Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Patching/Upgrading OpenSSL

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    150 Posts 50 Posters 77.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      joako
      last edited by

      @fragged:

      Use VPN

      OpenVPN is vulnerable too.

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        @joako:

        @fragged:

        Use VPN

        OpenVPN is vulnerable too.

        Only if used in SSL/TLS mode without a TLS authentication key. The way the wizard sets it up for a simple RA VPN for management use it would not be vulnerable.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • I
          ingmthompson
          last edited by

          @stephenw10:

          It's not really a question of your network being uninteresting. It's far more likely to be some bot that grabs your login details and turns your router into a spam relay. The bot doesn't care how interesting your network is.

          I grant you, this is possible. That said, there have to be hundreds of thousands of other home networks just on my ISP alone, notwithstanding the dozen or so other ISPs in this country. Any one of them would make a perfectly tempting target for such a bot (even more so given the fact that most home routers are virtually never updated). I'd also like to take this opportunity to point out that there's only so much that one can do with 2Mbps upstream.

          Like any risk assessment you have to consider both the chances of something happening and the consequences. If the potential consequence is that your firewall is compromised leading to your internal machines being compromised requiring complete re-install of everything - is that a risk worth taking?

          For that, someone would have to not only get through the firewall but through the internal machines too, which are not exactly unprotected themselves.

          All said, you've made your case, and while I stand by my original point that my network is simply not interesting enough to warrant targeting, I'm going to take a look at the feasibility of setting up a basic VPN solution in pfSense to handle remote support requirements.

          1 Reply Last reply Reply Quote 0
          • ?
            A Former User
            last edited by

            @ingenieurmt:

            my network is simply not interesting enough to warrant targeting,

            No Offend, but this Attitude makes you a prime Target. People believeing they are save cause they are not interresting enough.

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              Everyone is interesting to an indiscriminate bot scanning for hosts to exploit.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • P
                pvoigt
                last edited by

                @jimp:

                @joako:

                @fragged:

                Use VPN

                OpenVPN is vulnerable too.

                Only if used in SSL/TLS mode without a TLS authentication key. The way the wizard sets it up for a simple RA VPN for management use it would not be vulnerable.

                Yeah, that's good news. When I have once manually set up my OpenVPN server without the wizard I did not exactly understand what this setting would achieve but considered it safe. I have just found your statement confirmed in the OpenVPN community:

                https://community.openvpn.net/openvpn/wiki/heartbleed

                Peter

                1 Reply Last reply Reply Quote 0
                • F
                  fatsailor
                  last edited by

                  So there are two versions of openssl in pfsense:

                  /usr/bin/openssl - OpenSSL 0.9.8y 5 Feb 2013 which is the base system openssl

                  and

                  /usr/local/bin/openssl - OpenSSL 1.0.1e 11 Feb 2013 which presumably was installed via the ports system to get a more recent version because of dependencies

                  A simple freebsd-update fetch; freebsd-update install will take care of the first version of openssl.

                  The second version (/usr/local/bin/openssl) will need to be compiled on a 8.3-p11 system via ports to get 1.0.1g. openvpn 2.3.2 needs to be rebuilt from ports along with lighttpd 1.4.32. Move all of this over then while in single user mode.

                  Not terribly difficult, but time consuming - but doable if you need a fix ASAP.

                  NOTE: There may be other dependencies on openssl that I've missed. lighttpd and openvpn are the obvious ones.

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    freebsd-update won't work on pfSense, and would break things if it did. At least for now. Might change in the future.

                    OpenVPN and lighttpd don't need rebuilt, they are not statically linked to OpenSSL.

                    Just wait for a firmware update, it'll be coming soon.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • I
                      ingmthompson
                      last edited by

                      @Satras:

                      @ingenieurmt:

                      my network is simply not interesting enough to warrant targeting,

                      No Offend, but this Attitude makes you a prime Target. People believeing they are save cause they are not interresting enough.

                      I'd prefer to keep my own counsel on what my attitude may or may not constitute, if you don't mind.

                      1 Reply Last reply Reply Quote 0
                      • K
                        keychain
                        last edited by

                        hm.. should I stay up for an hour more or two?

                        1 Reply Last reply Reply Quote 0
                        • D
                          doktornotor Banned
                          last edited by

                          1 Reply Last reply Reply Quote 0
                          • BBcan177B
                            BBcan177 Moderator
                            last edited by

                            Snort has released some rules to help detect this vulnerability. If they work?

                            Just an FYI

                            http://vrt-blog.snort.org/2014/04/heartbleed-memory-disclosure-upgrade.html

                            "Experience is something you don't get until just after you need it."

                            Website: http://pfBlockerNG.com
                            Twitter: @BBcan177  #pfBlockerNG
                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                            1 Reply Last reply Reply Quote 0
                            • F
                              fragged
                              last edited by

                              Requires a Snort subscription of course to get the rule now, not after 30 days when it hits the free rules set.

                              Reading the article, it seems like the actual rules are released in the post also :)

                              1 Reply Last reply Reply Quote 0
                              • BBcan177B
                                BBcan177 Moderator
                                last edited by

                                The rules are listed on their website.

                                Copy and paste them into the local rules…  ;)

                                I'm sure that's why they posted them like that. I have a paid subscription so its already in my ruleset.

                                "Experience is something you don't get until just after you need it."

                                Website: http://pfBlockerNG.com
                                Twitter: @BBcan177  #pfBlockerNG
                                Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                1 Reply Last reply Reply Quote 0
                                • D
                                  dgcom
                                  last edited by

                                  Have you tested it? Not working for me. Its like snort ignoring custom rules… :(

                                  DG

                                  1 Reply Last reply Reply Quote 0
                                  • K
                                    karlfife
                                    last edited by

                                    Is the server side (listener side) of site-to-site OpenVPN configured with a pre-shared key vulnerable to the heartbleed exploit?  I don't know if the PSK is functionally similar to a TLS authentication key.

                                    The good news is that most (not all) of our server listener ports have a WAN rule restricting connections to those ports to static IPv4 addresses.  The bad news is the 'not all' part.

                                    Questions:
                                    1. Are IP-agnostic site-to-site OpenVPN listeners (configured with PSK) vulnerable to heartbleed?
                                    2. If the answer to #1 is "yes, vulnerable", and if the aforementioned unrestricted listeners are configured to be limited to ONE connection, and if the connection has been nailed up the entire time, would that prevent a drive-by from exploiting the vulnerability? 
                                    3. If the answer to #1 is "yes, vulnerable" and the answer to #2 is 'No, vulnerable', is the post-update remedy to simply re-key the vulnerable server and client?  In other words would the SINGLE vulnerable server listener expose ALL of the PSK's bound to ALL of the server instances, or just the one? (simplifying re-keying)

                                    Thanks in advance for the rapid response to the vulnerability!

                                    1 Reply Last reply Reply Quote 0
                                    • BBcan177B
                                      BBcan177 Moderator
                                      last edited by

                                      @dgcom:

                                      Have you tested it? Not working for me. Its like snort ignoring custom rules… :(

                                      I compared the rules and they are the same on the blog as in the posted VRT ruleset.

                                      In Snort:WAN Rules:custom.rules

                                      Did you upgrade to the latest snort version? I am still on the previous release. (Not sure if that matters)

                                      As a test, I copied two of the rules and changes the rule sid (so I wouldn't have duplicates) and they saved no problem.

                                      EDIT: Maybe now is a good idea to pay the $29.00 for a Snort VRT membership?

                                      "Experience is something you don't get until just after you need it."

                                      Website: http://pfBlockerNG.com
                                      Twitter: @BBcan177  #pfBlockerNG
                                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                      1 Reply Last reply Reply Quote 0
                                      • H
                                        hans-d
                                        last edited by

                                        Tested the posted rules, and ran http://filippo.io/Heartbleed/ to test. Alert (and ip block) appeared referencing the rule…

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          dgcom
                                          last edited by

                                          (Yes, running latest snort package).

                                          For me, custom rules did not work, but they are already included for free in emerging-current_events.rules and those are catching it.

                                          DG

                                          1 Reply Last reply Reply Quote 0
                                          • jimpJ
                                            jimp Rebel Alliance Developer Netgate
                                            last edited by

                                            @karlfife:

                                            Is the server side (listener side) of site-to-site OpenVPN configured with a pre-shared key vulnerable to the heartbleed exploit?  I don't know if the PSK is functionally similar to a TLS authentication key.

                                            The good news is that most (not all) of our server listener ports have a WAN rule restricting connections to those ports to static IPv4 addresses.  The bad news is the 'not all' part.

                                            Questions:
                                            1. Are IP-agnostic site-to-site OpenVPN listeners (configured with PSK) vulnerable to heartbleed?
                                            2. If the answer to #1 is "yes, vulnerable", and if the aforementioned unrestricted listeners are configured to be limited to ONE connection, and if the connection has been nailed up the entire time, would that prevent a drive-by from exploiting the vulnerability? 
                                            3. If the answer to #1 is "yes, vulnerable" and the answer to #2 is 'No, vulnerable', is the post-update remedy to simply re-key the vulnerable server and client?  In other words would the SINGLE vulnerable server listener expose ALL of the PSK's bound to ALL of the server instances, or just the one? (simplifying re-keying)

                                            Thanks in advance for the rapid response to the vulnerability!

                                            PSK is not vulnerable. This was specific to SSL/TLS.

                                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                            Need help fast? Netgate Global Support!

                                            Do not Chat/PM for help!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.