D&C GLug - Home Page

[ Date Index ] [ Thread Index ] [ <= Previous by date / thread ] [ Next by date / thread => ]

Re: [LUG] OpenSSL 1.0.1 "Heartbleed" vulnerability

 

On Sat, Apr 12, 2014 at 09:57:30AM +0100, Tom wrote:
> Even auditing the software would have not found this - it seems the
> RFC for it requests just what happened!

That's incorrect, as xkcd pointed out yesterday:

  http://xkcd.com/1354/

The RFC states you should send the payload and its length, after which
the server returns the payload (and perhaps its length). The problem
with the implementation was that the receiving server didn't check
whether the length was actually the length of the payload and it just
returned this many bytes of memory.

> It has, however, been confirmed you can get the the keys from a
> server. https://www.cloudflarechallenge.com/heartbleed

Yes, that was in the link I sent. Note that the people at CloudFlare
were extremely sceptical about the possibility of something like this
happening.

Martijn.


-- 
The Mailing List for the Devon & Cornwall LUG
http://mailman.dclug.org.uk/listinfo/list
FAQ: http://www.dcglug.org.uk/listfaq