CloudStack and the HeartBleed vulnerability

  • 379 views
Uploaded on

Slides from my talk about how the HeartBleed OpenSSL vulnerability affects Apache CloudStack and how to mitigate the vulnerability. From CloudStack Collaboration Conference 2014 in Denver, CO

Slides from my talk about how the HeartBleed OpenSSL vulnerability affects Apache CloudStack and how to mitigate the vulnerability. From CloudStack Collaboration Conference 2014 in Denver, CO

More in: Technology , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
379
On Slideshare
0
From Embeds
0
Number of Embeds
3

Actions

Shares
Downloads
20
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. CloudStack and “HeartBleed”
  • 2. We’re here to talk about…
  • 3. What is Vulnerable • Apache CloudStack 4.2 – 4.3 • SystemVMs have vulnerable version of OpenSSL installed • In particular, SSVM is running vulnerable services
  • 4. FRIENDS DON’T LET FRIENDS USE REALHOSTIP
  • 5. Status • Apache CloudStack has issued patch instructions • We’re working on updated SystemVM templates
  • 6. How to patch • ssh to SystemVM • apt-get update • apt-get install openssl libssl1.0.0 • /etc/init.d/apache2 restart
  • 7. How to verify dpkg -l|grep ssl ii libssl1.0.0:i386 1.0.1e-2+deb7u6 i386 SSL shared libraries ii openssl 1.0.1e-2+deb7u6 i386 Secure Socket Layer (SSL) binary
  • 8. External tests • http://filippo.io/Heartbleed/ • https://gist.github.com/takeshixx/10107280 - run yourself
  • 9. Honeypot Using http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt $ sudo perl heartbleed_honeypot.pl 182.118.60.51 182.118.60.51 182.118.60.51 182.118.60.51
  • 10. Honeypot sniff
  • 11. Honeypot sniff
  • 12. Honeypot sniff
  • 13. ASF Infrastructure team: “Thank you for your patience while we have worked to sort this out. We expect to reset all LDAP passwords within the next 48 hours or so, so do not be alarmed when your password stops working.”
  • 14. kthxbye! • http://cloudstack.apache.org jlk@stratosec.co @johnlkinsella