Tests confirm Heartbleed bug can expose server's private key

CloudFlare said its challenge shows how dangerous is the OpenSSL bug

Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.

The findings come shortly after a challenge created by CloudFlare, a San Francisco-based company that runs a security and redundancy service for website operators.

CloudFlare asked the security community if the flaw in the OpenSSL cryptographic library, made public last week, could be used to obtain the private key used to create an encrypted channel between users and websites, known as SSL/TLS (Secure Sockets Layer/Transport Security Layer).

The private key is part of a security certificate that verifies a client computer isn't connecting with a fake website purporting to be a legitimate one. Browsers indicate a secure connection with a padlock and show a warning if the certificate is invalid.

Security experts thought it might be possible that the private key could be divulged by exploiting the Heartbleed flaw, which may have affected two-thirds of the Internet and set off a mad scramble to apply a patch that fixes it.

"This result reminds us not to underestimate the power of the crowd and emphasizes the danger posed by this vulnerability," wrote Nick Sullivan of CloudFlare on the company's blog.

By obtaining the private key for an SSL/TLS certificate, an attacker could set up a fake website that passes the security verification. They could also decrypt traffic passing between a client and a server, known as a man-in-the-middle attack, or possibly unscramble encrypted communications they've collected in the past.

CloudFlare set up a server running the nginx-1.5.13 web server software using OpenSSL version 1.0.1.f on Ubuntu 13.10 x86_64. 

Fedor Indutny of Moscow was the first person to obtain the key, Sullivan wrote. The Heartbleed bug divulges data in 64K batches from a computer's memory. The data can include login credentials for people who have recently logged into the server.

Attackers can keep hitting the server repeatedly, each time obtaining 64K of data in memory. The Heartbleed attack is particularly dangerous since it leaves few traces, allowing attackers to continue to try until they obtain the desired information.

Researchers are still trying to figure out the conditions under which what specific data is revealed. OpenSSL, an open source program, is used in a wide variety of operating systems, mobile applications, routers and other networking equipment.

Sullivan wrote Indutny sent 2.5 million requests to the test server over the course of a day. The second person to get the key, Ilkka Mattila of the National Cyber Security Centre Finland, obtained it with fewer requests, around 100,000, he wrote.

In an update to the blog post, Sullivan wrote two others also completed the challenge: Rubin Xu, a doctoral student at Cambridge University, and Ben Murphy, a security researcher.

"We confirmed that all individuals used only the Heartbleed exploit to obtain the private key," Sullivan wrote.

How the researchers each accomplished obtaining the private key hasn't been revealed. "It is at the discretion of the researchers to share the specifics of the techniques used," Sullivan wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Read more: Heartbleed: GE Capital says no customer data compromised

Join the PC World newsletter!

Error: Please check your email address.

Tags securityCloudFlaredata breachencryptiondata protectionExploits / vulnerabilities

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?