Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday April 11 2014, @10:57PM   Printer-friendly
from the have-they-been-watching-me? dept.

The EFF has called on admins to check any historical packet capture logs for evidence of Heartbleed attacks in 2013 and earlier. They examined reports from Ars Technica of people coming forward with logs potentially showing in-the-wild Heartbleed attacks long before the recent public disclosure. Perhaps most intersting-

[the] logs had been stored on magnetic tape in a vault. The source IP addresses for the attack were 193.104.110.12 and 193.104.110.20. Interestingly, those two IP addresses appear to be part of a larger botnet that has been systematically attempting to record most or all of the conversations on Freenode and a number of other IRC networks. This is an activity that makes a little more sense for intelligence agencies than for commercial or lifestyle malware developers.

Coincidentally, a few hours prior to this news, I was lamenting here in comments how disinformative the mainstream reporting was when it made claims that "what makes it even worse is the heartbleed attack leaves no trace". Of course it leaves a trace- perhaps not in stock os/webserver log files, but remote attackers always have to carry the attack out via networks, which can notice and/or log the traffic if they take the trouble to. Not to put too fine a point on it, but the same thing is also relevant to the recent slashcode issue with portscans. It may be exhausting work inspecting packet capture logs, but if you make a habit of not doing it, you should be prepared to find some gremlins when you finally get around to it.

Related Stories

F%1&£@! Unbelievable: Slashcode Portscanning Disabled 91 comments
I've pushed an emergency fix to production to close bug #142 on the tracker. For those unaware, Slashcode portscans every user when they login or post a comment. While we knew that there was some code involved in checking for open proxies, I thought it had been disabled, and the default settings in the database all default to off. The fact of the matter though is the backend was ignoring all disable checks in the database and scanning every IP to see if they were a proxy on ports 80, 3123, 8000, and 8080.

I'm f****** seething; this is unacceptable for any site, and this behaviour isn't documented anywhere; we've been portscanning since day one and were completely unaware of it. My guess is almost everyone here was unaware of this "feature" as well. Our submitter reports slashdot did this as well. There is no notification or link in the FAQ that this is done, unless you were checking your firewall rules religiously, this would have been completely unnoticed.

I'm seething and furious at the moment. How on earth is this acceptable behaviour? I understand proxy scanning; most IRC networks do it, but they notify you that they are doing so. Furthermore, a basic web application should not be probing their end users; I'm absolutely flabbergasted that this exists, as were most of the staff when it was brought to our attention. On behalf of the site, I want to offer a formal apology for this clusterf***.

Addendum: Since writing this, I've written a follow up on why this got me so upset in my journal. I've got journal replies set to on, and will respond to anyone both here and there.
Heartbleed: Ain't Dead Yet 12 comments

Ars Technica reports that four weeks after its disclosure huge swaths of the Internet remain vulnerable to Heartbleed. The article suggests that over 300,000 servers remain vulnerable.

What steps have you taken to protect yourself from this bug? What browser addons have you installed? Have you checked/updated the firmware on your home router? If you work in IT, what has the reaction been? Has your site been compromised? Has vulnerable code been updated, new keys genned, new certificates obtained, and old ones revoked?

Since the OpenSSL library is now undergoing a security review and a fork of it is underway as LibreSSL, it is possible that other vulnerabilities will be discovered. Then what? How likely is it that we will need to repeat this cleanup effort?

(more after the break)

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by c0lo on Friday April 11 2014, @11:03PM

    by c0lo (156) Subscriber Badge on Friday April 11 2014, @11:03PM (#30333) Journal
    I had (still have) this wasn't a bug, but an alphabet-agency-feature carefully planted and nurtured.
    Should look into the commit logs for traces.
    --
    https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
    • (Score: 2) by mrbluze on Friday April 11 2014, @11:25PM

      by mrbluze (49) on Friday April 11 2014, @11:25PM (#30340) Journal

      Judging by the self satisfied smiles on the faces of NSA employees, I'd agree with you there.

      --
      Do it yourself, 'cause no one else will do it yourself.
    • (Score: 3, Informative) by fliptop on Friday April 11 2014, @11:37PM

      by fliptop (1666) on Friday April 11 2014, @11:37PM (#30346) Journal

      an alphabet-agency-feature carefully planted and nurtured

      Bloomberg reported today [bloomberg.com] that the NSA knew about the flaw for at least 2 years and used it to gather intelligence.

      --
      Our Constitution was made only for a moral and religious people. It is wholly inadequate to the government of any other.
    • (Score: 3, Insightful) by c0lo on Saturday April 12 2014, @02:12AM

      by c0lo (156) Subscriber Badge on Saturday April 12 2014, @02:12AM (#30398) Journal

      Should look into the commit logs for traces.

      Seems it has been a honest error [smh.com.au] after all.

      --
      https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
    • (Score: 3, Interesting) by tynin on Saturday April 12 2014, @02:35AM

      by tynin (2013) on Saturday April 12 2014, @02:35AM (#30406) Journal

      All this time, for decades even, we've all sat around and poked fun at how you cannot really just sit down at a computer and hack through layers of defense, al la the movie Hackers. That modern firewalls/security measures prevent such intrusion. Yet here we are in a world where someone could literally write up a fancy Hollywood UI for this exploit and go hack the Gibson. Hell, they could hack the planet.

      MIND == BLOWN

  • (Score: 3, Interesting) by c0lo on Friday April 11 2014, @11:11PM

    by c0lo (156) Subscriber Badge on Friday April 11 2014, @11:11PM (#30336) Journal
    Using the geoip demo page [maxmind.com].
    --
    https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
    • (Score: 2) by fliptop on Friday April 11 2014, @11:34PM

      by fliptop (1666) on Friday April 11 2014, @11:34PM (#30345) Journal

      I experienced a port 110 dovecot dictionary attack from a bunch of IPs in that class C in March but didn't see anything older than that. Lately there has been a lot of scanning and dictionary attacks coming from that area of Europe.

      --
      Our Constitution was made only for a moral and religious people. It is wholly inadequate to the government of any other.
      • (Score: 0) by Anonymous Coward on Saturday April 12 2014, @03:44AM

        by Anonymous Coward on Saturday April 12 2014, @03:44AM (#30426)

        that's not a class C. please go read about classful networking, how there's no such thing as "that class C," and stop calling it that.

    • (Score: 2) by frojack on Saturday April 12 2014, @05:07AM

      by frojack (1554) on Saturday April 12 2014, @05:07AM (#30446) Journal

      Where an IP is supposedly assigned has no bearing on from where it is used.

      Using a foreign IP is something every wannabe hacker does.

      --
      No, you are mistaken. I've always had this sig.
    • (Score: 0) by Anonymous Coward on Saturday April 12 2014, @06:21AM

      by Anonymous Coward on Saturday April 12 2014, @06:21AM (#30461)

      $ whois 193.104.110.12|grep -i country
      country: CZ

  • (Score: 5, Interesting) by zim on Friday April 11 2014, @11:34PM

    by zim (1251) on Friday April 11 2014, @11:34PM (#30344)
    Take everything we know about how far the NSA has been spying on the world.

    Now multiply it by a factor of ten.
    You're still not even close to guessing their total scope.

    On the one hand, I say string them all up.

    On the other hand...
    Have you SEEN some of the people in the world?
    I damm well hope someone is watching them.

    Because. crazy! so much crazy!

    On the 3rd hand... They seem to be incompetent at it.
    SO not only are they violating everyones rights. They're not even doing the job effectively that they're not even supposed to be doing!

    Everyone loses. Yay! :(
  • (Score: 1) by lajos on Saturday April 12 2014, @12:57AM

    by lajos (528) on Saturday April 12 2014, @12:57AM (#30378)

    Just go straight to the people that know. Ask the NSA.

    • (Score: 3) by Dunbal on Saturday April 12 2014, @01:46AM

      by Dunbal (3515) on Saturday April 12 2014, @01:46AM (#30389)

      After being stonewalled someone will say "national security" and that will be that.

      • (Score: 2) by frojack on Saturday April 12 2014, @05:09AM

        by frojack (1554) on Saturday April 12 2014, @05:09AM (#30447) Journal

        No, they will just deny it, and they have already denied it.

        But that seems hardly germane. They lie directly to congress, why would lying to the press be any impediment?

        --
        No, you are mistaken. I've always had this sig.
  • (Score: 0) by Anonymous Coward on Saturday April 12 2014, @02:53AM

    by Anonymous Coward on Saturday April 12 2014, @02:53AM (#30411)

    Good luck with that. This was a major screw up and we have to bear the consequences now.

    • (Score: 2) by isostatic on Saturday April 12 2014, @10:28AM

      by isostatic (365) on Saturday April 12 2014, @10:28AM (#30501) Journal

      Even captures from a month ago would do the trick

      7 years ago I was capturing traffic into one of our systems, 6TB a day, and keepin it for a week, with barely any budget.

  • (Score: 4, Interesting) by Reziac on Saturday April 12 2014, @03:13AM

    by Reziac (2489) on Saturday April 12 2014, @03:13AM (#30417) Homepage

    TFS says: "...systematically attempting to record most or all of the conversations on Freenode and a number of other IRC networks."

    That would be damning against various 3-letter agencies IF that were the primary or only focus. But what's the rest of the picture? What if hitting Freenode and IRC is only incidental?

    --
    And there is no Alkibiades to come back and save us from ourselves.