We're aware that some users are experiencing technical issues which the team are working to resolve. See the Community Noticeboard for more info. Thank you for your patience.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!

Change Your Passwords

Options
13»

Comments

  • 50Twuncle
    50Twuncle Posts: 10,763 Forumite
    Part of the Furniture 1,000 Posts Photogenic Name Dropper
    You can test here. https://www.ssllabs.com/ssltest/index.html

    What banks are safe? Why are none of them making any reference or announcement on their sites?



    Coventry are sending Emails to all customers - informing them that they are unaffected !!
  • securityguy
    securityguy Posts: 2,464 Forumite
    Part of the Furniture 1,000 Posts Combo Breaker
    bobblebob wrote: »
    No need to panic over this. All the banking websites ive seen dont have the exploit anyway.

    And remember this has been exploitable for 2 years now. Chances are if anyone was exploiting it on a mass scale we would know about it by now

    The bug only affects people who have built applications with OpenSSL 1.0.1 through to 1.0.1f. That's pretty much the definition of Linux fanbois dabbling with the bleeding edge (ie, not banks). Banks are unlikely to be using OpenSSL on customer-facing devices anyway, but even if they are, they aren't doing it on bleeding-edge Linux releases. As an example, although not one likely to be running banking systems, OSX 10.9.2, the most recent release, still ships with OpenSSL 0.9.8y (of course, Apple's own applications are built against their own SSL stack, which is not without its own issues). Solaris 11.1, which is arguably more likely to be used in banking, ships with 1.0.0j. Amongst the researchers I work with we were kicking around the issue of embedded devices (set-top boxes, that sort of thing), but (a) they don't run 1.0.1 and (b) often they don't even use OpenSSL, because PolarSSL is much more attractive for small devices. Some of Google applications were built with it (what was that about bleeding-edge Linux fanbois?) but from what I understand of their architecture even if there had been active exploits (which the general consensus is "there hadn't") the pickings would have been pretty meagre.

    The bug is present on Android Jelly Bean, but exploiting it would require that the attacker force you to visit their website; once they've done that it actually quite difficult to think of why they would need to exploit this particular bug. If you're the 0.00001% of the userbase who uses client-side certificates it's potentially nasty, but otherwise someone who can force your SSL session to connect to device they control can do most of the bad things anyway.

    As a software engineer, I'm worried by this bug: it's the third "people writing crypto code proving that open-source doesn't get a lot of free code review" problem, where you have to ask just what is being done to audit changes. It's not as nasty as 2008's Debian/OpenSSL bug, which was probably exploited, or the aformentioned "goto fail" problem that Apple had, both of which were discoverable by looking at the source, the latter particularly easily. The claim's made that open source benefits from Eric Raymond's "many eyes make all bugs shallow", but that presumes they're looking for a known bug: those many eyes seem to be a lot less effective at reviewing code that appears to be working.

    But as a security researcher, my gut feel is that exploits weren't in the wild. The people that found it are really hardcore, and have very, very sharp tools that they haven't released. It's possible that another, black-hat, group found it and quietly exploited, but if I had to place bets, I'd take pretty short money on "they didn't".
  • ukmike
    ukmike Posts: 752 Forumite
    Part of the Furniture 500 Posts
    What banks are safe? Why are none of them making any reference or announcement on their sites?
    When i logged into my Lloyds account today it had a message saying their site is safe & no need to change my password.
This discussion has been closed.
Meet your Ambassadors

🚀 Getting Started

Hi new member!

Our Getting Started Guide will help you get the most out of the Forum

Categories

  • All Categories
  • 350.8K Banking & Borrowing
  • 253K Reduce Debt & Boost Income
  • 453.5K Spending & Discounts
  • 243.8K Work, Benefits & Business
  • 598.6K Mortgages, Homes & Bills
  • 176.8K Life & Family
  • 257.1K Travel & Transport
  • 1.5M Hobbies & Leisure
  • 16.1K Discuss & Feedback
  • 37.6K Read-Only Boards

Is this how you want to be seen?

We see you are using a default avatar. It takes only a few seconds to pick a picture.