Hello, This announcement is somewhat technical, but very important, so please take a moment to read it. In the last few days, there has been a whole lot of talk about a vulnerability in OpenSSL known as Heartbleed. This vulnerability affected an enourmous chunk of the internet, including Mycena Cave. This really is a “the sky is falling” event happening to the Internet right now. tl;dr: in a few days, change all of your passwords you have ever used on the internet. You should use a unique password for every website. For a slightly longer tl;dr, skip to the last section of this post, “What can you do about it?”.
Background: SSL and OpenSSL You have surely noticed that some websites have “http” in the url bar, where others have “https”. The difference is that https connections are encrypted. The basic problem with http is that it’s a cleartext protocol. This means that anything you submit or receive over an http connection can be intercepted by malicious people on the internet, and even modified in transit. Attacks such as these are fairly simple for even computer novices to carry out. This is why SSL exists: in a nutshell, it encrypts your connection, making it safe from eavesdropping and alterations. Any website that handles secure information (banks, shopping, amazon, email, really any site that accepts a password) should be using SSL and have their URLs start with https. What is Heartbleed? There are a few implementations of SSL out there, and OpenSSL is by far the most popular. Heartbleed is a bug in OpenSSL that allows an attacker to retrieve data from memory in any website running up-to-date versions of OpenSSL. Encryption keys are stored in memory which means that, in a nutshell, a determined attacker would be able to steal the encryption keys and certificates from vulnerable systems. With these keys, they would essentially be able to treat a “https” connection as a “http” connection, eavesdropping on any data and modifying things in transit. This includes anything from your online banking password to your instant messages. To reiterate, Mycena Cave along with the majority of the Internet was vulnerable to Heartbleed. Needless to say, this is Very Bad. How long has this been going on? The vulnerability was introduced in December 2011, which means that a good chunk of all SSL has been crackable for almost two and a half years. Performing the attack leaves no traces on the target system, which means that nobody knows if anybody has been exploiting it. This is pretty much a case of “oops apparently the gate was unlocked for two and a half years but nobody noticed”. Was Mycena Cave compromised? If so, what was stolen? One of the scary things about Heartbleed is there’s no way to tell if a server has been attacked. However, likely targets would have been banks, large shopping sites, etc, not small petsites such as this one. As for your data, when you purchase gems or customs, your credit card information is never sent to Mycena Cave — this means that Mycena Cave’s vulnerability to Heartbleed could not have resulted in the theft of your credit card information. While we handle your passwords in pretty much the safest way possible, an attacker with our SSL keys eavesdropping on your connection while you are logging in would acquire your passwords before they even reach our servers. How do we fix this?
The first thing websites need to do is patch their implementation of OpenSSL. This protects us from being attacked through the Heartbleed bug. Whether or not a website is currently vulnerable to the Heartbleed bug can be verified here: here. Unfortunately, it doesn’t stop there: if a website has been exploited sometime in the last two years, attackers would have its encryption keys. This means that any website using the same certificates as it was before it patched OpenSSL is still open to attackers who have already stolen their keys. Basically you can think of Heartbleed as leaving your housekey lying around — even if you start keeping careful track of it, if someone already made a copy you aren’t safe until you change your locks. As such, websites must generate new SSL keys and certificates and revoke the old ones. As a precaution, after updating our certificates we cleared all sessions — which means if you were in the middle of a game of cave in or something, it’s going to lose your score :[ sorry about that. What can you do about it?
The short answer is to change every password you have ever used on the Internet. But don’t rush to do it immediately. Changing your password on an affected site before it has patched the vulnerability and gotten new SSL certificates accomplishes little beyond potentially supplying your new password to attackers. Since sites will tend not to tell you when or if they generate new certificates, you should use a unique password for every website. Any compromised website that has not generated new certificates potentially leaks your password every time you log in. Thanks for reading. Stay safe on Internet.
Posted 04/09/14, edited 04/09/14
|
|
Oh, jeez. Thank you so much for explaining and fixing all of this! I had very briefly heard about the exploit but hadn’t looked into it at all; I had no idea it was this serious. Now, I just have to hope that other people do what they need to do before I potentially lose anything important. -goes to change her password- >.<
Posted 04/09/14, edited 04/09/14
|
|
I had never heard of this before, thanks a bunch for the concise explanation! Luckily, I don’t have much information up online that would matter if anyone got a hold of. I’ll be making sure to alter passwords once sites have been confirmed as safe, however.
Posted 04/09/14
|
|
“Performing the attack leaves no traces on the target system, which means that nobody knows if anybody has been exploiting it.” This is the first time I’ve ever heard of this “Heartbleed” issue. While I have the mentality of “I’m one person out of billions, what’s the chances of [password theft] ever happening to me”... anything like this could happen to anyone. Now I’m going to be paranoid about logging into my bank account online. I just made a purchase on my credit card online a few hours ago! My questions are I think I’ll have to do a little reading on this topic then… :/
Posted 04/09/14, edited 04/09/14
|
|
@Tsar Nicky: This has existed since 2011, but the vulnerability was only discovered in the past week and publicized on Monday. Most of the really big sites (Amazon, Google, and Microsoft) were not affected…I believe the largest site affected was Yahoo, and they’ve patched everything by now. If you’re worried about your bank, email your customer service and ask! In terms of password change, I’d give it a week or so; people are scrambling to patch this but it’s most likely to be the smaller sites that take the longest, and most of those guys won’t have big info like credit card stuff anyhoo.
Posted 04/09/14
|
|
You know I hadn’t turned on the news today yet when that announcement popped up (See that! I come here first!) and I was all like “... Heartbleed Vulnerability? OMG what’s that that sounds so COOL!!” thinking it was a new game or an upcoming event or something xD Btw you’re missing an N there glitch in Vulerability in the title :p Tsar Nicky the news today had a very good suggestion. They said not to run and change all your passwords unless/until the sites specifically state that they have patched the issue, just because they may still be working on a fix and you might have to change your password again once it is. If the site doesn’t say anything contact the admin/tech support for the site just like Chimerical says.
Posted 04/09/14, edited 04/09/14
|
|
My mother recently had her debit card information stolen (thankfully the bank caught it and didn’t let any of the charges through) and I’m half wondering if it’s because of this. She’s normally really careful with stuff like that otherwise. I admit it made me dash over to my online account to make sure everything was okay, haha, it was ;w;
Posted 04/09/14
|
|
Chimerical Hina
Posted 04/09/14
|
|
Thanks for the announcement. I’ve been trying to deal with banking information and such regarding it. Unfortunately they’ve been terribly unhelpful and I’ve actually been told that I’m just letting the media scare me. *rage desk flip* If possible, contact tech support rather than customer service. *grump*
Posted 04/09/14
|
|
Akira, Jingles: you’re welcome to use this, and no need to cite us — you’ll find basically the same info on most sites talking about it. As usual, Bruce Schneier has an excellent short and sweet writeup. Another good article is this one. Tsar Nicky: While the vulnerability has existed since December 2011, it was only discovered by the “good guys” on Monday, which is when the patch was released. Hopefully the big players will all have sorted things out by now. Smaller sites may take longer, if they do it at all. As for when to change your passwords, as Chimerical said the correct time to do it is after the site has dealt with the issue. For banks and the like, such it was probably Monday night. For us that was today. For other small sites… maybe later, if ever? A good idea if you’re worried is to change it now, and then change it again later, and just always keep an eye on your account. This goes doubly so for your credit card statements, unless you can categorically say “I have not entered any bank / credit card information into the internet since December 2011”. Chimerical: It’s not the size of the organization that defines whether it was affected, it’s the software they were running. Microsoft was not affected because they, for the most part, run windows and OpenSSL does not run on Windows (the vast majority of the Internet does not run Windows). I actually got the chance to speak with the person that NYT/cnet were interviewing today (it was awesome >u>), and one of the things we chatted about was Heartbleed — his team did the check, and something like 70% of the Alexa top 1,000,000 websites were vulnerable. Long story short, being at the top does not save you. Kiwi: keep keeping an eye on it. Tsar Nicky: a lot of websites end up leaking passwords at some point or another. However, this is almost always due to bad handling of passwords. LinkedIn, for example, stored the passwords in cleartext O_O. Adobe “encrypted” them (whatever that means — turns out they were not difficult to crack). Pretty much everyone who’s been around a while does something stupid with passwords, especially if they existed before good standards were created. Insigne: consider changing banks >_>. In all seriousness, that kind of cavalier attitude towards your data is disturbing. Here’s a good litmus test: try logging in to your bank with the capitalization in your password screwed up. I was rather surprised to find that a number of banks use a case insensitive login. wtf. Anyway anyone that does that should probably not be touching your money. ———————————— For anyone interested, the technical details of this attack are pretty beautiful >_> Basically, there’s an extension to TLS (the protocol that implements SSL aka HTTPS) which lets you keep connections open for a while, by sending “heartbeat” messages that basically let both sides know the other is still there. The format of these messages is: A valid response is This heartbeat protocol happens “out of band”, which is a fancy way of saying “it’s part of the protocol that isn’t really part of the protocol… it’s fairly insignificant and happens behind the scenes so we just sort of pretend it doesn’t exist. We don’t log it because seriously, what could possibly go wrong?”. So, when OpenSSL receives a heartbeat packet, it needs to copy the payload into its response. The way it does this is: Seems reasonable, right? What’s missing was a check that makes sure that the payload you sent isn’t actually shorter than the length you claim it is. So, if you send a heartbeat packet where you say the length is 64 kb, but with a payload that is actually 0 bytes long, OpenSSL happily copies 64 kilobytes of whatever happens to be in the memory below the payload and sends it back to you. Basically, each malicious heartbeat packet you send, you get up to 64 kb of something else that the server is currently storing in memory. You can do this as many times as you like, and since this is an out-of-band part of the protocol, none of this is logged, and none of this leaves any kind of trace at all. Heartbeat messages bleeding information -> “Heartbleed”. It just goes to show, something as trivial as skipping a simple bounds check in some insignificant part of a protocol can bring the Internet to its knees. Ouch.
Posted 04/09/14, edited 04/09/14
|
|
@Glitch: Oh yeah, yeah. I just cited those sites because those are the ones that people worry most about. I know I relaxed a lot when I found out that google and amazon were fine. I know New York State spent a ton of money on Microsoft servers, and they’re probably very happy right now that they don’t have to deal with this. Apache servers being vulnerable is hella worrying. Out of curiosity, for sites that run on shared servers, is the host or the site admin responsible for keeping up to date the encryption?
Posted 04/09/14, edited 04/09/14
|
|
“With these keys, [The Heartbleed Vulnerability] would essentially be able to treat a “https” connection as a “http” connection, eavesdropping on any data and modifying things in transit. This includes anything from your online banking password to your instant messages” The reason this is so dangerous is because this vulnerability “changes” the https security to the http so they are able to get usually safe information easily. This means you need to change your passwords on all sites regardless, unless the site specifically says they already took care of this issue way back.
Posted 04/09/14
|
|
Raye: This is a bug in OpenSSL (https), so it is the sites that had https in the url already that you need to change the passwords for.
Posted 04/09/14
|
|