Denise (
denise) wrote in
dw_maintenance2014-04-08 08:16 pm
![[staff profile]](https://www.dreamwidth.org/img/silk/identity/user_staff.png)
![[site community profile]](https://www.dreamwidth.org/img/comm_staff.png)
"Heartbleed" security vulnerability
For those who have seen reference today in the press to the "Heartbleed" security vulnerability in OpenSSL, we'd like to reassure you that although we (like a large portion of the internet) were running the affected software, we patched our servers last night and were no longer vulnerable from that point.
We have no reason to believe that anyone was exploiting this vulnerability against us or that any user data has been compromised. We'll be changing our security certificates for extra confidence.
On the other hand, the nature of this vulnerablity means that it's impossible for a website to know for absolute certain whether someone was exploiting it. If someone was exploiting the vulnerability, against us or against any other website, they potentially have access to any information you sent to the site, including your username/password for the site and any data you sent to the site under HTTPS. It's a good idea to change your passwords pretty much everywhere, but don't do it until you can verify that a site is no longer vulnerable.
If you have any questions, feel free to ask!
We have no reason to believe that anyone was exploiting this vulnerability against us or that any user data has been compromised. We'll be changing our security certificates for extra confidence.
On the other hand, the nature of this vulnerablity means that it's impossible for a website to know for absolute certain whether someone was exploiting it. If someone was exploiting the vulnerability, against us or against any other website, they potentially have access to any information you sent to the site, including your username/password for the site and any data you sent to the site under HTTPS. It's a good idea to change your passwords pretty much everywhere, but don't do it until you can verify that a site is no longer vulnerable.
If you have any questions, feel free to ask!
no subject
This vuln means that if I pick up your user/pass on oldknittingneedles.net, I don't care what I can do with it on OKN, but I sure care that I might be able to hop into your email or other critical data pieces with it.
Were I blackhatting, I'd have jumped on this, written an automatted memory scanner that hunted credentials for the top 100,000 sites, unleashed it with a botnet, sat back, and seen what sort of cross-logins into highly valuable sites I could start driving from known-good user/passes. =)
no subject
no subject
This whole thing is pretty much not what I wanted to wake up to this morning. Oh well.
Who's for a coffee?