Your SlideShare is downloading. ×
CloudStack and the HeartBleed vulnerability
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

CloudStack and the HeartBleed vulnerability

484
views

Published on

Slides from my talk about how the HeartBleed OpenSSL vulnerability affects Apache CloudStack and how to mitigate the vulnerability. From CloudStack Collaboration Conference 2014 in Denver, CO

Slides from my talk about how the HeartBleed OpenSSL vulnerability affects Apache CloudStack and how to mitigate the vulnerability. From CloudStack Collaboration Conference 2014 in Denver, CO

Published in: Technology, Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
484
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
23
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CloudStack and “HeartBleed”
  • 2. We’re here to talk about…
  • 3. What is Vulnerable • Apache CloudStack 4.2 – 4.3 • SystemVMs have vulnerable version of OpenSSL installed • In particular, SSVM is running vulnerable services
  • 4. FRIENDS DON’T LET FRIENDS USE REALHOSTIP
  • 5. Status • Apache CloudStack has issued patch instructions • We’re working on updated SystemVM templates
  • 6. How to patch • ssh to SystemVM • apt-get update • apt-get install openssl libssl1.0.0 • /etc/init.d/apache2 restart
  • 7. How to verify dpkg -l|grep ssl ii libssl1.0.0:i386 1.0.1e-2+deb7u6 i386 SSL shared libraries ii openssl 1.0.1e-2+deb7u6 i386 Secure Socket Layer (SSL) binary
  • 8. External tests • http://filippo.io/Heartbleed/ • https://gist.github.com/takeshixx/10107280 - run yourself
  • 9. Honeypot Using http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt $ sudo perl heartbleed_honeypot.pl 182.118.60.51 182.118.60.51 182.118.60.51 182.118.60.51
  • 10. Honeypot sniff
  • 11. Honeypot sniff
  • 12. Honeypot sniff
  • 13. ASF Infrastructure team: “Thank you for your patience while we have worked to sort this out. We expect to reset all LDAP passwords within the next 48 hours or so, so do not be alarmed when your password stops working.”
  • 14. kthxbye! • http://cloudstack.apache.org jlk@stratosec.co @johnlkinsella

×