Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    More OpenSSL vulnerabilities

    Scheduled Pinned Locked Moved General pfSense Questions
    19 Posts 12 Posters 5.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      It's not Heartbleed by a long shot.

      There will be a 2.1.4 coming, but we're not rushing it out like we did with Heartbleed. ETA mid next-week.

      Here is a snippet from the security announcement we're still drafting:

      OpenSSL accepts ChangeCipherSpec (CCS) inappropriately during a handshake which
      permits a Man-in-the-Middle attack leading to possible data disclosure by
      enabling decryption of SSL traffic[2][3]. The attack requires several conditions
      to be met, which drastically reduce its potential for exploitation. The required
      criteria for exploitation are:

      • A vulnerable server, such as the pfSense GUI or OpenVPN server.
      • A vulnerable client, such as a browser or OpenVPN client.
      • A position of power between the client and server where packets may be
        ย  intercepted and inserted. (e.g. untrusted wifi hotspot)

      Further reducing the potential for exploitation are the following mitigating
      factors:

      • Most browsers are not vulnerable as they do not use OpenSSL (Chrome for Android
        ย  being a notable exception[4].)
      • OpenVPN is only vulnerable in SSL/TLS mode WITHOUT a TLS Authentication key.

      In short: In the meantime, make sure your OpenVPN clients get updated (we already updated the export package with new Windows binaries, 2.3.4-I002) and it's not much of an issue. If your OpenVPN SSL/TLS servers already use a TLS auth key, you have little to worry about.

      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • H
        hootenanny
        last edited by

        @jimp:

        There will be a 2.1.4 coming, but we're not rushing it out like we did with Heartbleed. ETA mid next-week.

        Hi jimp,

        I run an OpenVPN client from my pfsense box. In the meantime is it possible to update OpenSSL to 0.9.8za without adversely affecting the base system?

        Cheers,

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Previous advice immediately after Heartbleed broke was not to do that, there's a good chance you'll break something.
          @cmb:

          Don't try to patch or upgrade OpenSSL, you'll more than likely just break things. Each PBI has its own copy, plus the base system.

          Steve

          1 Reply Last reply Reply Quote 0
          • R
            Reiner030
            last edited by

            @jimp:

            It's not Heartbleed by a long shot.

            There will be a 2.1.4 coming, but we're not rushing it out like we did with Heartbleed. ETA mid next-week.

            It seems that OpenSSL in 2.0.x is also vulnerable to this bug. Is there then also a 2.0.4 security update available?

            Bests

            1 Reply Last reply Reply Quote 0
            • K
              kpa
              last edited by

              @Reiner030:

              @jimp:

              It's not Heartbleed by a long shot.

              There will be a 2.1.4 coming, but we're not rushing it out like we did with Heartbleed. ETA mid next-week.

              It seems that OpenSSL in 2.0.x is also vulnerable to this bug. Is there then also a 2.0.4 security update available?

              Bests

              I wouldn't hold my breath, the 2.0.x versions are marked as "deprecated" on the release information page. There was nothing done on them to fix the heartbleed vulnerability as far as I know.

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                No, there will not be a 2.0.x release, that line is no longer supported.

                Don't replace the OpenSSL in base yourself.

                Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  @kpa:

                  There was nothing done on them to fix the heartbleed vulnerability as far as I know.

                  The 2.0.X versions were not vulnerable to Heartbleed, but they may be vulnerable to whole host of other things.ย  ;)

                  Steve

                  1 Reply Last reply Reply Quote 0
                  • H
                    hootenanny
                    last edited by

                    @jimp:

                    There will be a 2.1.4 coming, but we're not rushing it out like we did with Heartbleed. ETA mid next-week.

                    Any idea when we can expect to see 2.1.4 release?

                    Cheers,

                    1 Reply Last reply Reply Quote 0
                    • H
                      Harvy66
                      last edited by

                      @hootenanny:

                      @jimp:

                      There will be a 2.1.4 coming, but we're not rushing it out like we did with Heartbleed. ETA mid next-week.

                      Any idea when we can expect to see 2.1.4 release?

                      Cheers,

                      "ETA mid next-week."?

                      1 Reply Last reply Reply Quote 0
                      • H
                        hootenanny
                        last edited by

                        @Harvy66:

                        "ETA mid next-week."?

                        Just asking as that was last week, in the meantime I still can't use OpenVPN because of the vuln.

                        1 Reply Last reply Reply Quote 0
                        • jimpJ
                          jimp Rebel Alliance Developer Netgate
                          last edited by

                          Hit a couple snags but it's still coming soon.

                          You can use OpenVPN if you use a TLS auth key. Also if you update your clients, it's fine. Please read all of the text I quoted earlier in the thread.

                          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.