SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
Heartbleed 
Nick Sullivan (@grittygrease) 
Friday, August 8, 2014
Overview 
• What is Heartbleed? 
• The Heartbleed Challenge 
• How certificate revocation is broken 
and endangered our network 
2
Application Layer - CloudFlare 
• DNS (TCP & UDP port 53) 
• HTTP (TCP port 80) 
• HTTPS (TCP port 443) - powered by OpenSSL 
3
Heartbleed 
• A bug so bad it has its own website 
and branding 
4
What is it? 
• A bug in OpenSSL 1.0.1 
! 
• Changelog 
• Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]: 
• TLS/DTLS heartbeat support. 
5
What is a heartbeat? 
• Heartbeat: a keepalive extension to TLS 
! 
• Client sends (length, challenge) 
• Server sends (length, challenge) 
6
What was the bug? 
• Classic buffer over-read 
• Attacker sends length value 
that is too long 
• Server returns attacker supplied 
amount of memory (up to 64kB) 
7
8
Why was it so dangerous? 
• One request gets attacker server data 
• Typically not logged — doesn’t leave a trace 
• Valuable information 
• Random decrypted data 
• Login session cookies 
• SSL/TLS private keys (???) 
9
Who was vulnerable? 
10
Who was vulnerable? 
• Any server running OpenSSL 
• Apache and nginx use OpenSSL by default: 65% of all active sites 
! 
! 
• 0.8% of the top 200,000 still vulnerable (May 2, 2014) 
11
Who was impacted? 
• Almost everybody 
12
Who discovered it? 
• Neel Mehta at Google 
• Codenomicon 
! 
• Sometime in March 2014 or earlier 
13
Disclosure — keeping it secret 
• CloudFlare, Google, Akamai, Facebook, others were notified early 
• Why: large web-facing networks with the largest impact(?) 
! 
• Encrypted communication 
• Source code visibility restricted to need-to-know 
• Secure software upgrade 
14
Big Questions 
• Were private keys at risk? 
• Do I have to revoke all my certificates? 
15
The CloudFlare Heartbleed challenge 
• Can someone really steal private keys from nginx? 
• Code said probably not 
• Temporary variables cleaned up 
• Private key allocated earlier 
! 
• We set up a challenge on https://www.cloudflarechallenge.com/heartbleed 
16
The CloudFlare Heartbleed challenge 
! 
! 
! 
• Results: solved in under 10 hours 
• Private keys are vulnerable 
• Server had 200Mbps of “mystery” outbound traffic 
17
18
RSA 
• Two prime numbers P & Q 
• Public key, including P x Q 
• Finding P or Q can get you the private key 
19
How it was solved 
• Take every 128byte block 
• Attempt to divide into public RSA key 
! 
• Coppersmith’s attack (only requires partial prime factor) 
20
How it was solved 
• Why was the private key on the heap? 
• There was a second bug in OpenSSL 
! 
• The prime factor was used in the computation in a temporary variable 
• Temporary variables were not cleaned during a resize 
21
Challenge aftermath 
• Undeniable key compromise potential 
• All certificates need to be revoked and re-keyed 
! 
• CloudFlare revoked over 100,000 certificates 
22
How revocation works 
• Certificate Revocation Lists (CRLs) 
• Online Certificate Status Protocol (OCSP) 
• CRLSets (Google Chrome proprietary) 
23
Revoking 100,000 SSL certificates in 24 hours 
24
Revoking 100,000 SSL certificates in 24 hours 
25
Revoking 100,000 SSL certificates in 24 hours 
• CRL for GlobalSign grew from 22KB to 4.7MB 
• CloudFlare provides caching for these CRLs 
• We started seeing 30Gbps extra baseline traffic 
• Repeated waves of 100Gbps every three hours (24 hours below) 
26
Revoking 100,000 SSL certificates in 24 hours 
• The issue: CRL was being downloaded by web browsers 
• New CRL was being published on a 1-3 hour basis 
• Internet Explorer 7/8 downloads CRLs, 9/10 OCSP with CRL fallback 
• OS X: OCSP with CRL fallback 
• No delta updates, we downloaded the whole thing 
27
Revoking 100,000 SSL certificates in 24 hours 
• Intra-machine links were being congested 
• Had to modify cache strategy 
• Moved from one cache box per rack to caching on all boxes 
• Update cache headers to increase browser cache time 
• Asked CA to give CloudFlare their own intermediate certificate 
28
Revocation is broken 
• None of 100,000+ certificates were in Chrome’s CRLSets 
• CRL growth can’t scale 
• Too many cases when OCSP hard fail 
29
Revocation is broken 
• Most efficient revocation code ever: 
30
Revocation solutions? 
• Shorter certificate expiration periods 
• CRL lists not necessary after expiration 
• OCSP Must-staple 
• Server performs OCSP check and sends to client when connecting 
31
Conclusion 
• Bug in pervasive server software 
• Huge unexpected impact on Internet security 
• Crowdsourcing works 
• Revocation shown to be problematic 
32
Heartbleed 
Nick Sullivan (@grittygrease) 
Friday, August 8, 2014

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
 
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareSurviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
 
Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season Managing Traffic Spikes This Holiday Season
Managing Traffic Spikes This Holiday Season
 
SSL for SaaS Providers
SSL for SaaS ProvidersSSL for SaaS Providers
SSL for SaaS Providers
 
MRA AMA Part 7: The Circuit Breaker Pattern
MRA AMA Part 7: The Circuit Breaker PatternMRA AMA Part 7: The Circuit Breaker Pattern
MRA AMA Part 7: The Circuit Breaker Pattern
 
MRA AMA Part 8: Secure Inter-Service Communication
MRA AMA Part 8: Secure Inter-Service CommunicationMRA AMA Part 8: Secure Inter-Service Communication
MRA AMA Part 8: Secure Inter-Service Communication
 
Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify
Monitoring Highly Dynamic and Distributed Systems with NGINX AmplifyMonitoring Highly Dynamic and Distributed Systems with NGINX Amplify
Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify
 
NGINX Plus R19 : EMEA
NGINX Plus R19 : EMEANGINX Plus R19 : EMEA
NGINX Plus R19 : EMEA
 
NGINX Plus R18: What's new
NGINX Plus R18: What's newNGINX Plus R18: What's new
NGINX Plus R18: What's new
 
Dynamic SSL Certificates and Other New Features in NGINX Plus R18 and NGINX O...
Dynamic SSL Certificates and Other New Features in NGINX Plus R18 and NGINX O...Dynamic SSL Certificates and Other New Features in NGINX Plus R18 and NGINX O...
Dynamic SSL Certificates and Other New Features in NGINX Plus R18 and NGINX O...
 
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNSRunning a Robust DNS Infrastructure with CloudFlare Virtual DNS
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product Launches
 
The 3 Models in the NGINX Microservices Reference Architecture
The 3 Models in the NGINX Microservices Reference ArchitectureThe 3 Models in the NGINX Microservices Reference Architecture
The 3 Models in the NGINX Microservices Reference Architecture
 
Secure Your Apps with NGINX Plus and the ModSecurity WAF
Secure Your Apps with NGINX Plus and the ModSecurity WAFSecure Your Apps with NGINX Plus and the ModSecurity WAF
Secure Your Apps with NGINX Plus and the ModSecurity WAF
 
ModSecurity 3.0 and NGINX: Getting Started
ModSecurity 3.0 and NGINX: Getting StartedModSecurity 3.0 and NGINX: Getting Started
ModSecurity 3.0 and NGINX: Getting Started
 
ModSecurity 3.0 and NGINX: Getting Started - EMEA
ModSecurity 3.0 and NGINX: Getting Started - EMEAModSecurity 3.0 and NGINX: Getting Started - EMEA
ModSecurity 3.0 and NGINX: Getting Started - EMEA
 
APIs: Intelligent Routing, Security, & Management
APIs: Intelligent Routing, Security, & ManagementAPIs: Intelligent Routing, Security, & Management
APIs: Intelligent Routing, Security, & Management
 
What's new in NGINX Plus R19
What's new in NGINX Plus R19What's new in NGINX Plus R19
What's new in NGINX Plus R19
 
NGINX Basics: Ask Me Anything – EMEA
NGINX Basics: Ask Me Anything – EMEANGINX Basics: Ask Me Anything – EMEA
NGINX Basics: Ask Me Anything – EMEA
 
Analyzing NGINX Logs with Datadog
Analyzing NGINX Logs with DatadogAnalyzing NGINX Logs with Datadog
Analyzing NGINX Logs with Datadog
 

Destaque

Secure 2013 Poland
Secure 2013 PolandSecure 2013 Poland
Secure 2013 Poland
Cloudflare
 
WordPress London Meetup January 2012
WordPress London Meetup January 2012WordPress London Meetup January 2012
WordPress London Meetup January 2012
Cloudflare
 
Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming
Cloudflare
 
Lua London Meetup 2013
Lua London Meetup 2013Lua London Meetup 2013
Lua London Meetup 2013
Cloudflare
 
Winter 1 cooke
Winter 1 cookeWinter 1 cooke
Winter 1 cooke
Simpony
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Simpony
 
To The President Of SIMT
 To The President Of SIMT To The President Of SIMT
To The President Of SIMT
Vipin Kumar
 

Destaque (15)

Go Containers
Go ContainersGo Containers
Go Containers
 
Secure 2013 Poland
Secure 2013 PolandSecure 2013 Poland
Secure 2013 Poland
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - Webinar
 
SortaSQL
SortaSQLSortaSQL
SortaSQL
 
WordPress London Meetup January 2012
WordPress London Meetup January 2012WordPress London Meetup January 2012
WordPress London Meetup January 2012
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
 
A Channel Compendium
A Channel CompendiumA Channel Compendium
A Channel Compendium
 
Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
 
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini SummitF5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
 
Taking the Fear out of WAF
Taking the Fear out of WAFTaking the Fear out of WAF
Taking the Fear out of WAF
 
Lua London Meetup 2013
Lua London Meetup 2013Lua London Meetup 2013
Lua London Meetup 2013
 
Winter 1 cooke
Winter 1 cookeWinter 1 cooke
Winter 1 cooke
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
To The President Of SIMT
 To The President Of SIMT To The President Of SIMT
To The President Of SIMT
 

Semelhante a Sullivan heartbleed-defcon22 2014

Oracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture PerformanceOracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture Performance
Enkitec
 

Semelhante a Sullivan heartbleed-defcon22 2014 (20)

Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3
 
State of the Web
State of the WebState of the Web
State of the Web
 
FreeSWITCH as a Microservice
FreeSWITCH as a MicroserviceFreeSWITCH as a Microservice
FreeSWITCH as a Microservice
 
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
 
Outsourced database
Outsourced databaseOutsourced database
Outsourced database
 
Managing the SSL Process
Managing the SSL ProcessManaging the SSL Process
Managing the SSL Process
 
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based InfrastructuresMesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
MesosCon EU 2017 - Criteo - Operating Mesos-based Infrastructures
 
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
 
Kubernetes at NU.nl (Kubernetes meetup 2019-09-05)
Kubernetes at NU.nl   (Kubernetes meetup 2019-09-05)Kubernetes at NU.nl   (Kubernetes meetup 2019-09-05)
Kubernetes at NU.nl (Kubernetes meetup 2019-09-05)
 
The impact of cloud NSBCon NY by Yves Goeleven
The impact of cloud NSBCon NY by Yves GoelevenThe impact of cloud NSBCon NY by Yves Goeleven
The impact of cloud NSBCon NY by Yves Goeleven
 
Google QUIC
Google QUICGoogle QUIC
Google QUIC
 
Kafka Summit SF 2017 - Running Kafka for Maximum Pain
Kafka Summit SF 2017 - Running Kafka for Maximum PainKafka Summit SF 2017 - Running Kafka for Maximum Pain
Kafka Summit SF 2017 - Running Kafka for Maximum Pain
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post event
 
Altitude San Francisco 2018: HTTP/2 Tales: Discovery and Woe
Altitude San Francisco 2018: HTTP/2 Tales: Discovery and WoeAltitude San Francisco 2018: HTTP/2 Tales: Discovery and Woe
Altitude San Francisco 2018: HTTP/2 Tales: Discovery and Woe
 
SSL overview
SSL overviewSSL overview
SSL overview
 
DCSF19 Container Security: Theory & Practice at Netflix
DCSF19 Container Security: Theory & Practice at NetflixDCSF19 Container Security: Theory & Practice at Netflix
DCSF19 Container Security: Theory & Practice at Netflix
 
Secret Management with Hashicorp Vault and Consul on Kubernetes
Secret Management with Hashicorp Vault and Consul on KubernetesSecret Management with Hashicorp Vault and Consul on Kubernetes
Secret Management with Hashicorp Vault and Consul on Kubernetes
 
Bullet: A Real Time Data Query Engine
Bullet: A Real Time Data Query EngineBullet: A Real Time Data Query Engine
Bullet: A Real Time Data Query Engine
 
Oracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture PerformanceOracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture Performance
 

Mais de Cloudflare

Mais de Cloudflare (20)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 

Último

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Último (20)

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
 

Sullivan heartbleed-defcon22 2014

  • 1. Heartbleed Nick Sullivan (@grittygrease) Friday, August 8, 2014
  • 2. Overview • What is Heartbleed? • The Heartbleed Challenge • How certificate revocation is broken and endangered our network 2
  • 3. Application Layer - CloudFlare • DNS (TCP & UDP port 53) • HTTP (TCP port 80) • HTTPS (TCP port 443) - powered by OpenSSL 3
  • 4. Heartbleed • A bug so bad it has its own website and branding 4
  • 5. What is it? • A bug in OpenSSL 1.0.1 ! • Changelog • Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]: • TLS/DTLS heartbeat support. 5
  • 6. What is a heartbeat? • Heartbeat: a keepalive extension to TLS ! • Client sends (length, challenge) • Server sends (length, challenge) 6
  • 7. What was the bug? • Classic buffer over-read • Attacker sends length value that is too long • Server returns attacker supplied amount of memory (up to 64kB) 7
  • 8. 8
  • 9. Why was it so dangerous? • One request gets attacker server data • Typically not logged — doesn’t leave a trace • Valuable information • Random decrypted data • Login session cookies • SSL/TLS private keys (???) 9
  • 11. Who was vulnerable? • Any server running OpenSSL • Apache and nginx use OpenSSL by default: 65% of all active sites ! ! • 0.8% of the top 200,000 still vulnerable (May 2, 2014) 11
  • 12. Who was impacted? • Almost everybody 12
  • 13. Who discovered it? • Neel Mehta at Google • Codenomicon ! • Sometime in March 2014 or earlier 13
  • 14. Disclosure — keeping it secret • CloudFlare, Google, Akamai, Facebook, others were notified early • Why: large web-facing networks with the largest impact(?) ! • Encrypted communication • Source code visibility restricted to need-to-know • Secure software upgrade 14
  • 15. Big Questions • Were private keys at risk? • Do I have to revoke all my certificates? 15
  • 16. The CloudFlare Heartbleed challenge • Can someone really steal private keys from nginx? • Code said probably not • Temporary variables cleaned up • Private key allocated earlier ! • We set up a challenge on https://www.cloudflarechallenge.com/heartbleed 16
  • 17. The CloudFlare Heartbleed challenge ! ! ! • Results: solved in under 10 hours • Private keys are vulnerable • Server had 200Mbps of “mystery” outbound traffic 17
  • 18. 18
  • 19. RSA • Two prime numbers P & Q • Public key, including P x Q • Finding P or Q can get you the private key 19
  • 20. How it was solved • Take every 128byte block • Attempt to divide into public RSA key ! • Coppersmith’s attack (only requires partial prime factor) 20
  • 21. How it was solved • Why was the private key on the heap? • There was a second bug in OpenSSL ! • The prime factor was used in the computation in a temporary variable • Temporary variables were not cleaned during a resize 21
  • 22. Challenge aftermath • Undeniable key compromise potential • All certificates need to be revoked and re-keyed ! • CloudFlare revoked over 100,000 certificates 22
  • 23. How revocation works • Certificate Revocation Lists (CRLs) • Online Certificate Status Protocol (OCSP) • CRLSets (Google Chrome proprietary) 23
  • 24. Revoking 100,000 SSL certificates in 24 hours 24
  • 25. Revoking 100,000 SSL certificates in 24 hours 25
  • 26. Revoking 100,000 SSL certificates in 24 hours • CRL for GlobalSign grew from 22KB to 4.7MB • CloudFlare provides caching for these CRLs • We started seeing 30Gbps extra baseline traffic • Repeated waves of 100Gbps every three hours (24 hours below) 26
  • 27. Revoking 100,000 SSL certificates in 24 hours • The issue: CRL was being downloaded by web browsers • New CRL was being published on a 1-3 hour basis • Internet Explorer 7/8 downloads CRLs, 9/10 OCSP with CRL fallback • OS X: OCSP with CRL fallback • No delta updates, we downloaded the whole thing 27
  • 28. Revoking 100,000 SSL certificates in 24 hours • Intra-machine links were being congested • Had to modify cache strategy • Moved from one cache box per rack to caching on all boxes • Update cache headers to increase browser cache time • Asked CA to give CloudFlare their own intermediate certificate 28
  • 29. Revocation is broken • None of 100,000+ certificates were in Chrome’s CRLSets • CRL growth can’t scale • Too many cases when OCSP hard fail 29
  • 30. Revocation is broken • Most efficient revocation code ever: 30
  • 31. Revocation solutions? • Shorter certificate expiration periods • CRL lists not necessary after expiration • OCSP Must-staple • Server performs OCSP check and sends to client when connecting 31
  • 32. Conclusion • Bug in pervasive server software • Huge unexpected impact on Internet security • Crowdsourcing works • Revocation shown to be problematic 32
  • 33. Heartbleed Nick Sullivan (@grittygrease) Friday, August 8, 2014