The sensational headline news this week was “Heartbleed” security flaw, which was covered by most mainstream and tech sites. It was an old bug that was accidentally introduced, and just discovered recently1. The report got IT professionals scrambling to fix their systems.
At first glance, the bug is benign enough, with chances of hacking the passwords or SSL keys rather slim. However, like any other hacking issues, if someone is determined (and clever) enough to exploit this bug, they may just get a bunch of useful data. Whether or not they can use the hacked data to steal client information, or use it for a phishing site, it’s unclear. Just the thought of the potential leak scares the daylights out of everyone! It’s also proof that the marketing behind this bug was very effective.
Regardless, the actions need to be taken are as follows:
- Check with Qualys SSL Analyzer to determine if your site is vulnerable.
- If vulnerable, upgrade OpenSSL to version 1.0.1g, or alternatively recompile OpenSSL without the “heartbeat” option (-DOPENSSL_NO_HEARTBEATS).
- Recompile or restart the web server to reload the latest OpenSSL libraries.
- Test the site(s) with the Qualys SSL Analyzer again. Also check if site is functional.
- With the new OpenSSL, generate a new SSL key, and re-key a new certificate. Install the new key/certificate in the web server(s).
- Urge the users to change their passwords – which they occasionally have to do, anyway. This step is tricky considering the PR scare that it’s going to generate when admitting the site is vulnerable. However, the notification is the responsible thing to do.
When the dust settles, we can look back and use this as an important reminder how fragile the Internet is. Customers are expected to be cautious of their data being transmitted over the Internet, no matter how secure a company claim they’re being kept.
- Introduced in 2011 and found out in February 2014 [↩]