Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Open Source

How To Prevent the Next Heartbleed 231

dwheeler (321049) writes "Heartbleed was bad vulnerability in OpenSSL. My article How to Prevent the next Heartbleed explains why so many tools missed it... and what could be done to prevent the next one. Are there other ways to detect these vulnerabilities ahead-of-time? What did I miss?"
This discussion has been archived. No new comments can be posted.

How To Prevent the Next Heartbleed

Comments Filter:
  • Re:How about (Score:4, Informative)

    by zr ( 19885 ) on Saturday May 03, 2014 @10:22PM (#46910965)

    about as effective as sunshine and puppies.

  • Easy (Score:3, Informative)

    by kamapuaa ( 555446 ) on Saturday May 03, 2014 @11:19PM (#46911185) Homepage

    What did I miss?

    An article before the word "bad."

  • Re:Static analysis (Score:5, Informative)

    by Krishnoid ( 984597 ) on Sunday May 04, 2014 @12:22AM (#46911359) Journal

    Coverity has a blog post [coverity.com] describing the problem and why their static analysis methods currently can't detect it.

  • Re:How about (Score:5, Informative)

    by Dahamma ( 304068 ) on Sunday May 04, 2014 @12:31AM (#46911389)

    I have personally ported OpenSSL to at least 6 embedded systems, one of which was so proprietary they wrote their own C/C++ compiler. Good luck finding an Ada compiler for that.

    his makes it great for low-level, performance sensitive programs like OSes, compilers,

    Aaand... performance sensitive like, say... crypto? There isn't much code more performance sensitive than crypto libraries, which is one of OpenSSL's main uses. In fact, there are a whole bunch of native assembler implementations for x86, MIPS, ARM, PPC, etc to achieve that low level performance. Clearly you have never actually looked at the OpenSSL code base...

  • Re:How about (Score:4, Informative)

    by kthreadd ( 1558445 ) on Sunday May 04, 2014 @04:19AM (#46911797)

    If your web server is pushing out lots of https traffic then yes it is performance sensitive.

  • LICENSE (Score:2, Informative)

    by Anonymous Coward on Sunday May 04, 2014 @05:07AM (#46911887)

    Excerpt...

      * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
      * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
      * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
      * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
      * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
      * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
      * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
      * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
      * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
      * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
      * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
      * OF THE POSSIBILITY OF SUCH DAMAGE.

  • by jhol13 ( 1087781 ) on Sunday May 04, 2014 @06:47AM (#46912035)

    This problem was caused by a simple missed parameter check, nothing more. Stop acting like the cultural problem is with the developers when it is with the leaches who consumer their work.

    I do not believe you. If this were an isolated case, then you'd be right. But no, this kind of "oops, well now it is fixed" things happens all the time, over and over again. The culture of the programming never improves due to the error - no matter how simple, no matter that it should have been noticed earlier, no matter what.

    I am willing to bet that after next hole the excuses will be same "it was simple, now it is fixed, should up" and "why don't you make better, shut up" or just "you don't understand, shut up". And still the cowboy-coding continues.

    This was caused partially by unchecked parameter (this should have never happened, there is no excuse for it), partially because the idiots used their own allocator which created the covert channel and prohibited the use of malloc-debug libraries. Libraries which would have found the error - again this should not have happened.

    But then, maybe I just should shut up ...

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...