@neelmehta @tqbf We can extract the private key successfully on FreeBSD after restarting apache and making the first request with ssltest.py
-
-
- View other replies
-
-
- View other replies
-
@1njected@thegrugq With hints from https://news.ycombinator.com/item?id=7573377 got reliable extraction from Apache defaults on Debian:pic.twitter.com/uWKQnMkaNB
-
-
@neelmehta How certain are you about that? -
-
@neelmehta @ex509 Does exploiting this never cause access violation exceptions, by reading beyond the heap allocation into an invalid page?
-
-
@neelmehta Hey Neel. Do you still feel that private key exposure is unlikely? Just wondering if your thinking has changed in the past days. -
@neelmehta Aren't you giving people false hope here? I'd recommend immediate private key replacement for vulnerable servers. -
@neelmehta during out tests yesterday we did find parts of private keys in memory. Reconstruction _might_ be possible from multiple dumps. -
@neelmehta@j4cob Sometimes "unlikely" Just Isn't Good Enough. Yes, your underwear should be turning that color right now. -
@neelmehta Exposing parameters of previous requests was bad enough. -
@neelmehta All systems or some? How likely? More info? -
@neelmehta thanks for this comment. I wasn't sure of this and doubting that keys could be exposed. I think I may still update my keys tho!:) -
@neelmehta@lsmith still, banks and other likely targets should definitely revoke their certificates and create new ones... -
@neelmehta Any details? -
-
@neelmehta @ex509 source? -
@VolkerMos Are you serious? You are talking to one of the discoverers of the vulnerability. (cc@neelmehta @ex509)
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Neel Mehta
Tomas Rzepka
Mako
Ben Grubb
Manish Jethani
Michael Calkins
Sean Cassidy
Robert McMillan
Paulo Barreto
Root Labs
Andreas
Chris Woodfield
andreasdotorg
Greg Slepak
Attila Bukor
◐ Benedict
Diti