23

Should I change all of my online passwords due to the heartbleed bug?

Edit:

I found a list of vulnerable sites on GitHub and checked all my critical sites. Everything I was really concerned with was not vulnerable according to the list.

derelict
  • 348
  • 1
  • 2
  • 10
  • 2
    This question may be considered a "duplicate", but the other question asks a very open ended question "What should users do about heartbleed" and contains multiple questions in one post. I was under the impression those type of questions were considered inappropriate for this forum. – derelict Apr 10 '14 at 17:40

4 Answers4

29

Short answer: Yes, all passwords.

Long answer: At first sight, you only need to change the secret key of the certificate. But due to several reasons, all passwords are affected. Here's why:

Reason 1: Chained attack

  1. Someone captured the secret key of the certificate. From that time on, he could decrypt all the traffic to that site.
  2. If you logged on for whatever service on that website, your password was revealed. Probably the most common service is Webmail, so let's use that as an example.
  3. Reading your emails, the attacker found out which other services you are using.
  4. Using the password reset mechanism, the attacker simply reset all the passwords, confirmed the reset emails and deleted those emails of course.
  5. The attacker now has access to all your services.
  6. The website owner (whose secret key was stolen) became aware of the security leak and fixes it. The service (we assumed Webmail) is no longer vulnerable.
  7. The website owner informs you about the leak and asks you to change your password.
  8. The attacker can still use all the other services as long as you don't notice that you cannot login anymore (because he changed the password). This means: For services which you use often, it's more likely to detect that it was misused. For services you don't use often, you'll not notice.

Therefore you at least have to check each single password, whether it is affected or not.

Good thing on this attack vector: You'll be aware of the issue.

Reason 2: Access to database

  1. Someone captured the secret key of the certificate. From that time on he could decrypt all the traffic to that site.
  2. If the admin of the website logged on to do some administration, moderation or whatever, the attacker now has the password of the admin.
  3. With that password, the attacker gets access to the database.
  4. Depending on the security of the database, the attacker can read
    • the usernames
    • the passwords in plaintext (worst case)
    • vulnerable password hashes (e.g. MD5 hash, unsalted) (bad case)
    • secure salted hashes (best case)
  5. The attacker calculates the password from the hash
  6. The website owner fixes the problem
  7. You are informed by the website owner to change the password.

Since you as the user cannot know how securely the password was stored in the database, you need to consider that the attacker has the password (and username). This is a problem, if you reused the password for other services.

Bad thing: You don't know whether you are affected, because logging in to other services still works (for you and for the attacker).

Only solution: Change all passwords.

Reason 3: not only secrets certificate keys are leaked

 I looked at some of the data dumps
 from vulnerable sites,
 and it was ... bad.
 I saw emails, passwords, password hints.

As posted by XKCD #1353:

    enter image description here

So the attacker could already have your password in plain text even without access to the database and without chained attack.

Notes

The second problem, described by @Iszy, still remains: Wait to change your password until the service has fixed the Heartbleed issue. This is a critical hen-and-egg issue, because you can only reliably change all the passwords, when all services you use are updated.

Thomas Weller
  • 3,366
  • 3
  • 22
  • 40
  • +1 for a serious, well-written, non-facetious answer. – asteri Apr 09 '14 at 20:54
  • 4
    I think you missed the point of that xkcd... namely the dripping sarcasm. Your answer is also a bit blown out of proportion, but that at least is in tune with most of the mass media's treatment of this. – AviD Apr 10 '14 at 08:57
  • 2
    @JeffGohlke I'm not certain that it is serious or non-facetious, given how it utterly ignores the actual risks involved and the wildly speculative threats it proposes. It actually may be the most sarcastically facetious answer of all. If not, it's a bit absurd. – Xander Apr 10 '14 at 13:59
  • 4
    @Xander I'm more just disappointed in the Security.SE community's treatment of a serious security bug. It's fine to have personal disdain for something, but telling people that it's not an issue at all and to ignore it is pretty foolish, and to just insult people who take it seriously is simply arrogant. I refer to Tom Leek's answer below, which should be deleted as Not An Answer. – asteri Apr 10 '14 at 14:04
  • @JeffGohlke I think it's a result of the frustration of seeing a dozen or more essentially duplicate questions yesterday, but I can't argue with that. However, I would argue that it still isn't a reason to upvote and praise an answer which is essentially wrong, just because it's different. – Xander Apr 10 '14 at 14:15
  • @Xander That's fair. If this answer really is wrong, I don't have the knowledge to see why, so that's why it got my upvote. I wouldn't upvote it if I thought it was flat out wrong. Maybe you should post your own answer, since you seem to know more about the vulnerability and can correct whatever the misconception is. – asteri Apr 10 '14 at 14:20
  • 1
    @JeffGohlke As it's closed as a duplicate, answers can't be posted any longer (and I wouldn't in any case, knowing that it's a duplicate) but I think one of the most reasonable opinions to date on passwords specifically is Robert Graham's. http://blog.erratasec.com/2014/04/yes-you-might-have-to-change-your.html#.U0asMlT3bWQ – Xander Apr 10 '14 at 14:37
  • @Xander Interesting. Though I think it's a bit misleading to say that only usernames/passwords entered over the last few days are vulnerable, since the bug has been present in OpenSSL [since two years ago, according to GitHub](https://github.com/openssl/openssl/commit/bd6941cfaa31ee8a3f8661cb98227a5cbcc0f9f3). – asteri Apr 10 '14 at 14:45
  • 1
    @Xander: yes, this answer include speculative threats. Note that this answer was also written in response to Tom Leek's answer, which I absolutely could not agree with. It is not meant to be sarcastic. I'm a non native English speaker and my English is not good enough to write sarcastic posts. I totally believe we should change passwords and I have set up an info page in German to inform my customers and relatives what to do. It contains the save advice. – Thomas Weller Apr 10 '14 at 19:33
23

No. You do not have to change all your passwords due to heartbleed. You have to change all your passwords because everybody seems to have become a huge herd of panicking sheep; changing your passwords will give you a warm feeling of doing something useful while you are running to your ultimate destination, which may well be off the nearest cliff. Such is the fate of sheep.

While you metaphorically plummet to your death, you will have time to reflect on the stupendous ability of human brains to cease to function properly right at the time when they are most needed.


Edit: OK, just to be done with it, here are some considerations expressed in a more boring way.

The heartbleed bug is serious. Nobody disputes that (well, some people have, but there always are people like that). That other answer explains at length how the bug can be leveraged to seriously compromise the security of the target server. In effect, this means that though the bug is a read-only buffer overrun, that may be sufficient to bring its consequences on par with that of a write buffer overrun (the classical kind of buffer overflow).

However, three distinct fallacies are at work in the whole heartbleed "debate" (mmh, "debate" may not be the right word; "panicking mob" would be closer to the truth). These are the following:

  • Fallacy 1: this bug is exceptional. This one is flatly wrong. Buffer overflows are relatively uncommon in well-managed and seasoned code, but any significant piece of C code must still have a few overflows lurking in it. In the case of a Web server, overflows and other vulnerabilities (e.g. use-after-free) in OpenSSL but also Apache (and its modules !) and the kernel are relevant. Such things happen regularly, say several times per year. Not once per decade, as sensationalist articles claim.

    This fallacy is dangerous because it comforts sloppy administrators in the idea that they can get away with not applying security patches on a regular basis; they believe that they can just be "reactive", doing something only when it hits the news.

  • Fallacy 2: we have all been hacked two years ago. This one hinges on a suspension of quantification: if something is theoretically possible, just assume that it has happened, however improbable it was. This is often justified by righteous claims of "not wanting any compromise about security", which is just contrary to both best practices and reality. Every security feature has a cost which must be balanced with the expected risks and consequences. In this case, some people claim that since the bug has been there for two years, it is ob-vi-ous that it has been exploited by <insert-name-here> for two years.

    It would be preposterous to claim that heartbleed is the last bug ever in the whole code stack of a server. Experience shows that there always is at least one more bug, somewhere. The consequence is that if attackers are "allowed" to be aware of bugs years before everybody else, then they are still in control of your server. If you must reset keys or passwords because of the heartbleed bug, then, by the same logic, you must do it again. And again. This is not tenable in practice. At some point, one must assume that a server may be not-attacked despite having potential vulnerabilities. Alternatives being either to use only code which has been proven to be bug-free (fat chance on that; NASA spends 20000$ per line of code to make it as free of bugs as possible, and they still have bugs); or not operating a Web server at all (the only code without bugs is the code which does not exist).

  • Fallacy 3: resetting a password cleanses the server. Let's assume that you strongly believe that attackers did exploit the heartbleed bug, and obtained all your deepest secrets. What will you do about that ? You reset passwords and private keys, and... that's all ? Such a course of action makes sense only if the private key and the users' passwords are the only private things in the server. What kind of server is that, then ? Why would passwords be needed to access a server which contains only public data ?

    As the other answer says, the attacker may have leveraged the bug in order to "gain access to the database". At which point the whole database contents are in his possession, not just hashed passwords; he may also have altered parts of it, and planted hostile code (e.g. backdoors to be able to come back). There is no end to the mischief that such an attacker may enact. Merely resetting passwords and changing certificate keys is like bringing a mop to deal with an excess of moisture on the floor of a Titanic cabin; it misses the point. If you really believe that a compromise may have occurred, then there is only one thing to do: nuke it from orbit. If you compromise, by just resetting the passwords, then you are demonstrating that you do not seriously believe in your own justification; you reset passwords for Public Relations, not because of an actually suspected attack.

So there you have it: ineffective countermeasures to a fantasized attack stemming from an overhyped bug (serious, but still overhyped), which comforts poor sysadmins in their bad practices. Mr Sheep, please meet Mrs Cliff. I am sure you will get along well.

Tom Leek
  • 170,038
  • 29
  • 342
  • 480
  • 6
    Please explain why it's not necessary to change passwords. – Andrew Grimm Apr 09 '14 at 22:00
  • 11
    It is no more (and no less !) necessary to change all passwords due to this bug, than it was for all the previous bugs which occurred over the years and allowed just as well data to leak or, even worse, complete hostile control. And we did not previously. So either everybody got it wrong for the last 30 years and we really should have reset all passwords for all servers in the world several times per year; or else somebody _might_ be exaggerating a bit the specific case of this particular bug. – Tom Leek Apr 09 '14 at 22:12
  • why is this answer still up? – derelict May 06 '14 at 04:27
12

Changing passwords on a site that is/was vulnerable to Heartbleed is only effective after:

  • The site has been patched to a non-vulnerable version of OpenSSL, or switched to use a different SSL implementation.
  • A new SSL certificate has been issued and applied to the site.
  • Old SSL certificates for the site have been revoked.

All of the above being beyond your control as an end-user, it's best to just wait for confirmation from the site owner that they've fully mitigated the vulnerability.

That said, following best practices such as using complex and unique passwords for all websites would still help to lessen the impact of a password compromise. This is something you should be doing regardless of what the latest and greatest vulnerability news says. It would also help simplify your own response to issues such as this, since you will only need to change your passwords on affected sites and not all others also.

Iszi
  • 27,027
  • 18
  • 99
  • 163
5

Yes, you should always change all of your passwords.

You never know when someone might have compromised your password. And really without any certainty that it the worst hasn't happened today, the only sensible action is to take any and all measures possible to protect yourself.

The same goes for tomorrow.

tylerl
  • 82,665
  • 26
  • 149
  • 230