Denise (
denise) wrote in
dw_maintenance2014-04-08 08:16 pm
![[staff profile]](https://www.dreamwidth.org/img/silk/identity/user_staff.png)
![[site community profile]](https://www.dreamwidth.org/img/comm_staff.png)
"Heartbleed" security vulnerability
For those who have seen reference today in the press to the "Heartbleed" security vulnerability in OpenSSL, we'd like to reassure you that although we (like a large portion of the internet) were running the affected software, we patched our servers last night and were no longer vulnerable from that point.
We have no reason to believe that anyone was exploiting this vulnerability against us or that any user data has been compromised. We'll be changing our security certificates for extra confidence.
On the other hand, the nature of this vulnerablity means that it's impossible for a website to know for absolute certain whether someone was exploiting it. If someone was exploiting the vulnerability, against us or against any other website, they potentially have access to any information you sent to the site, including your username/password for the site and any data you sent to the site under HTTPS. It's a good idea to change your passwords pretty much everywhere, but don't do it until you can verify that a site is no longer vulnerable.
If you have any questions, feel free to ask!
We have no reason to believe that anyone was exploiting this vulnerability against us or that any user data has been compromised. We'll be changing our security certificates for extra confidence.
On the other hand, the nature of this vulnerablity means that it's impossible for a website to know for absolute certain whether someone was exploiting it. If someone was exploiting the vulnerability, against us or against any other website, they potentially have access to any information you sent to the site, including your username/password for the site and any data you sent to the site under HTTPS. It's a good idea to change your passwords pretty much everywhere, but don't do it until you can verify that a site is no longer vulnerable.
If you have any questions, feel free to ask!
no subject
Edited: Dreamwidth has now rotated our SSL certificates. If they had been compromised (which is pretty unlikely, given the particulars of the bug), then they're no longer.
no subject
Thank you for taking care of all this! You are awesome.
no subject
no subject
The site belongs to the security researchers who found the bug and worked with the OpenSSL maintainers and the various Linux distros to get patched versions out quickly -- the site is just the description of the bug (which is easily verifiable by anybody who can read the code) to lay it all out for people clearly and cleanly. They're pretty firmly white hat.
no subject
no subject
no subject
no subject
no subject
no subject
Also, oh goodness, all the passwords. Meh. This will take a while.... O.o
no subject
no subject
no subject
no subject
Password management
Understood.
I'll change my password ... just in case.
Thanks for keeping us in the know.
MUSIC: John Prine and Iris Dement - In Spite of Ourselvesno subject
no subject
no subject
no subject
no subject
no subject
This vuln means that if I pick up your user/pass on oldknittingneedles.net, I don't care what I can do with it on OKN, but I sure care that I might be able to hop into your email or other critical data pieces with it.
Were I blackhatting, I'd have jumped on this, written an automatted memory scanner that hunted credentials for the top 100,000 sites, unleashed it with a botnet, sat back, and seen what sort of cross-logins into highly valuable sites I could start driving from known-good user/passes. =)
no subject
no subject
This whole thing is pretty much not what I wanted to wake up to this morning. Oh well.
Who's for a coffee?
no subject
no subject
no subject
no subject
Yes, payments, logins, and password changes are done over HTTPS, for instance. (Logging in on a non-HTTPS page, such as through the navigation strip, is done with in-browser encryption.)
We do keep meaning to add "always-HTTPS" mode, even if only as a paid feature (because of load), but there's a lot of yak-shaving that has to be done first. It's on the list, though.
no subject
no subject
no subject
Yeah, exactly, plus all the technical stuff (both code-wise and infrastructure-wise). Every now and then I sit down and do the "what we'd need to get done first in order to do this" list and kind of whimper a little.
no subject
no subject
Thanks for being awesome.
no subject
Thanks for paying attention to this.
no subject
no subject
no subject
no subject
no subject
no subject
no subject
no subject
It's not a huge risk, though. Change your banking website password, keep an eye on your credit card and banking statements for a few weeks, but it's not "cancel all your credit cards" level of risk and I wouldn't worry too much if I were you. (I'm in the same boat as you of having used my credit card online somewhere post-disclosure-and-pre-patch and I'm not worried, and where I used it was a much higher-value target than DW was.)
no subject
I've already changed my password over at my banking website - it seemed to be clear according to the previously linked tools - so I'll just keep an eye on things and not let myself worry about it too much.
Thank you for taking the time to explain it for me. :)
no subject
no subject
Also, I am highly interested in always-https mode once your yaks are properly shaved.
I needed a new password algorithm anyway. *cough*