[In Plain English] Heartbleed and why I'm not worried

Discussion in 'Discussions Archive' started by blaq, Apr 11, 2014.

  1. blaq
    Offline

    blaq Experienced Member

    Joined:
    Jun 17, 2013
    Messages:
    4,625
    So there has been much confusion and so many threads regarding this Heartbleed exploit. I want to clear the air once and for all. I'll explain exactly what this is in plain english, and I'll explain why it's not as worrying as people are painting it out to be.

    First, some background:

    What is OpenSSL?
    OpenSSL is a free piece of software that many websites and programs use to provide encryption of data. It's most commonly seen when you type "https" instead of "http" infront of your web browser, but it's use is not limited to that.

    What is Heartbleed?

    Heartbleed is a mistake in the program which allows an attacker to read a small amount of the memory of the server (usually) or client that they are connecting to. It's that simple. It does not guarentee that "all of the passwords will be stolen" or "they'll be able to access everything on the website".

    Who is vulnerable to Heartbleed?
    Any program or website that uses version 1.0.1 and some versions of 1.0.2 of OpenSSL. No other versions are vulnerable. Windows is not vulnerable, and neither is anyone who is using older versions of OpenSSL. In total, netcraft estimates that only 17.5%, or less than 1 in 5 servers are actually vulnerable.

    What can Heartbleed actually do?

    Heartbleed can only access a random portion of 64kb of the server's memory. There is no way to aim Heartbleed at a section of memory, meaning the hackers are equally likely to get my recipe for mushroom soup as they are likely to get anything of value.

    Everytime a hacker attacks a website that is vulnerable, they only have a "chance" of obtaining something valuable. While passwords may be contained in the 64k of memory that heartbleed is able to read, most websites store passwords in a format that is not easily readable (known as a hash), and it is simply not feasible to obtain any password information from Heartbleed.

    The worst case scenario is that they could obtain the website's SSL certificates, meaning that they can pretend to be the website to another user. Basically, you think you're going to Amazon.com: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more but you're actually not going there.

    What can I do to protect myself from Heartbleed?

    Not much, unfortunately. The main responsibility is on the website to get themselves updated. You won't be able to tell if they do. Changing your password will NOT help if the website hasn't updated itself.

    You can head over to Qualys SSL Labs - Projects / SSL Server Test and enter the domain name, and it'll tell you whether the website is currently still vulnerable or not.

    End of story. No need to pull your hair out, or scramble to change passwords on all your websites. Just follow good, standard password practices and you'll be fine.

    Hope this helps to ease the fears/concerns of some people

    -blaq
     
  2. Lukenblaz
    Offline

    Lukenblaz Well-Known Member

    Joined:
    Sep 14, 2012
    Messages:
    970
    Yeah I just sat there in full YOLO mode...
    gurrrl u aint gonna touch my info
     
  3. TheNexusAvenger
    Offline

    TheNexusAvenger Well-Known Member

    Joined:
    Sep 13, 2013
    Messages:
    767
    Windows is not vulnerable?! :eek:
    WOO HOO! :woot:
     
    Last edited: Apr 12, 2014
  4. blaq
    Offline

    blaq Experienced Member

    Joined:
    Jun 17, 2013
    Messages:
    4,625
    That's the irony. On the week where Microsoft stopped support for Windows XP everyone was predicting the total collapse of windows, but it was just about everything but windows that was vulnerable
     
  5. TheNexusAvenger
    Offline

    TheNexusAvenger Well-Known Member

    Joined:
    Sep 13, 2013
    Messages:
    767
    Lol XD
    Wait, just Windows XP or all version (I use Windoge 8 (really Windows 8)), and what makes them 100% safe?
     
  6. Snowboardking454
    Offline

    Snowboardking454 Guest

    XDDDD Omg
    Tottaly what he said ^
     
  7. TheNexusAvenger
    Offline

    TheNexusAvenger Well-Known Member

    Joined:
    Sep 13, 2013
    Messages:
    767
    Made sure to let the people know on Roblox, I am the co-owner of a group on Roblox of +22K people. :p
     
  8. Snowboardking454
    Offline

    Snowboardking454 Guest

    GG :popcorn:
     
  9. TheNexusAvenger
    Offline

    TheNexusAvenger Well-Known Member

    Joined:
    Sep 13, 2013
    Messages:
    767
    What?
    Status Update.png
     
  10. Snowboardking454
    Offline

    Snowboardking454 Guest

  11. blaq
    Offline

    blaq Experienced Member

    Joined:
    Jun 17, 2013
    Messages:
    4,625
    All windows are safe. Infact, anything that doesn't use OpenSSL is safe. Even those that use OpenSSL aren't necessarily vulnerable if they aren't using a particular version. Thats why less than 1 in 5 servers are affected worldwide.
     
  12. Lollipop
    Offline

    Lollipop Well-Known Member

    Joined:
    Sep 23, 2013
    Messages:
    625
  13. vfuvegvfga
    Offline

    vfuvegvfga Well-Known Member

    Joined:
    Nov 23, 2013
    Messages:
    146
    I didn't really care, I just YOLO it up, and hope for the best. xD, but seriously, this was never going to be of any harm anyway.
     
  14. salamander9o
    Offline

    salamander9o Senior Member

    Joined:
    Oct 2, 2012
    Messages:
    3,319
    I ignore things like this, honestly. ;p

    Unless I read up on it and find out that it is VERY dangerous, I sit back and YOLO it.
     
  15. vfuvegvfga
    Offline

    vfuvegvfga Well-Known Member

    Joined:
    Nov 23, 2013
    Messages:
    146
    Lol, im the same
     

Share This Page