Turns out the NSA has not only known about Heartbleed (a very serious SSL security issue), but has been exploiting it for at least two years.
Announcement
Collapse
No announcement yet.
Heartbleed a new problem?...Not exactly.
Collapse
X
-
Heartbleed a new problem?...Not exactly.
"Judge not, lest ye get shot in your bed while your sleep." - Liz, The Dreadful
"If you villainize people who contest your points, you will eventually find yourself surrounded by enemies that you made." - Philip DeFrancoTags: None
-
Originally posted by EricKei View PostTurns out the NSA has not only known about Heartbleed (a very serious SSL security issue), but has been exploiting it for at least two years.Violence has resolved more conflicts than anything else. The contrary opinion that violence doesn't solve anything is merely wishful thinking at its worst. - Starship Troopers
-
The bug was missed in QA and code review. It's been present in the code for two years. This does not mean it was actively exploited for two years, but the potential was there.
It's possible, but unlikely, that it was found by some very astute hacker who actually managed to keep it to themselves. It's also possible, but unlikely, that a contributor to OpenSSL maliciously inserted the bug. The OpenSSL team is rather small actually.
I think if it really was discovered long ago, it was discovered by someone working for an intelligence agency. Someone with something to lose. For a bug this epic, the rewards of capitalizing on it in various ways would be astronomical, irresistible. Word would spread and the bug would be found. An intelligence agency on the other hand--and their employees--would keep it quiet. The risk of letting out would far outweigh the reward in their case.
That's why I find it plausible that if anyone has been exploiting this bug before this week, it would have been the NSA. We already know, thanks to Snowden, that they could tap SSL comms. Perhaps this was just one of their methods.
Comment
-
Greenday: Fair enough. I just don't think that their doing something like that -- if it is true -- is all that unlikely."Judge not, lest ye get shot in your bed while your sleep." - Liz, The Dreadful
"If you villainize people who contest your points, you will eventually find yourself surrounded by enemies that you made." - Philip DeFranco
Comment
-
Developer: "I'm responsible for Heartbleed." http://www.theguardian.com/technolog...rets-oversight
Developers I know have said a coding error like this one is "exceptionally easy to make" and missing it in code review is just as easy.
So, no malicious intent. Hanlon's Razor strikes again.
Comment
-
Originally posted by s_stabeler View PostI don't know for sure, but I DO know that the vulnerability was " in the wild" for 2 years. WHOEVER. Was responsible for that delay in fixing it needs firing.
According to the article at Ars, for the NSA to have known for 2 years, they'd have had to have been actively watching OpenSSL and discovered the flaw fairly quickly, as it was only introduced in January of 2012.
Considering the type of vulnerability it was, the idea that the NSA would know and leave it open without having some of the notable users of OpenSSL either change to a different SSL system or add other safeguards to make it useless to Heartbleed them, I find the idea that they knew and kept mum to be highly unlikely. There's just too much chance of someone they don't like using it for them to leave it vulnerable.Faith is about what you do. It's about aspiring to be better and nobler and kinder than you are. It's about making sacrifices for the good of others. - Dresden
Comment
-
Originally posted by EricKei View PostGreenday: Fair enough. I just don't think that their doing something like that -- if it is true -- is all that unlikely.Violence has resolved more conflicts than anything else. The contrary opinion that violence doesn't solve anything is merely wishful thinking at its worst. - Starship Troopers
Comment
-
Originally posted by Andara Bledin View PostYou do know that the "Open" part of OpenSSL means that it's all open source, and there is nobody to be fired, right? That bit of code wasn't even written by a foundation member, though it was approved.
According to the article at Ars, for the NSA to have known for 2 years, they'd have had to have been actively watching OpenSSL and discovered the flaw fairly quickly, as it was only introduced in January of 2012.
Considering the type of vulnerability it was, the idea that the NSA would know and leave it open without having some of the notable users of OpenSSL either change to a different SSL system or add other safeguards to make it useless to Heartbleed them, I find the idea that they knew and kept mum to be highly unlikely. There's just too much chance of someone they don't like using it for them to leave it vulnerable.
b) I was under the impression that somebody had known about the vulnerability for 2 years, and had deliberately not got it fixed. If the vulnerability is newly discovered, that's different.
Comment
-
While I'm no big fan of the NSA, this just seems like wild speculation to me. Yes, there is a thing that maybe they could have used (and I think would be wrong for them to do) if they knew about it, but I don't see any reason to think they DID know about it beyond that they could possibly have."Nam castum esse decet pium poetam
ipsum, versiculos nihil necessest"
Comment
-
Originally posted by s_stabeler View Posta) I was talking about the delay in fixing it, not the vulnerability's introduction.
b) I was under the impression that somebody had known about the vulnerability for 2 years, and had deliberately not got it fixed. If the vulnerability is newly discovered, that's different.
That is actually a pretty improbable scenario. Not only are most people incapable of keeping a secret of that magnitude under wraps, but it would have been more valuable to a hacker to sell it as part of a script and make a boatload of money in the short term as opposed to trying to make more money and risk the vulnerability getting spotted and patched out before any significant profit had been made. Last I read, no exploit code has been found in the wild, so it's likely that nobody else was looking at that particular section of code until now, either.Faith is about what you do. It's about aspiring to be better and nobler and kinder than you are. It's about making sacrifices for the good of others. - Dresden
Comment
-
Consider this:
For the NSA to say nothing that means potential for critical passwords to be compromised in:
-The Power Grid
-Major ISP's
-Major Banks
-DoD Contractors
-Major transportation systems (Subways, Airlines, etc.)
-Major US Based corporations competing with Major Chinese/Russian/European based corporations
etc. If you think about what the NSA's actual mandate is (which is ostensibly intelligence and counter-intelligence) that still comes under the heading of Defense, the risk/reward is way way too high. They do not want to find themselves fighting Chinese hackers with two years worth of ripped off passwords.
Comment
Comment