| 
| Translate 
 
   
 
 
   
 
   
 
   
 
   
 
   
 
   
 
   
 
   
 
   
 
   
IBU 
Consol
 |  | Created 8 April 2014 By Julian H.
    Stacey Non technical:
      
        
          The SSL bug opens many potential internet security
          loopholes for users (irrespective of Microsoft, BSD,
          Linux etc). Many SSL based services may be affected eg
          SMTP, POP, IMAP, SASL, XMPP(chat) VPN (corporate nets)
          etc. 
          Allow system admins a few days to assess & upgrade
          servers. Just browse for a few days, Avoid net banking
          & web + card purchases; avoid services where you
          login, security keys, inc. clouds & chat. Mail with
          POP IMAP, VPN all affected. Maybe webmail too. Do not rush to login &
          check accounts & change passwords; wait for
          administrators to secure sites. (Although in theory
          passwords etc could have been harvested since March 2012,
          a low chance of that, & a much higher chance in last
          days of criminals trying to exploit the just published
          weakness with current net traffic, so keep off for a few
          days).http://www.bbc.com/news/technology-26935905http://www.snopes.com/computer/virus/heartbleed.aspIt's Not a virus! despite this non technical article
        labeling it as such in URL & graphic button on the
        page.
        http://askbobrankin.com/a_gaping_hole_in_internet_security.html?awt_l=7tTPw&awt_m=IiC1hGQx5uP6SLOmits "Do not rush to
        login" etc.
Please Don't Mail Me Questions: Read the web &
        learn, then if you need, ask who you employ for support, eg
        your company's or net provider's system
        administrators. Technical
    
http://heartbleed.com/
    Alert re SSL TLS X.509
    out in the wild since OpenSSL release 1.0.1 on 14th of March 2012.
    OpenSSL 1.0.1g released on 7th of April 2014 fixes the bug
    vulnerable:
        FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013
    not vulnerable:
        FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013
        FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC)
    -DOPENSSL_NO_HEARTBEATS
whois heartbleed.com
    Creation Date: 2014-04-05 15:13
    Registrant Name: Marko Laakso
    Registrant Organization: Codenomicon Oy
    Registrant Country: Finland
http://www.openssl.org/news/secadv_20140407.txt
    OpenSSL Security Advisory [07 Apr 2014]
    TLS heartbeat read overrun (CVE-2014-0160)
    A missing bounds check in the handling of the TLS heartbeat extension can be
    used to reveal up to 64k of memory to a connected client or server.
    Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
    1.0.1f and 1.0.2-beta1.
    Thanks for Neel Mehta of Google Security for discovering this bug and to
    Adam Langley <agl@@@chromium.org> and Bodo Moeller <bmoeller@@@acm.org> for
    preparing the fix.
    Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
    upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.
    1.0.2 will be fixed in 1.0.2-beta2.
German: http://heise.de/-2165995
http://www.heise.de/security/meldung/SSL-Gau-So-testen-Sie-Programme-und-Online-Dienste-2165995.html
http://heise.de/-2165995GERMAN = DEUTSCH
    Am Vormittag waren zum Beispiel Adobe.com, Web.de, VeriSign.com,
    Comodo.com sowie die Site des Online-Passwortmanagers
    LastPass noch verwundbar.
    Am Dienstagnachmittag war selbst die Site des OpenSSL-Projekts noch verwundbar. 
    OpenSSH ist dem ersten Anschein nach nicht betroffen
http://filippo.io/Heartbleed/
    example.com[:443]
/etc/services
    https           443/sctp
http://filippo.io/Heartbleed/#yourhost.com:443
http://www.berklix.org servers run FreeBSD:
http://lists.freebsd.org/pipermail/freebsd-security/2014-April/subject.html
http://lists.freebsd.org/pipermail/freebsd-security/2014-April/007404.html
http://lists.freebsd.org/pipermail/freebsd-questions/2014-April/257326.html
http://lists.freebsd.org/pipermail/freebsd-security-notifications/2014-April/000200.html
    refers to CVE-2014-0076 & CVE-2014-0160 & openssl.patch 
FreeBSD-9.1:
    cd /var/db/pkg; echo openssl*
    cd /var/db/ports/openssl
    grep OPENSSL_NO_HEARTBEATS /var/db/ports/openssl/options
    mv /var/db/ports/openssl /var/db/ports/openssl.was
    cd /usr/ports/security/openssl 
    make clean
    make
        No mention of heartbeat during configure.
        Need to import current ports/ sources.  ....
    pkg_info -R openssl-1.0.1_4
        apache22-2.2.23 cyrus-sasl-2.1.25_2 lynx-2.8.7.2,1
FreeBSD-9.1 + /pub/FreeBSD/branches/-current/ports/security/openssl/Makefile
        350548 2014-04-07 21:46:40Z
        DISTVERSIONSUFFIX=      g
        PORTREVISION=   10
    sftp & cp -R ....
    cd /usr/ports/security/openssl.2014-04-07 ; make install
        broke, needed new Mk/ too ... sftp ....
    cd /var/db/pkg; echo openssl*
        openssl-1.0.1_10 openssl-1.0.1_4
    pkg_delete -f openssl-1.0.1_4
    ....
    cd /pub/FreeBSD/branches/-current/ports/ports-mgmt/dialog4ports 
    tar zcf ~/tmp/j . 
    sftp ..
    mkdir /usr/ports/ports-mgmt/dialog4ports
    cd /usr/ports/ports-mgmt/dialog4ports
    tar zxf ~/tmp/j
    make clean ; make install
    cd /usr/ports/security/openssl.2014-04-07
    make clean
    rm -rf /var/db/ports/openssl*
    make
    make install
    cd /etc/mail
    make stop
    make start
    mailq
FreeBSD-9.2:
    man ssh: The HISTORY section of ssl(8) contains a brief discussion
        of the DSA and RSA algorithms.
    man sshd: no mention of ssl
    man ssl: The OpenSSL ssl library implements the Secure Sockets Layer (SSL v2/v3)
        and Transport Layer Security (TLS v1) protocols.
    cd /var/db/pkg; echo openssl*
    pkg_info -R openssl-1.0.1_8
        cups-base-1.5.4_1 cups-1.5.4 hplip-3.13.6
        openldap-client-2.4.35 libreoffice-4.0.4_1 git-1.8.3.4
        dillo-3.0.3 wget-1.14_2 wireshark-1.10.1
    echo firefox*
    pkg_info -r firefox-23.0,1 | grep -i ssl    # Nothing :-)
    PS  extracts:
    {
    From: Pete Stephenson <pete@@@heypete.com>
    Date: Thu, 10 Apr 2014 00:45:55 +0200
    To: ...  gnupg-users@@@gnupg.org
    
    Firefox is immune because it uses the NSS Crypto library.
    }
    ----------
    {
    From: Sam Gleske <sam.mxracer@gmail.com>
    Date: Wed, 9 Apr 2014 19:10:10 -0400 (Thu 01:10 CEST)
    To: ...  Gnupg-users <gnupg-users@gnupg.org>
    
    
    While it's true Firefox does not link openssl in binaries the vulnerability
    allows an attacker to easily hijack sessions, steal usernames and
    passwords, and steal the server private key during the SSL negotiation
    phase.  See my comments above for how you can verify that.
    }
    ----------
FreeBSD-10.0:
    cd /var/db/pkg; echo openssl* # openssl-1.0.1_8
    cd /var/db/ports/openssl # /var/db/ports/openssl: No such file or directory.
Mentioned on gnnupg mail list:
http://pastebin.com/WmxzjkXJ
contains 
http://s3.jspenguin.org/ssltest.py
 |  |