• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Patching/Upgrading OpenSSL

Problems Installing or Upgrading pfSense Software
50
150
72.6k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    doktornotor Banned
    last edited by Apr 8, 2014, 2:43 PM

    Nice rant. However, you should focus that rant at the openssl guys who introduced this brainfart in the first place… Additionally, reading the source code, the entire openssl thing needs a rewrite from scratch.

    1 Reply Last reply Reply Quote 0
    • J
      JeGr LAYER 8 Moderator
      last edited by Apr 8, 2014, 2:47 PM

      "And pfsense.org site is still vulnerable, so someone can exploit and put a rogue download mirror"

      How should that magic happen? To set up a rogue download mirror one doesn't only need to have the certificate and key to let this site seem like the legit pfsense.org domain, but you also had to inject and poison dns queries for all the hosts to actually use your new rogue download mirror. So problem with SSL aside, let's not leap to wild speculations here and throw around FUD.

      Greets

      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

      1 Reply Last reply Reply Quote 0
      • E
        El Scorcho
        last edited by Apr 8, 2014, 2:55 PM

        @doktornotor:

        Nice rant. However, you should focus that rant at the openssl guys who introduced this brainfart in the first place… Additionally, reading the source code, the entire openssl thing needs a rewrite from scratch.

        That strategy isn't helpful for fixing the product that we're here to discuss, which is still vulnerable.

        I really like pfSense, but the response here is discouraging. This is being treated quite seriously and with high priority almost everywhere else, but here it seems the users are being lectured for even asking about a fix.

        1 Reply Last reply Reply Quote 0
        • D
          dgcom
          last edited by Apr 8, 2014, 2:55 PM

          @JeGr:

          "And pfsense.org site is still vulnerable, so someone can exploit and put a rogue download mirror"

          How should that magic happen? To set up a rogue download mirror one doesn't only need to have the certificate and key to let this site seem like the legit pfsense.org domain, but you also had to inject and poison dns queries for all the hosts to actually use your new rogue download mirror. So problem with SSL aside, let's not leap to wild speculations here and throw around FUD.

          Greets

          "for all the hosts to actually use your new rogue download mirror"
          That doesn't have to be all the hosts, just the one you want to target.
          This is, of course, theoretical, however still a real security risk and I would not call this FUD - I know, similar things happen to other sites in the past.

          DG

          1 Reply Last reply Reply Quote 0
          • D
            Dregnus
            last edited by Apr 8, 2014, 3:55 PM

            There is a point to lack of response, as some of us have Gold support subscriptions. Granted, $99 a year is not a lot, but since the community has confirmed both 2.1 and 2.1.1 (the release that I just received a notification about) is vulnerable, you'd think at the very least we'd have a notification urging users not to upgrade to the latest version.

            Furthermore, http://filippo.io/Heartbleed/ shows that the portal.pfsense.org site is vulnerable. Not that this is particularly the same as the PfSense platform, but it does have some minor things such as credit card payment information…

            To be fair, 66% of the Internet is broken, but you'd expect some kind of announcement on the issue by now. Luckily, I'm a fairly lazy sysadmin and all my PfSense implementations are sitting at 2.0.3 :)

            1 Reply Last reply Reply Quote 0
            • S
              SectorNine50
              last edited by Apr 8, 2014, 4:38 PM

              Has anyone successfully patched this by hand?

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by Apr 8, 2014, 4:46 PM

                No, of course not.@SectorNine50:

                Has anyone successfully patched this by hand?

                No. Patching by hand would require access to the t0p-s3cr3t pfSense©®™-tools  repo…

                1 Reply Last reply Reply Quote 0
                • P
                  phil.davis
                  last edited by Apr 8, 2014, 4:49 PM

                  Quote from JimP 1 hour ago:

                  It's known and we're already working on it.

                  on RedMine issue https://redmine.pfsense.org/issues/3588
                  It would be much easier if those managing this took 1 minute to post here so people would know that the fix is being worked on. That would save all this banter in the forum.

                  As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                  If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                  1 Reply Last reply Reply Quote 0
                  • A
                    adam65535
                    last edited by Apr 8, 2014, 4:57 PM

                    FYI… for those that haven't checked that bug report in the past hour... There is a reply to the redmine bug report as of around an hour ago saying it is already known and being worked on.

                    1 Reply Last reply Reply Quote 0
                    • E
                      El Scorcho
                      last edited by Apr 8, 2014, 5:01 PM

                      Thanks for letting the rest of us know!

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by Apr 8, 2014, 5:11 PM

                        This looks like a huge heap of shit hitting the fan, BTW… Yahoo or Lastpass.com users might want to read these:

                        • https://twitter.com/markloman/status/453502888447586304
                        • https://twitter.com/markloman/status/453504687934017536
                        1 Reply Last reply Reply Quote 0
                        • P
                          phil.davis
                          last edited by Apr 8, 2014, 5:31 PM

                          And this GitHub commit to mark 2.1.2-RELEASE shows that a new set of images is about to be built:
                          https://github.com/pfsense/pfsense/commit/def5d042c9c51874e662a1175e94ce948224f2a7

                          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                          1 Reply Last reply Reply Quote 0
                          • D
                            Darkk
                            last edited by Apr 9, 2014, 5:49 AM

                            @phil.davis:

                            And this GitHub commit to mark 2.1.2-RELEASE shows that a new set of images is about to be built:
                            https://github.com/pfsense/pfsense/commit/def5d042c9c51874e662a1175e94ce948224f2a7

                            Sweet!!

                            I just got done manually patching a OpenVPN server.  What a mess.  This isn't PfSense's fault.

                            1 Reply Last reply Reply Quote 0
                            • C
                              cmb
                              last edited by Apr 9, 2014, 6:02 AM

                              2.1.2 release is almost finished building. The PBI build run is in-progress, but takes quite a while. We had to restart it a couple times, taking longer. I'll post the location of 2.1.2 release before it's official and posted to the mirrors, just after I do basic testing. I'm cloning a package builder to another server in hopes I can get that building faster as it's going to take possibly another 12 hours to finish the PBI package run at its current rate and it's been running for around 7 hours now.

                              Don't try to patch or upgrade OpenSSL, you'll more than likely just break things. Each PBI has its own copy, plus the base system.

                              In the mean time:

                              1. Don't open your web interface to the entire Internet. That's the bulk of the risk here.
                              2. if you're using OpenVPN without "TLS Authentication" enabled, you might want to close that off from the Internet. I haven't seen a proof of concept against OpenVPN, but in theory minus TLS auth it's probably vulnerable. The default settings we use aren't vulnerable.
                              3. there are a variety of other packages that depend on OpenSSL, but generally not ones that listen in a fashion that's exploitable in the way HTTPS is.
                              1 Reply Last reply Reply Quote 0
                              • D
                                dgcom
                                last edited by Apr 9, 2014, 6:24 AM

                                @cmb:

                                2.1.2 release is almost finished building. The PBI build run is in-progress, but takes quite a while.

                                This is great news, thanks for the effort to get it out quickly.

                                @cmb:

                                Don't try to patch or upgrade OpenSSL, you'll more than likely just break things. Each PBI has its own copy, plus the base system.

                                Any plans to get such patches easier in the future? As much as I like to hope, but I do not think this is the last one :(

                                DG

                                1 Reply Last reply Reply Quote 0
                                • D
                                  Darkk
                                  last edited by Apr 9, 2014, 6:46 AM

                                  @dgcom:

                                  @cmb:

                                  2.1.2 release is almost finished building. The PBI build run is in-progress, but takes quite a while.

                                  This is great news, thanks for the effort to get it out quickly.

                                  @cmb:

                                  Don't try to patch or upgrade OpenSSL, you'll more than likely just break things. Each PBI has its own copy, plus the base system.

                                  Any plans to get such patches easier in the future? As much as I like to hope, but I do not think this is the last one :(

                                  Well, this is a BIG one as it ties into alot of the inner workings so I don't blame them for having to entirely rebuild the whole thing to ensure every piece are updated.  Hang in there.

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    cmb
                                    last edited by Apr 9, 2014, 6:51 AM

                                    @El:

                                    I really like pfSense, but the response here is discouraging. This is being treated quite seriously and with high priority almost everywhere else, but here it seems the users are being lectured for even asking about a fix.

                                    There's nothing to think it's not high priority here. We have easily upwards of 30 man hours into this at this point. Our job here isn't nearly as simple as OSes for instance, who can throw out a minor update rather easily and not have to rebuild a slew of stuff. We've been working continually on this since it was publicly known.

                                    It appears we'll beat every other similar-scoped open source distribution, and probably nearly all similar commercial appliances, in issuing fixes. There are already several updated PBIs uploaded with the patched openssl.

                                    1 Reply Last reply Reply Quote 0
                                    • C
                                      cmb
                                      last edited by Apr 9, 2014, 6:54 AM

                                      @dgcom:

                                      Any plans to get such patches easier in the future? As much as I like to hope, but I do not think this is the last one :(

                                      It depends on the issue. This one's difficult because it requires recompiling a slew of PBIs, which is very time consuming, and building an entire release. If it were as simple as "here's a file, copy this and you're fixed", we would have provided that file 24 hours ago. It's also not something that's exploitable in the common uses of the system and where people are using reasonable security practices. Spend a lot more time looking at your web servers, mail servers, etc. right now, and follow my recommendations in the post above.

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        dgcom
                                        last edited by Apr 9, 2014, 7:14 AM

                                        @cmb:

                                        @dgcom:

                                        Any plans to get such patches easier in the future? As much as I like to hope, but I do not think this is the last one :(

                                        It depends on the issue. This one's difficult because it requires recompiling a slew of PBIs, which is very time consuming, and building an entire release. If it were as simple as "here's a file, copy this and you're fixed", we would have provided that file 24 hours ago. It's also not something that's exploitable in the common uses of the system and where people are using reasonable security practices. Spend a lot more time looking at your web servers, mail servers, etc. right now, and follow my recommendations in the post above.

                                        I perfectly understand implications of this particular issue, and yes - it is not just a matter of replacing openssl executable… What I am saying is that recompiling everything is not very efficient. But, I guess, you know your product :)

                                        As for "not something that's exploitable in the common uses" - my major concern is web UI, which I would think is exposed often for remote management and packages like stunnel, HAProxy, Squid... Whatever deals with SSL frontend in any way - shouldn't build system be smart enough to recompile only if dependencies changed?

                                        I, personally, do not run anything, based on recent versions of openssl - except pfSense.

                                        DG

                                        1 Reply Last reply Reply Quote 0
                                        • J
                                          JeGr LAYER 8 Moderator
                                          last edited by Apr 9, 2014, 7:17 AM

                                          @cmb:

                                          It appears we'll beat every other similar-scoped open source distribution, and probably nearly all similar commercial appliances, in issuing fixes. There are already several updated PBIs uploaded with the patched openssl.

                                          And you are right with that. We just openend a case with Juniper about the SSL Issue and besides transferring ownerships of the ticket and "assuring us, it is already worked on and they are hard at work" nothing happened. So yes, it perhaps would have been nice to post a short statement here (or the forums generally) but the bug tracker showed, they were working on it. That's more than I can say about Juniper and others. ;)

                                          Thanks and kudos to the team.

                                          Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                                          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                                          1 Reply Last reply Reply Quote 0
                                          21 out of 150
                                          • First post
                                            21/150
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.