Ted Unangst wrote a good article called "analysis of openssl freelist reuse"
This bug would have been utterly trivial to detect when introduced had the OpenSSL developers bothered testing with a normal malloc (not even a security focused malloc, just one that frees memory every now and again). Instead, it lay dormant for years until I went looking for a way to disable their Heartbleed accelerating custom allocator.
it's a very good read.
Try SpiderOak. Free 2 GB, zero-knowledge, secure. Works on a load of OSs and devices.
I'm a completely satisfied customer.
Theo de Raadt should fork OpenSSL. He could call it OpenOpenSSL.
The NSA’s decision to keep the bug secret in pursuit of national security interests threatens to renew the rancorous debate over the role of the government’s top computer experts."
Link to Original Source
... it's kind of like a Chinese Snopes, except you go to jail rather than being unfriended.
From the proof-of-concept page I mentioned above.
It is quite obvious in light of the recent revelations from Snowden that this weakness was introduced by purpose by the NSA. It is very elegant and leaks its complete internal state in only 32 bytes of output, which is very impressive knowing it takes 32 bytes of input as a seed.
Here is the Github repo for the PoC code.
This PRNG is not the NSA making a crypto system stronger ala DES, it's a backdoor.
There is also a nice proof-of-concept backdoor with a link to the github repo.
RSA has denied having knowledge of the backdoor, says NSA tricked them, and has never denied the $10M payout. Some of Snowden's leaks mention it.
Reuters has a summary
proof-of-concept backdoor with a link to the github repo.
None of that is a smoking gun, but there is enough smoke to tell me there is a fire.
Boy, if there's one thing that could ever kill Open Source it would be being held legally liable for a commit with a bug in it.
It burns me that RSA is not held liable for their $10M NSA backdoor in Dual_EC_DRBG PRNG. Customers should be flocking in droves but RSA gives enough swag at conferences that the suits don't care.
Your privacy sold off for $10M and some mouse pads.
Submitted by: Robin Seggelmann <firstname.lastname@example.org>
Reviewed by: steve
Support for TLS/DTLS heartbeats.
Have a look for yourself. The reviewer "steve" is Stephen Henson.
and all running on top of TCP
Not necessarily. OpenVPN is an SSL VPN which defaults to UDP/1194.
I don't buy the "good today, crap tomorrow" mentality. XP still has a massive installed base. This will open the door for entrepreneurial geeks to create their own security and stability patches.
Diid Symantec or Macafee say they were dropping XP support? Nope, it's a huge cash cow for them.