Gentoo Archives: gentoo-user

From: "Ján Zahornadský" <yankyo@×××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] 'Heartbleed' bug
Date: Thu, 10 Apr 2014 11:06:14
Message-Id: 53467B4E.9070401@gmail.com
In Reply to: Re: [gentoo-user] 'Heartbleed' bug by "Randolph Maaßen"
1 Exactly, OpenSSH depends on OpenSSL, but should never use the buggy code.
2
3 Some details in the answer here:
4 http://superuser.com/questions/739349/does-heartbleed-affect-ssh-keys
5
6
7 On 04/10/2014 07:00 PM, Randolph Maaßen wrote:
8 > The Heartbleed bug is in the Heartbeat function of TSL (a second keep
9 > alive). OpenSSL does not use TLS for transport security, it uses its
10 > own Protokoll for security.
11 >
12 > 2014-04-10 12:51 GMT+02:00 Nilesh Govindrajan <me@××××××××.com>:
13 >> On Thu, Apr 10, 2014 at 4:22 PM, Matthew Finkel
14 >> <matthew.finkel@×××××.com> wrote:
15 >>> On Thu, Apr 10, 2014 at 05:53:44PM +0800, J?n Zahornadsk? wrote:
16 >>>> On 04/10/2014 05:03 PM, Adam Carter wrote:
17 >>>>>
18 >>>>> What surprises me here is OpenSSH. It's not supposed to use OpenSSL
19 >>>>> but Debian update process suggests to restart it after updating
20 >>>>> OpenSSL to a fixed version. Is it an overkill on their part? It
21 >>>>> might confuse admins.
22 >>>>>
23 >>>>>
24 >>>>> adam@proxy ~ $ ldd /usr/sbin/sshd
25 >>>>> linux-vdso.so.1 (0x00007fffb068e000)
26 >>>>> libwrap.so.0 => /lib64/libwrap.so.0 (0x00007f68db1e6000)
27 >>>>> libpam.so.0 => /lib64/libpam.so.0 (0x00007f68dafd8000)
28 >>>>> libcrypto.so.1.0.0 => /usr/lib64/libcrypto.so.1.0.0 (0x00007f68dabf5000)
29 >>>>> libutil.so.1 => /lib64/libutil.so.1 (0x00007f68da9f2000)
30 >>>>> libz.so.1 => /lib64/libz.so.1 (0x00007f68da7db000)
31 >>>>> libcrypt.so.1 => /lib64/libcrypt.so.1 (0x00007f68da5a4000)
32 >>>>> libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f68da387000)
33 >>>>> libc.so.6 => /lib64/libc.so.6 (0x00007f68d9fd7000)
34 >>>>> libgcc_s.so.1 =>
35 >>>>> /usr/lib/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1 (0x00007f68d9dc0000)
36 >>>>> libdl.so.2 => /lib64/libdl.so.2 (0x00007f68d9bbc000)
37 >>>>> /lib64/ld-linux-x86-64.so.2 (0x00007f68db3f1000)
38 >>>>> adam@proxy ~ $ qfile /usr/lib64/libcrypto.so.1.0.0
39 >>>>> dev-libs/openssl (/usr/lib64/libcrypto.so.1.0.0)
40 >>>>> adam@proxy ~ $
41 >>>>>
42 >>>>> So OpenSSH clearly IS using OpenSSL, and you need to restart sshd after
43 >>>>> upgrading OpenSSL.
44 >>>>
45 >>>> As far as I know, it doesn't use it for the communication itself, just
46 >>>> some key generations, so it shouldn't be affected by this bug. But I
47 >>>> guess better safe than sorry...
48 >>>>
49 >>>
50 >>> Right. heartbleed does not directly affect openssh, but openssh uses
51 >>> openssl and it's good practice to keep the shared libraries on-disk and
52 >>> the shared libraries in-memory in sync.
53 >>>
54 >>
55 >>
56 >> How is OpenSSH not affected?
57 >>
58 >
59 >
60 >