Linked by Thom Holwerda on Tue 8th Apr 2014 22:06 UTC
Privacy, Security, Encryption

Heartbleed, a long-undiscovered bug in cryptographic software called OpenSSL that secures Web communications, may have left roughly two-thirds of the Web vulnerable to eavesdropping for the past two years. Heartbleed isn't your garden-variety vulnerability, so here's a quick guide to what it is, why it's so serious, and what you can do to keep your data safe.

Serious.

Permalink for comment 586865
To read all comments associated with this story, please click here.
cfgr
Member since:
2009-07-18

The impact of malloc guarding on the performance is minimal (according to the OpenBSD developers*), however, there's a lot of software that misbehaves and would crash, which is why it's disabled by default.

In any case, if it's important to you, then it already looks like you can generate a version of openssl with the malloc cache disabled.

The post on the mailing list mentions that it doesn't seem to be that easy. Also, here's a blog post of his, it seems to be worse than previously thought:

http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-re...

The reason I don't think it would have helped is because it would not have come up on any testing/debugging build.

Mayhaps, but an attack would have crashed the service at once, rather than quietly leaking keys for two years.


[*] http://download.cdn.yandex.net.cache-default05d.cdn.yandex.net/comp...

Edited 2014-04-10 18:50 UTC

Reply Parent Score: 3