You're looking at Less Wrong's discussion board. This includes all posts, including those that haven't been promoted to the front page yet. For more information, see About Less Wrong.

Dagon comments on Open Thread April 8 - April 14 2014 - Less Wrong Discussion

3 Post author: Tenoke 08 April 2014 11:11AM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (242)

You are viewing a single comment's thread. Show more comments above.

Comment author: Dagon 11 April 2014 07:34:37AM *  1 point [-]

Please help with this calculation. pain and inconvenience are individual, but probability (for the non-famous who aren't targetted specifically) is probably similar for many of us. Let's take gmail to be specific:

  • have you changed your gmail password in response to this flaw
  • what is your current probability estimate that your gmail account was compromised by this flaw in a way that would cause you pain
Submitting...

Comment author: RichardKennaway 11 April 2014 11:34:26AM 2 points [-]

I changed passwords on gmail, but what I'm wondering is why I haven't seen a single announcement on any of the sites I log in to about the issue, including gmail, and others that third party sites have listed as vulnerable.

Comment author: asr 11 April 2014 02:28:11PM 1 point [-]

I have friends who do security at Google, and they explicitly told me "we don't think the company was vulnerable and you don't need to change your GMail password." So as near as I can tell, the third-party sites and Google, inc, disagree about whether Google is vulnerable here.

Comment author: JQuinton 11 April 2014 02:36:30PM 3 points [-]

I checked my Gmail login locations after I heard about Heartbleed and saw one location that was obviously not anywhere I had been in the last month. So based on that information I assumed that Gmail was compromised and changed my password.

Comment author: Douglas_Knight 13 April 2014 05:29:46AM 0 points [-]

How often do you check your login locations?

Comment author: tgb 13 April 2014 03:42:19PM 0 points [-]

It checks for you, by the way, and will block an attempt and notify you if it looks suspicious. This happened to me earlier this month. Interestingly, that happened 4 days after the vulnerable OpenSSL version was released and my Gmail password is basically the only the one which I do not reuse anywhere and I don't know how anyone could have gotten it... Still more likely to have been a keylogger or something.

Comment author: Lumifer 11 April 2014 02:36:51PM 1 point [-]

I have friends who do security at Google, and they explicitly told me "we don't think the company was vulnerable and you don't need to change your GMail password."

Um. Google said: (emphasis mine)

You may have heard of “Heartbleed,” a flaw in OpenSSL that could allow the theft of data normally protected by SSL/TLS encryption. We’ve assessed this vulnerability and applied patches to key Google services such as Search, Gmail, YouTube, Wallet, Play, Apps, and App Engine.

The fact that patches were needed pretty much says that the services mentioned were vulnerable.

Comment author: asr 11 April 2014 06:13:41PM *  2 points [-]

Context: I want to give some insight as to why I (and others) voted for "not changing password, not very worried" and as to why the company is not telling everybody to change password immediately.

I agree that the fact that patches were needed does imply that they were running the bad OpenSSL versions. The company is saying, on the record, that people do not need to change passwords. And this matches what I am hearing informally from friends who work there.

Is it good hygiene to change passwords? Yes. Given two-factor authentication and perfect forward secrecy, it might not be super critical though.

Comment author: Lumifer 11 April 2014 07:00:06PM *  2 points [-]

The company is saying, on the record, that people do not need to change passwords.

Let me ask an important question: how does Google know? A successful Heartbleed attack leaves no traces unless you're logging all the packets you received in pretty ridiculous detail.

Bruce Schneier says: "At this point, the probability is close to one that every target has had its private keys extracted by multiple intelligence agencies." I consider his opinions to be credible.

Update: Bloomberg says: "The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said."

Comment author: asr 11 April 2014 08:13:12PM *  1 point [-]

Yes. The NSA isn't a threat I worry about, since I figure they could get my stuff via a demand to Google, if they wanted it. I am primarily worried about non-government-aided criminals. See Steve Bellovin's analysis for why this isn't so suitable an attack for that class of adversary.

Comment author: Lumifer 11 April 2014 08:34:44PM *  2 points [-]

And look what your own link says:

"There's one password you should change nevertheless: your email password."

Besides, Bellovin is talking about what he calls the most serious case -- leakage of crypto keys. If the attackers snarfed your password, they don't need to sniff, mitm, or redirect your traffic.

Comment author: XiXiDu 11 April 2014 03:01:39PM *  0 points [-]

I changed passwords on gmail...

I was going to wait until I get a message from Google, since I have 2-step verification enabled. I don't see how heartbleed could compromise it. Except of course for application-specific passwords.

Comment author: Khoth 11 April 2014 10:41:21AM 0 points [-]

I changed my password, but not solely due to the flaw - it was more a straw that broke the camel's back as I was using a password good enough for just email but not good enough for the master key to all my online (and banking) activity.