4u
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
January 27, 2015, 04:25:54 AM
 #82

Thanks a lot for giving us info to us because any info from u is validate
For us and it very better for us . good for us
arnuschky
Hero Member
*****
Offline Offline

Activity: 517
Merit: 501


View Profile
January 27, 2015, 09:34:31 PM
 #83

ubuntu 14.04
Quote
affected?
same OS, my version is:
Code:
OpenSSL 1.0.1f 6 Jan 2014
I understand that this version is fine and I only don't need to upgrade to version 1.0.1k, but wait for the following one.
Did I understand that correctly?
well, apparently not.
Version 1.0.1f (6 Jan 2014) seems to be affected, too.
Running reindexing now.

I can confirm that Version 1.0.1f (6 Jan 2014) caused 4 test failures here as well.

The problem is that distributions tend to backport updates that are marked as security updates (as this one).
arnuschky
Hero Member
*****
Offline Offline

Activity: 517
Merit: 501


View Profile
January 27, 2015, 09:44:13 PM
Last edit: January 27, 2015, 10:22:20 PM by arnuschky
 #84

ubuntu 14.04
Quote
affected?
same OS, my version is:
Code:
OpenSSL 1.0.1f 6 Jan 2014
I understand that this version is fine and I only don't need to upgrade to version 1.0.1k, but wait for the following one.
Did I understand that correctly?
well, apparently not.
Version 1.0.1f (6 Jan 2014) seems to be affected, too.
Running reindexing now.

I can confirm that Version 1.0.1f (6 Jan 2014) caused 4 test failures here as well.

The problem is that distributions tend to backport updates that are marked as security updates (as this one).

Here you go for Ubuntu: this is the security update that backports this patch to Ubuntu 14.10, Ubuntu 14.04 LTS,
Ubuntu 12.04 LTS, and Ubuntu 10.04 LTS: http://www.ubuntu.com/usn/usn-2459-1/

That means: if you are running any of the Ubuntu (server) versions above, you are very likely affected. If you are running Ubuntu LTS, you are for sure affected. In these cases, don't upgrade your OpenSSL installation.

Here's the list of package versions that you should NOT install (that is, the package versions with the backported patch):

Code:
Ubuntu 14.10: libssl1.0.0 1.0.1f-1ubuntu9.1 
Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.8
Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.21
Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.23

How to avoid upgrading accidentally? Simply execute:

Code:
sudo apt-mark hold openssl

PS: don't trust the version reported by
Code:
openssl version
as it does not cover the backports. Execute
Code:
dpkg -s openssl | grep Version
to see which version you have.
buycoin.cc
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
January 28, 2015, 12:42:41 AM
 #85

Greg Maxwell's announcement:  
http://sourceforge.net/p/bitcoin/mailman/message/33221963/

Summary:

There is a problem with the most recent release of OpenSSL which will cause issues for some users of Bitcoin Core on Linux. This is not a critical security issue, but everyone using Bitcoin Core on Linux should read the following information, especially if you're automatically processing Bitcoin payments. The worst-case scenario is that you might accept transactions as confirmed which are later reversed.

You are likely to be affected only if:

- You use Linux.
- You installed Bitcoin Core using your distro's package manager or you compiled Bitcoin Core yourself without using gitian. You are not affected if you use the binaries on bitcoin.org.
- You upgrade your system's OpenSSL to 1.0.0p or 1.0.1k. These were security-fix releases, so your package manager might have updated them automatically.

If you are affected, then your client might become stuck at a particular block, and you'll have to reindex the block chain to fix it. In some conceivable but unlikely scenarios, you might see incoming transactions as having 6+ confirmations when the transactions are actually invalid. If you are a pool operator, then you could conceivably start mining on a false chain, which would cause you to lose all of your future blocks until you fix this.

If you are using an affected version of Bitcoin Core, you should either make sure that your system OpenSSL does not get updated or shut down Bitcoin Core until an update fixing this is released in a day or two. If Bitcoin Core is already stuck and showing the "We do not appear to fully agree with our peers!" message, shut it down until an update fixing this is released; when you run that version, you'll have to run it with the -reindex switch.

Hello,

I am develop a trading platform now, I must to compile the bitcoin source code by myself,
so, which version of the openssl I can use? Thanks.

my other question is, why the bitcoin system don't maintain one correct branch of openssl?
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
January 28, 2015, 01:08:10 AM
 #86

I am develop a trading platform now, I must to compile the bitcoin source code by myself,
so, which version of the openssl I can use? Thanks.
At this point, just use 0.9.4.

my other question is, why the bitcoin system don't maintain one correct branch of openssl?
Too large a codebase of mostly obfuscated spaghetti code.
It's going to be replaced with libsecp256k1 (which we do maintain) "soon" (planned since before this issue).

buycoin.cc
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
January 28, 2015, 02:01:34 AM
 #87

I am develop a trading platform now, I must to compile the bitcoin source code by myself,
so, which version of the openssl I can use? Thanks.
At this point, just use 0.9.4.

my other question is, why the bitcoin system don't maintain one correct branch of openssl?
Too large a codebase of mostly obfuscated spaghetti code.
It's going to be replaced with libsecp256k1 (which we do maintain) "soon" (planned since before this issue).

Thank you very much. Can I use 0.9.4 and openssl-0.9.8?

I plan to support more peer-to-peer Internet currency on my trading platform, I guess other p2p currency have the same problem, so I want to use the unified version of openssl to compile all the source code.
buycoin.cc
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
January 28, 2015, 02:44:20 AM
 #88

I am develop a trading platform now, I must to compile the bitcoin source code by myself,
so, which version of the openssl I can use? Thanks.
At this point, just use 0.9.4.

my other question is, why the bitcoin system don't maintain one correct branch of openssl?
Too large a codebase of mostly obfuscated spaghetti code.
It's going to be replaced with libsecp256k1 (which we do maintain) "soon" (planned since before this issue).

And, I run official  bitcoind 0.9.3 to download all block data, no any transactions yet, but a few days ago I change to 0.9.3 source code compile with openssl 1.0.0k , continue to sync the block data. Whether I still need to run -reindex to fix it?
triplef
Full Member
***
Offline Offline

Activity: 338
Merit: 100


https://eloncity.io/


View Profile
January 31, 2015, 04:44:15 AM
Last edit: January 31, 2015, 04:54:40 AM by triplef
 #89

ubuntu 14.04
Quote
affected?
same OS, my version is:
Code:
OpenSSL 1.0.1f 6 Jan 2014
I understand that this version is fine and I only don't need to upgrade to version 1.0.1k, but wait for the following one.
Did I understand that correctly?
well, apparently not.
Version 1.0.1f (6 Jan 2014) seems to be affected, too.
Running reindexing now.

I can confirm that Version 1.0.1f (6 Jan 2014) caused 4 test failures here as well.

The problem is that distributions tend to backport updates that are marked as security updates (as this one).

Here you go for Ubuntu: this is the security update that backports this patch to Ubuntu 14.10, Ubuntu 14.04 LTS,
Ubuntu 12.04 LTS, and Ubuntu 10.04 LTS: http://www.ubuntu.com/usn/usn-2459-1/

That means: if you are running any of the Ubuntu (server) versions above, you are very likely affected. If you are running Ubuntu LTS, you are for sure affected. In these cases, don't upgrade your OpenSSL installation.

Here's the list of package versions that you should NOT install (that is, the package versions with the backported patch):

Code:
Ubuntu 14.10: libssl1.0.0 1.0.1f-1ubuntu9.1 
Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.8
Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.21
Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.23

How to avoid upgrading accidentally? Simply execute:

Code:
sudo apt-mark hold openssl

PS: don't trust the version reported by
Code:
openssl version
as it does not cover the backports. Execute
Code:
dpkg -s openssl | grep Version
to see which version you have.


how do you downgrade ?

Code:
 lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:    Ubuntu 14.04.1 LTS
Release:        14.04
Codename:       trusty

Code:
dpkg -s openssl | grep Version
Version: 1.0.1f-1ubuntu2.8

arnuschky
Hero Member
*****
Offline Offline

Activity: 517
Merit: 501


View Profile
January 31, 2015, 01:29:20 PM
 #90

how do you downgrade ?

Code:
 lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:    Ubuntu 14.04.1 LTS
Release:        14.04
Codename:       trusty

Code:
dpkg -s openssl | grep Version
Version: 1.0.1f-1ubuntu2.8

You need to search for the version you need, download if for your architecture, and install it manually.

For example, in this case you search for 1.0.1f-1ubuntu2.7. You can find it here: https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.7
Select your architecture and download the .deb package of openssl and libssl (and the -dev packages if you need them). Then install them using dbpg.

Assuming that you're on 64bit:

Code:
wget https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+build/6463840/+files/openssl_1.0.1f-1ubuntu2.7_amd64.deb
wget https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+build/6463840/+files/libssl1.0.0_1.0.1f-1ubuntu2.7_amd64.deb
dpkg -i openssl_1.0.1f-1ubuntu2.7_amd64.deb
dpkg -i libssl1.0.0_1.0.1f-1ubuntu2.7_amd64.deb

That's it Smiley
gigantic
Member
**
Offline Offline

Activity: 89
Merit: 10



View Profile
January 31, 2015, 05:27:51 PM
 #91

how do you downgrade ?

Code:
 lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:    Ubuntu 14.04.1 LTS
Release:        14.04
Codename:       trusty

Code:
dpkg -s openssl | grep Version
Version: 1.0.1f-1ubuntu2.8

You need to search for the version you need, download if for your architecture, and install it manually.

For example, in this case you search for 1.0.1f-1ubuntu2.7. You can find it here: https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.7
Select your architecture and download the .deb package of openssl and libssl (and the -dev packages if you need them). Then install them using dbpg.

Assuming that you're on 64bit:

Code:
wget https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+build/6463840/+files/openssl_1.0.1f-1ubuntu2.7_amd64.deb
wget https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+build/6463840/+files/libssl1.0.0_1.0.1f-1ubuntu2.7_amd64.deb
dpkg -i openssl_1.0.1f-1ubuntu2.7_amd64.deb
dpkg -i libssl1.0.0_1.0.1f-1ubuntu2.7_amd64.deb

That's it Smiley

Thank you very much for this
But it seems now i can't update & upgrade ubuntu, it says something about wrong dependencies, any solution for that?
arnuschky
Hero Member
*****
Offline Offline

Activity: 517
Merit: 501


View Profile
February 01, 2015, 11:14:24 AM
 #92

Thank you very much for this
But it seems now i can't update & upgrade ubuntu, it says something about wrong dependencies, any solution for that?

Without you telling me which dependencies are wrong, no. Wink Most likely, you downgraded only part of your openssl packages, leaving some at the newer version. Make sure that you downgrade them all.

Do a dpkg -l | grep '1.0.1f' so see if there are different versions installed.
gigantic
Member
**
Offline Offline

Activity: 89
Merit: 10



View Profile
February 02, 2015, 06:17:21 AM
 #93

Thank you very much for this
But it seems now i can't update & upgrade ubuntu, it says something about wrong dependencies, any solution for that?

Without you telling me which dependencies are wrong, no. Wink Most likely, you downgraded only part of your openssl packages, leaving some at the newer version. Make sure that you downgrade them all.

Do a dpkg -l | grep '1.0.1f' so see if there are different versions installed.

Okay, i think you are correct, here is the output-
iU  libssl1.0.0:amd64                                     1.0.1f-1ubuntu2.7                                   amd64        Secure Sockets Layer toolkit - shared libraries
iF  libssl1.0.0:i386                                      1.0.1f-1ubuntu2.8                                   i386         Secure Sockets Layer toolkit - shared libraries
hi  openssl                                               1.0.1f-1ubuntu2.7                                   amd64        Secure Sockets Layer toolkit - cryptographic utility

it have libssl 2.8, how do i completly remove it?
i am using ubuntu 14.04 64 bit,

Thank you very much!

arnuschky
Hero Member
*****
Offline Offline

Activity: 517
Merit: 501


View Profile
February 02, 2015, 07:37:55 AM
 #94

You also need to download the i386 version of libssl (same procedure as the other packages above).
dserrano5
Legendary
*
Offline Offline

Activity: 1974
Merit: 1029



View Profile
February 02, 2015, 08:23:59 AM
 #95

iU  libssl1.0.0:amd64                                     1.0.1f-1ubuntu2.7                                   amd64        Secure Sockets Layer toolkit - shared libraries
iF  libssl1.0.0:i386                                      1.0.1f-1ubuntu2.8                                   i386         Secure Sockets Layer toolkit - shared libraries

You have broken packages, those "iU" and "iF" at the beginning of the lines are pretty nasty. Run 'apt-get -f install'.
Cryddit
Legendary
*
Offline Offline

Activity: 924
Merit: 1129


View Profile
February 07, 2015, 10:39:56 PM
 #96

This is probably well after most people have already patched or defended against this, but the patch in question just got rolled out for Debian Jessie. 

Jessie has been on openssl1.0.1j up until now, and they're rolling out the 'k' version.

When upgrading Debian Jessie:

If you are otherwise vulnerable (compiled it yourself) you need to hold three items because of the way Debian breaks things up into smaller chunks.

Before upgrading your system do the following, either with 'sudo' or as root:  

apt-mark hold openssl libssl1.0.0 libssl-dev
hashman
Legendary
*
Offline Offline

Activity: 1264
Merit: 1008


View Profile
February 07, 2015, 10:56:33 PM
 #97

It looks like no altcoins have addressed this.  What does this mean for their vulnerability? 
Cryddit
Legendary
*
Offline Offline

Activity: 924
Merit: 1129


View Profile
February 07, 2015, 11:11:15 PM
 #98

It looks like no altcoins have addressed this.  What does this mean for their vulnerability? 

Those based on Bitcoin or Litecoin sources (which, to be fair, is almost all of them) are at least possibly vulnerable if they have not merged the recent fixes from Bitcoin core or formed equivalent fixes.

That said, their blockchains are mostly much smaller and contain, in relative numbers, almost no transactions.  Whether they are vulnerable in practice depends on whether their blockchains do or don't contain any blocks that the new SSL will find problematic when their users upgrade their SSL.   

So, if someone wanted to destroy a whole bunch of altcoins right now, he could deliberately mine blocks that fail the new SSL check and pass the old SSL check.  They'd all hang when they tried to process the bogus block.


Dogecoin
Full Member
***
Offline Offline

Activity: 141
Merit: 231


View Profile
February 08, 2015, 12:07:45 PM
 #99

It looks like no altcoins have addressed this.  What does this mean for their vulnerability?  

We applied a patch to our source back on the 9th Jan (https://github.com/dogecoin/dogecoin/commit/6fa9a5e31a46120ffc772d7e8ca748b851c78f7f), and new binaries have been released compiled against OpenSSL 1.0.1l. I've also worked on a couple of open source libraries to ensure they're compatible as well.

I believe Darkcoin patched very early on too.

So; I would imagine a large number of alts haven't applied these patches, but it's almost certainly not "no altcoins".

Dogecoin developer comments

PMs are not read, please message individuals directly if needed.
Dogecoin
Full Member
***
Offline Offline

Activity: 141
Merit: 231


View Profile
February 08, 2015, 12:18:47 PM
 #100

So, if someone wanted to destroy a whole bunch of altcoins right now, he could deliberately mine blocks that fail the new SSL check and pass the old SSL check.  They'd all hang when they tried to process the bogus block.

My understanding (which is to say, I've only read the documentation, I haven't run a full simulation of this) is that the code doesn't hang, it simply rejects non-strict DER signatures. What you'd see is some nodes accepting transactions which others reject, so the result is actually a hard fork.

Dogecoin developer comments

PMs are not read, please message individuals directly if needed.
Geremia
Sr. Member
****
Offline Offline

Activity: 502
Merit: 251


View Profile WWW
February 13, 2015, 10:16:27 PM
 #101

Does this affect Armory, which uses Bitcoin core? If so, how does it affect it?

It seems t wouldn't since a "holy-grail feature of Armory" is that it doesn't download such a huge chunk of the blockchain that BitcoinQt does, right?

BTC tip jar | my BTC wiki, BTC StackExchange | Tox ID: 65C3E8810738AD9D175234808FCB317A1103632903436203D45411AE97C03F54C34861AB6663
Join Kraken. | The best, free book on Bitcoin: Mastering Bitcoin
Nos cum prole pia benedicat Virgo Maria.
ThiagoCMC
Legendary
*
Offline Offline

Activity: 1204
Merit: 1000

฿itcoin: Currency of Resistance!


View Profile
February 15, 2015, 02:11:56 PM
 #102

Guys,

I'm running Ubuntu 14.04.1, 64-bit, with Bitcoin 0.9.4 from its PPA, I just upgraded everything (openssl version 1.0.1f-1ubuntu2.8, linux version 3.16).

Is that okay?

This node that I am running, have no coins (I have no coins), it is just a node to help the network... I hope to not bring problems...

Cheers!
Pages: 1 2 3 4 5 6 [All]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!