vulnerabilities:heartbleed
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
vulnerabilities:heartbleed [2016/10/20 08:47] – peter | vulnerabilities:heartbleed [2019/12/04 22:19] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Vulnerabilities - HeartBleed ====== | ||
- | Heartbleed was introduced in OpenSSL version 1.0.1 and is patched with OpenSSL version 1.0.1g. | ||
- | |||
- | The bug allows any attacker to read the memory of a vulnerable host, which means that any keys that have been used on a host with a vulnerable version of OpenSSL should be considered compromised. | ||
- | |||
- | ===== Checking the OpenSSL Version Numbers ===== | ||
- | |||
- | <code bash> | ||
- | dpkg -l | grep " | ||
- | </ | ||
- | |||
- | Returns something like: | ||
- | |||
- | < | ||
- | ii openssl | ||
- | </ | ||
- | |||
- | |||
- | ===== To Fix ===== | ||
- | |||
- | <code bash> | ||
- | sudo apt-get update | ||
- | sudo apt-get dist-upgrade | ||
- | </ | ||
- | |||
- | If you only want to upgrade the affected packages, and not update the entire system (only recommended if you have reason to believe that upgrades to other components will break your system), you can selectively upgrade the OpenSSL packages by typing: | ||
- | |||
- | <code bash> | ||
- | sudo apt-get install --only-upgrade openssl | ||
- | sudo apt-get install --only-upgrade libssl1.0.0 | ||
- | </ | ||
- | |||
- | |||
- | ===== Revoking and Reissuing Your SSL Certs/Keys ===== | ||
- | |||
- | If you have purchased an SSL certificate from a provider and you have updated your OpenSSL packages on your server, you will need to revoke your old keys and you'll have to reissue new keys. This is a process known as " | ||
- | |||
- | |||
- | You can generate your new SSL CSR by typing something like this. | ||
- | |||
- | <code bash> | ||
- | openssl req -new -newkey rsa:2048 -nodes -keyout hostname.key -out hostname.csr | ||
- | </ | ||
- | |||
- | You will need to copy your generated CSR into your provider' | ||
- | |||
- | You will have to install the new keys to the same location that your old keys and certificates were kept. The path that you'll need to use for your certificate and keys will vary by distribution and how you configured your web server. For instance, some are kept in **/ | ||
- | |||
- | For example, if you are using the Apache web server, you should see a line in your main Apache configuration file, a virtualhost file, or a separately sourced configuration file that points to the location where it looks for your SSL information: | ||
- | |||
- | <file apache> | ||
- | SSLEngine on | ||
- | SSLCertificateFile / | ||
- | SSLCertificateKeyFile / | ||
- | SSLCertificateChainFile / | ||
- | </ | ||
- | |||
- | These may look different, but they should point you in the correct direction to find your SSL certificate location. | ||
- | |||
- | If you are using Nginx, you'll find similar directives that point to your server' | ||
- | |||
- | <file nginx> | ||
- | server { | ||
- | . . . | ||
- | ssl_certificate / | ||
- | ssl_certificate_key / | ||
- | . . . | ||
- | } | ||
- | </ | ||
- | |||
- | Restart your web server by typing: | ||
- | |||
- | <code bash> | ||
- | sudo service apache2 restart | ||
- | sudo service nginx restart | ||
- | </ | ||
- | |||
- | ===== Additional Considerations from a Client' | ||
- | |||
- | You should consider any communication that you secured by SSL previously to have been compromised by this bug. This means any kind of interaction with secure websites were open to snooping. | ||
- | |||
- | A good first step is to change your password on every site that you use, **after** you have verified that they have updated their OpenSSL versions to patch this vulnerability. | ||
- | |||
- | One consideration that is of high importance is to secure any VPN instances that you have set up. There are a few different ways that VPN connections are implemented, | ||
- | |||
- | Another good measure is to remove all session keys and cookies. | ||
- | |||
- | |||
- | ===== References ===== | ||
- | |||
- | https:// |
vulnerabilities/heartbleed.1476953263.txt.gz · Last modified: 2020/07/15 09:30 (external edit)