Tuesday, April 22, 2014

Tech Talk / By Martha Knight



One good thing about the NSA spying on our communications is that if there are any bugs out there, NSA will notice them and will warn us. Or warn somebody. Or stop the hackers. Right?

Wrong. Turns out the NSA did know about the Heartbleed bug two years ago, maybe longer. When NSA found Heartbleed, the agency said, “Oh, goody! We can exploit this and use it to gather intelligence,” or words to that effect. And it didn’t tell us.

A number of popular sites have used a system called OpenSSL (for secure sockets layer) for encryption of our sensitive data. Companies have relied on it to keep their trade secrets, to comply with privacy laws, and for security of various kinds.

But there was this itty-bitty coding error in OpenSSL nicknamed Heartbleed, that enables hackers to snitch data from vulnerable sites.

FireEye, a network security company, says so far we do not know that crackers have exploited the bug.

Still, Tor Project, which helps people browse anonymously, says those with a serious need for privacy might want to stay mostly offline for a few days.

Oh, but we want to go online to see how they are doing, getting rid of the danger of being on the net! What to do, what to do?

But maybe it isn’t quite that bad. Dare we hope?

Well, not all sites on the internet use OpenSSL. Yahoo, Flickr, Eventbrite and OKCupid do, and here is a site lets you check to see whether specific sites are vulnerable: http://filippo.io/Heartbleed/#www.motherjones.com

Google and Facebook have stated they are not at risk because of Heartbleed.

So should all sites using SSL get rid of it? No way. Not all SSL is OpenSSL, and not all OpenSSL security has resulted in breaches.

When is SSL used, in the main? When there is sensitive stuff being transmitted, such as bank information, identity items like social security numbers, credit card numbers, passwords. Lots of the information doesn’t have strategic value of military and diplomatic importance, no state secrets, usually, but hey, some of our spies could have been caught earlier if their spending and saving had been known, or if their conspicuous consumption had been noticed.

Not using SSL at all would be risky. Empty the bathinet, but hang on to the baby.

Not all of our communications are all that sensitive. In fact, some of them are downright crude. Some of the comments we read… well, let’s just say good number of our emails and tweets and posts are trivial. If people were concerned about the content being intercepted, they wouldn’t be chattering away on their cells, in the store or the restaurant or wherever, where we overhear them without even trying.

An SSL breach wouldn’t necessarily give a cracker access to all the information on a site. But if a flaw allows access to passwords that were used recently, that’s serious enough for me.

In Canada taxpayers are expected to file their taxes a few weeks from now, but even so, the Canada Revenue Agency decided to close its online center for now so it can get its Heartbleed problems sorted out. Meanwhile, our very own IRS assures us it has no Heartbleed difficulties. And all this time we thought they just had no heart.

I hope that is true, about no Heartbleed, because I filed online yesterday. No, not my tax return—my 4868, the reprieve form, the one that gives me more time to file. But I had to set up a password and provide my SSN, so I wouldn’t want the IRS leaking those. Although I can’t imagine why crackers would bother with me while there are so many people with more money. Almost everyone, actually.

Trend Micro, a security outfit based in Japan, says the disclosure of the Heartbleed bug has set off a race between security experts and hackers, the former trying to keep the latter from exploiting the vulnerability. That would be the good being blown by the ill wind, for the security companies. Or the silver lining behind the cloud. Oh, that’s right! Cloud storage! Not so safe as we thought. Meanwhile, the bad guys are sharing their tips and tricks, helping each other find ways of using the Heartbleed bug.

You might wonder what to do if you see hackers have been snooping around. But a better question might be, how will you know? Some bugs and backdoors reveal when they have been used. Heartbleed doesn’t. It isn’t as if you will look around and see that thieves have made off with copy, your patents, your bank records, your love letters, passwords and encryption keys. You still have those. They just aren’t private anymore. If others have them too, that is not apparent to you. Of course if someone starts posting those love letters on Facebook, or draining your CheckFree or online bank accounts, it’s like when you find a minnow in the milk: you are entitled to be suspicious.

They’ll fix it, right? Well, actually OpenSSL has a new, fixed version that can be downloaded, but it is not that easy to apply. And what if there is a new coding error while the IT folks are putting this new OpenSSL in place and getting a new SSL certificate? Hmm.

Meanwhile, should you change all your passwords? If there is still treacherous SSL on a site you access with that new pw, it can be captured too, so why bother until you know, or at least hope to heck, the site is squeaky clean?

So what can you do?

Simple. Just stay off the net!

No comments:

Post a Comment

Comments which are degrading in any way will not be posted. Please use common sense and be polite.