Feeds

Interweb has staunched nearly all Heartbleed wounds, says crypto bod

Just a few weeks after discovery ... well, that was quick

Next gen security for virtualised datacentres

Infosec The Heartbleed password-leaking vulnerability in OpenSSL has almost been eradicated from the web just weeks after its discovery, according to an encryption expert.

Ivan Ristic, director of engineering at cloud security firm Qualys, estimates that 25 per cent of websites worldwide were vulnerable to the data-disclosing bug on 8 April – a figure that has dropped to less than one per cent just three weeks later, he claims.

By comparison, eight per cent of websites are still vulnerable to an insecure renegotiation problem discovered in 2009, he says. "Insecure Renegotiation is bad but not in the same level as Heartbleed, but even so the rapid pace of patching against Heartbleed is unprecedented" and "shows that we can do it if we apply ourselves", according to Ristic.

Melih Abdulhayoğlu, the founder of security firm Comodo, told El Reg that the certification authority had issued tens of thousands of fresh SSL/TLS certificates after word of the Heartbleed bug spread on 8 April. "Everyone realised it was a problem and updated quickly," according to Abdulhayoğlu, who added that Comodo had decided not to charge for reissued certificates.

Heartbleed heartache

The Heartbleed OpenSSL cock-up exposed private cryptographic keys and their sensitive data flowing through the memory of HTTPS web servers, VPN software, mobile phones, and more. It forced big names on the internet to urge their users to change their passwords; mix that brouhaha in with revelations by sysadmin-turned-whistleblower Edward Snowden on super-snooping governments, and you can understand why punters are pushing for more security.

"People want secure e-commerce," Ristic explained. "This is good because browser vendors have been focused on features rather than security. For example, it took five years from 2008 to 2013 to apply TLS 1.2, even though support is not complex."

Ristic, who runs Qualys SSL Labs, gave the presentation SSL/TLS and PKI: Still Secure? at the Infosec 2014 conference in London this week.

In the face of the lamentable state of web security, it might be tempting to think that the best option is to redesign internet security from scratch, but Ristic rejected this idea.

If encryption experts were to design a new protocol they would come up something better than TLS, but they "can't stop the world to design a new protocol" and that's why it's much better to fix incrementally, according to Ristic.

"If the protocol is bad it would have failed a long time ago," he added.

"SSL is not secure in the way everybody is using it but if you do the right things it is secure," Ristic explained.

He said the vast majority (99.9 per cent) of websites don't securely safeguard their network traffic, but this can be improved if site admins take five steps – the first three being: use encryption, apply a secure configuration, and switch on perfect forward secrecy (PFS).

"PFS involves a simple reconfiguration and leaves sites in much better shape in dealing with problems like Heartbleed," Ristic explained.

The final two steps involve applying HTTP Strict Transport Security, so that any problems trigger an unavoidable full stop to the connection – a hard fail – rather than certificate warnings (which netizens disregard, leaving them exposed to risks), and applying a content security policy.

Ristic rejected the potential comparison between his proposals and the payment card industry's compliance standard for secure transactions – the latter criticised by sections of the infosec biz as promoting adherence to a set of rules rather than genuinely improving security. "SSL is simpler and you can prescribe exactly what needs to be done," he added. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.