Re: Retiring portsnap [was MITM attacks against portsnap and freebsd-update]

2014-04-11 Thread Bryan Drewery
On 2014-04-11 15:23, David Noel wrote: If you look at the portsnap build code you'll see that the first thing portsnap does is pull the ports tree from Subversion. It uses the URL svn://svn.freebsd.org/ports. By not using ssl or svn+ssh the entire ports archive is exposed to corruption right from

Re: CVE-2014-0160?

2014-04-11 Thread Ryan Steinmetz
I've also added the affected system information for CVE-2014-0076 and corrected a issue with the affected values. -r On (04/11/14 17:13), Ryan Steinmetz wrote: On (04/11/14 21:56), Matthew Seaman wrote: http://vuxml.freebsd.org/freebsd/b72bad1c-20ed-11e3-be06-000c29ee3065.html This is appli

Re: CVE-2014-0160?

2014-04-11 Thread Ryan Steinmetz
On (04/11/14 21:56), Matthew Seaman wrote: http://vuxml.freebsd.org/freebsd/b72bad1c-20ed-11e3-be06-000c29ee3065.html This is applied inconsistently though. While there is an entry for OpenSSL Heartbleed, it doesn't contain any reference to the FreeBSD base system and the security advisories (

Re: CVE-2014-0160?

2014-04-11 Thread Matthew Seaman
On 11/04/2014 15:34, Erik Trulsson wrote: > Quoting sbre...@hotmail.com: > >> I receive daily email from the host which normally shows port audits >> and vulnerabilities. However, I did not sport anything related to >> CVE-2014-0160 in this email. I expected the same info comes in this >> email ab

Re: Retiring portsnap [was MITM attacks against portsnap and freebsd-update]

2014-04-11 Thread David Noel
>> If you look at the portsnap build code you'll see that the first >> thing portsnap does is pull the ports tree from Subversion. It uses >> the URL svn://svn.freebsd.org/ports. By not using ssl or svn+ssh >> the entire ports archive is exposed to corruption right from the >> start. > > Just to cl

Re: Retiring portsnap [was MITM attacks against portsnap and freebsd-update]

2014-04-11 Thread Xin Li
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 04/11/14 09:08, David Noel wrote: >> Your report aside, I find portsnap to be far superior in security >> for ports and users. > > If you look at the portsnap build code you'll see that the first > thing portsnap does is pull the ports tree from

Re: CVE-2014-0160?

2014-04-11 Thread Tom Evans
On Fri, Apr 11, 2014 at 2:26 PM, wrote: > I receive daily email from the host which normally shows port audits and > vulnerabilities. However, I did not sport anything related to CVE-2014-0160 > in this email. I expected the same info comes in this email about the base > system as well. > > Ho

RE: CVE-2014-0160?

2014-04-11 Thread Erik Trulsson
Quoting sbre...@hotmail.com: I receive daily email from the host which normally shows port audits and vulnerabilities. However, I did not sport anything related to CVE-2014-0160 in this email. I expected the same info comes in this email about the base system as well. How do you normally

Re: Retiring portsnap [was MITM attacks against portsnap and freebsd-update]

2014-04-11 Thread David Noel
> Your report aside, I find portsnap to be far superior in security for > ports and users. If you look at the portsnap build code you'll see that the first thing portsnap does is pull the ports tree from Subversion. It uses the URL svn://svn.freebsd.org/ports. By not using ssl or svn+ssh the entir

Re: Retiring portsnap [was MITM attacks against portsnap and freebsd-update]

2014-04-11 Thread Brooks Davis
On Thu, Apr 10, 2014 at 06:38:39PM -0500, Bryan Drewery wrote: > On 4/10/2014 12:03 PM, David Noel wrote: > > I found a few bugs in portsnap and freebsd-update that I'd like to > > bring to the community's attention and hopefully recruit people to > > help fix. I mentioned them to Colin (their auth

RE: CVE-2014-0160?

2014-04-11 Thread sbremal
I receive daily email from the host which normally shows port audits and vulnerabilities. However, I did not sport anything related to CVE-2014-0160 in this email. I expected the same info comes in this email about the base system as well. How do you normally inform about recent vulnerability i

Re: CVE-2014-0160?

2014-04-11 Thread Kimmo Paasiala
On 11.4.2014, at 15.53, sbre...@hotmail.com wrote: > ext 65281 (renegotiation info, length=1) > ext 00011 (EC point formats, length=4) > ext 00035 (session ticket, length=0) > ext 00015 (heartbeat, length=1) <-- Your server supports heartbeat. Bug is > possible when linking against OpenSSL 1.0.1

RE: CVE-2014-0160?

2014-04-11 Thread Mohacsi Janos
On Fri, 11 Apr 2014, sbre...@hotmail.com wrote: ext 65281 (renegotiation info, length=1) ext 00011 (EC point formats, length=4) ext 00035 (session ticket, length=0) ext 00015 (heartbeat, length=1) <-- Your server supports heartbeat. Bug is possible when linking against OpenSSL 1.0.1f or older

RE: CVE-2014-0160?

2014-04-11 Thread sbremal
ext 65281 (renegotiation info, length=1) ext 00011 (EC point formats, length=4) ext 00035 (session ticket, length=0) ext 00015 (heartbeat, length=1) <-- Your server supports heartbeat. Bug is possible when linking against OpenSSL 1.0.1f or older. Let me check. Actively checking if CVE-2014-0160 wo

Re: freebsd openssh hole?

2014-04-11 Thread Jason Hellenthal
What is so confusing about this ? I don't see anything here that would cause worry besides the zealot attitudes you would typically find in the openbsd community. For them to be so security conscious and open source but yet not have the decency or common sense to mitigate major security concern

Re: CVE-2014-0160?

2014-04-11 Thread Mohacsi Janos
On Fri, 11 Apr 2014, sbre...@hotmail.com wrote: Hello Could anyone comment this? Worry, not to worry, upgrade, upgrade to what version? There are few contradicting information coming out in regards to the check of my server related to the 'heartbleed' bug: 1. http://heartbleed.com/ ... S

CVE-2014-0160?

2014-04-11 Thread sbremal
Hello Could anyone comment this? Worry, not to worry, upgrade, upgrade to what version? There are few contradicting information coming out in regards to the check of my server related to the 'heartbleed' bug: 1. http://heartbleed.com/ ... Status of different versions: --->    OpenSSL 1.0.1 t

Re: Heartbleed / r264266 / openssl version

2014-04-11 Thread Eygene Ryabinkin
Tue, Apr 08, 2014 at 03:47:29PM -0700, Xin Li wrote: > I have done a quick check on Linux systems and found they don't carry > a patchlevel for "openssl" either however they do provide a way to > tell the patchlevel because it's a package. However, they do bump the > date as part of the update. >