Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
But to say that "66% of the Internet" is affected is actually quite a bit of an exaggeration. It might well be 66% of the web sites using SSL, but even it was 100%, that still would not be "66% of the Internet."

To be clear... 66% of internet facing websites that are secured use OpenSSL.

Also, don't interchange "SSL" with "OpenSSL". SSL by itself is a public key method of encryption that is broken except for version 3, but even still, it is encouraged to use more modern TLS encryption. OpenSSL is a software package that supports SSLv3 as well as TLS.

The bug was in the TLS heartbeat mechanism as implemented in the OpenSSL software.

----------

You realize that Mac OS X is based off of linux as well... but they stuck to version OpenSSL 0.9.8y

Mac OS X is most certainly NOT based on Linux. You confuse being a "unix-like" OS with Linux.

Android uses the Linux kernel.
Apple uses the XNU kernel.
 
Would we have encouraged Google to get their brag on after Apple's GotoFail? Both were bad SSL coding errors... One could argue that Apple was directly at fault for lack of code review in that case, whereas Heartbleed was shared by a great many companies.

And before too much bragging takes place, Apple only said that "key services" weren't affected. Meaning that non-key services likely were affected. Our definition of key might differ from theirs, but it doesn't look like Apple is going to be transparent...

They use third party CDNs too. Those folks will need to take care of their own servers.

In general, public companies don't use unsupported software for end customer services. Their legals will shoot the engineers.
 
Last edited:
To be clear... 66% of internet facing websites that are secured use OpenSSL.

That 66% includes versions of OpenSSL not vulnerable to heartbleed and also those that have not enabled heartbeat. So realistically it's more like 18-20% per Steve Gibson on Security Now podcast.
 
Mashable website has compiled a list of of the biggest sites hit by Heartbleed. They are saying to change your password for these 15 sites asap. Check out all the sites they show as affected and not affected...it's a long long list.

Facebook
IFTTT
Instagram
Pinterest
Tumblr
Google
Yahoo
Gmail
Amazon Web Services
Turbotax
Dropbox
OKCupid
Soundcloud
GoDaddy
Minecraft

What is odd is I saw another article earlier today that said, Amazon was not affected and also Google.

I don't think we will ever really know and I also read this has been happening for years.

I also just got an update for OS Chrome Version 34.0.1847.116. If you use Chrome check for your update now.
 
Last edited:
Mashable website has compiled a list of of the biggest sites hit by Heartbleed. They are saying to change your password for these 15 sites asap. Check out all the sites they show as affected and not affected...it's a long long list.

Facebook
IFTTT
Instagram
Pinterest
Tumblr
Google
Yahoo
Gmail
Amazon Web Services
Turbotax
Dropbox
OKCupid
Soundcloud
GoDaddy
Minecraft

What is odd is I saw another article earlier today that said, Amazon was not affected and also Google.

I don't think we will ever really know and I also read this has been happening for years.

I also just got an update for OS Chrome Version 34.0.1847.116. If you use Chrome check for your update now.

What does Chrome OS have to do with this?
 
Do you know why Apple services and products were not affected? Pure dumb luck.

Apple is just lazy - they keep their BSD subsystem ridiculously outdated:
Wrong!

Apple Inc. said:
From:
https://developer.apple.com/library...eneralPurposeCrypto/GeneralPurposeCrypto.html

“Although OpenSSL is commonly used in the open source community, OpenSSL does not provide a stable API from version to version. For this reason, although OS X provides OpenSSL libraries, the OpenSSL libraries in OS X are deprecated, and OpenSSL has never been provided as part of iOS. Use of the OS X OpenSSL libraries by apps is strongly discouraged.”


From:
https://developer.apple.com/library...ationAPIs/SecureNetworkCommunicationAPIs.html

“In addition to these APIs, a number of open source tools use OpenSSL for secure networking. If you use OpenSSL in your publicly shipping apps, you must provide your own copy of the OpenSSL libraries, preferably as part of your app bundle; the OpenSSL libraries that OS X provides are deprecated.”


----------

The fact that you don't know what you're talking about is pretty hilarious, since Apple do use OpenSSL, but not the vulnerable version.
Apple does not use OpenSSL in OS X 10.7 and newer. They use their own GCD compatible library.
 
They made the switch with Lion correct? Immediately before then, Snow Leopard still included a 6 year old version of openssl.

No, it didn't. You don't understand how software versioning and support works.

OpenSSL 0.9.8 is still supported by the OpenSSL developers. They chose not to increment those numbers for some number of years, but that does not mean the software has not been updated in that long.

Also, more importantly, OpenSSL is provided in OSX only for compatibility. The system itself uses SecureTransport. (Which had that stupid gotofail bug, but the OpenSSL one is much, much worse.)

The 1.x version of openssl was released 15 months prior to this. Had they updated during that 15 month period like everyone else did, we wouldn't be having this conversation.

Indeed. We'd be having a conversation about how software using OpenSSL on OSX was also vulnerable to this problem instead. Much better.
 
Do you know why Apple services and products were not affected? Pure dumb luck.

Apple is just lazy - they keep their BSD subsystem ridiculously outdated:



Although 0.9.8y was released earlier this year, it was a minor point release for a major version of SSL originally released in 2005. :eek:

A naked version number means nothing except to indicate where the code base started from. There's no way to know what patches, if any, have been separately applied from upstream versions as doing so doesn't bump the version. Apple and RedHat, among others, are good at doing things like this.
 
They do use openSSL, just not the versions impacted (1.0.1 through 1.0.1f ).

What is funny is people who have no clue commenting.

I'm a jr. developer at my company, and I spent the morning making sure our servers were secure. My boss said to me "Aren't you putting a lot of effort into this?" This because a sr. developer assured him that no one would implement an SSL library that would allow arbitrary RAM dumping.

I didn't have the heart to tell him that I could ping different websites and getting random username and password combos back in plain text.
 
OpenSSL is a known entity that is constantly analyzed for security exploits.

...Um...

That would be peachy if the many-eyes theory of constant analysis hadn't actually soiled itself so badly in recent days. Heartbleed is the third major crypto whoops in open-source code within about a month. Apple's several-month-old "goto fail" issue was the first, then came the GnuTLS bug which impacted the Linux community in mid-fist-pump after having lurked for years [http://arstechnica.com/security/201...inux-hundreds-of-apps-open-to-eavesdropping/], and now this majestic new OpenSSL bug.

All open source. All "constantly analyzed for security exploits."

Just sayin'.
 
A naked version number means nothing except to indicate where the code base started from. There's no way to know what patches, if any, have been separately applied from upstream versions as doing so doesn't bump the version. Apple and RedHat, among others, are good at doing things like this.

Except with Redhat it is trivially easy to get this information.

-bash-4.1# rpm -q --changelog openssl | grep CVE-2014-0160
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension


----------

All open source. All "constantly analyzed for security exploits."

Just sayin'.

Why don't you just say what you really mean?
 
Everyone should agree Apple made a very smart decision not implementing OpenSSL in their infrastructure. As a result, we Apple consumers can feel safe and protected while everyone else is scrambling to undo all the damage and the associated security risks for their consumers.
 

yea but it's still affected where as ios isn't at all

Not really a win or a loss for any of them as the issue itself isn't something that is OS-specific in that way.

win for us ios users knowing we have one of the more secured os's out there

definitely can't say that about android, they come out the box with malware lol
 
No, it didn't. You don't understand how software versioning and support works.

Believe me I do. I was saying that with the release of lion, they transitioned from openssl to secure transport. Maybe I wasn't clear...

----------

win for us ios users knowing we have one of the more secured os's out there

definitely can't say that about android, they come out the box with malware lol

*sigh* This exploit makes the web a less secure place for everyone, regardless of what client side OS you are running. There are no real "winners" here, only losers. The only winners are cyber criminals and intelligence organisations.

And to think this thread began with some pretty interesting discussion with some informed posters of differing opinion. It has now degenerated to this.. I'm out!
 
Last edited:
Ohh! The irony of Apple complaining about openssl deprecating parts of their API too quickly. Apple are the kings of doing this kind of thing.

Again, not really.

Apple has no problem dropping features from their products where that makes sense, but when Apple declares an API stable, you can be sure it won't change in an incompatible manner for at least two major (10.X) releases, and usually more.

Most software made to run on OSX 10.4 (the first release for Intel) will run on 10.9 if it didn't use any non-stable APIs. Of course, that is a full five major releases so some APIs will have changed or, after deprecation, disappeared entirely. There are APIs still in OSX today that debuted with OSX 10.0. Binaries written for that OS version won't run of course (on account of they will be for PowerPC) but a recompile might fix it, assuming the other APIs used weren't deprecated in the 13 years since it was written.

Of course, many programs use APIs that are not all that stable, or they use libraries from external parties where the same problem applies (like OpenSSL). And the more complex the software is, the more likely this is to happen, so in the real world running software written for 10.0 is going to be a challenge. But it is possible in the right circumstances.

Also, the above does not account for software taking advantage of bugs that are fixed, obviously.
 
No. This vulnerability is primarily aimed at web servers, so its a website/service owner that'll determine whether or not they're vulnerable. Most updated shortly after the bug was found. You can attack clients with it, but it involves far more work, requires good timing, and requires additional information which attackers generally can't get.

Banks generally haven't used OpenSSL, Microsoft doesn't use OpenSSL, and its quite probable Google used their own SSL implementation for their servers. Same story with Apple.

With the exception of Yahoo, its generally smaller websites and services you have to worry about. The Verge, ArsTechnica, Anandtech, etc. Macrumors would probably be vulnerable, but SSL isn't used to begin with.

Thank you for the clarification. That's what I suspected, but it all seemed to vague to me.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.