• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Patching/Upgrading OpenSSL

Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
150 Posts 50 Posters 73.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    casper4242
    last edited by Apr 9, 2014, 8:38 AM Apr 9, 2014, 8:04 AM

    moderator edit: don't do this, see the 2.1.2 link below.

    1 Reply Last reply Reply Quote 0
    • J
      jsheed_sa
      last edited by Apr 9, 2014, 8:26 AM

      @dgcom:

      @doktornotor:

      You know, this requires a full new release… It's not a matter of compiling/packaging one package and typing one command in a package manager, unlike those other reputable projects.

      Yes, I know. But I haven't heard that it is being worked on yet… And pfsense.org site is still vulnerable, so someone can exploit and put a rogue download mirror... :(

      There is also a package to apply custom system patches - may be that can be used in interim to update openssl?

      And not having mechanism for quickly applying such security fixes is not really good approach to a security application, you know...

      Forgive my ignorance, but why could a user not simply grab the new OpenSSL version, from FreeBSD and compile?

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by Apr 9, 2014, 8:29 AM

        @jsheed_sa:

        Forgive my ignorance, but why could a user not simply grab the new OpenSSL version, from FreeBSD and compile?

        I'd suggest reading the entire thread since it's already answered.

        1 Reply Last reply Reply Quote 0
        • C
          cmb
          last edited by Apr 9, 2014, 9:05 AM Apr 9, 2014, 8:36 AM

          edit: scratch that. Another security fix was made earlier that the first build of 2.1.2 just missed. It's rebuilding.

          1 Reply Last reply Reply Quote 0
          • J
            jsheed_sa
            last edited by Apr 9, 2014, 8:49 AM

            @cmb:

            @dgcom:

            Any plans to get such patches easier in the future? As much as I like to hope, but I do not think this is the last one :(

            It depends on the issue. This one's difficult because it requires recompiling a slew of PBIs, which is very time consuming, and building an entire release. If it were as simple as "here's a file, copy this and you're fixed", we would have provided that file 24 hours ago. It's also not something that's exploitable in the common uses of the system and where people are using reasonable security practices. Spend a lot more time looking at your web servers, mail servers, etc. right now, and follow my recommendations in the post above.

            Forgive my ignorance, but why could a user not simply grab the new OpenSSL version, from FreeBSD and compile?

            1 Reply Last reply Reply Quote 0
            • C
              casper4242
              last edited by Apr 9, 2014, 10:20 AM

              @jsheed_sa:

              @cmb:

              @dgcom:

              Any plans to get such patches easier in the future? As much as I like to hope, but I do not think this is the last one :(

              It depends on the issue. This one's difficult because it requires recompiling a slew of PBIs, which is very time consuming, and building an entire release. If it were as simple as "here's a file, copy this and you're fixed", we would have provided that file 24 hours ago. It's also not something that's exploitable in the common uses of the system and where people are using reasonable security practices. Spend a lot more time looking at your web servers, mail servers, etc. right now, and follow my recommendations in the post above.

              Forgive my ignorance, but why could a user not simply grab the new OpenSSL version, from FreeBSD and compile?

              Yes he could and did… but he apparently did something really bad according to this thread (still, his firewalls seem to be working fine with this approach, perhaps
              because he doesn't use pbi packages on them).

              1 Reply Last reply Reply Quote 0
              • F
                fragged
                last edited by Apr 9, 2014, 10:39 AM

                Packages on pfSense are in pbi-packages since 2.1 which means that each package that uses OpenSSL or other dependencies will have their own copy of the binaries. So if you have stunnel, squid or other packages that also use OpenSSL, the package pbi-package will have to be recompiled.

                1 Reply Last reply Reply Quote 0
                • H
                  Hobby-Student
                  last edited by Apr 9, 2014, 10:50 AM

                  @developers: Thanks for working that fast on this problem.

                  1 Reply Last reply Reply Quote 0
                  • I
                    ingmthompson
                    last edited by Apr 9, 2014, 2:12 PM

                    Are there going to be updated 2.2 snapshots released to address this issue?

                    1 Reply Last reply Reply Quote 0
                    • S
                      stephenw10 Netgate Administrator
                      last edited by Apr 9, 2014, 3:38 PM

                      Of course. Obviously it's a lower priority for the dev team.
                      It's less of an issue because no-body is using 2.2 for anything other than internal experimentation are they?  ;)

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • K
                        keychain
                        last edited by Apr 9, 2014, 3:44 PM

                        It's less of an issue because no-body is using 2.2 for anything other than internal experimentation are they?  ;)

                        And I thought it's exactly that what gets you the "Hero"-Membership…

                        1 Reply Last reply Reply Quote 0
                        • I
                          ingmthompson
                          last edited by Apr 9, 2014, 3:58 PM Apr 9, 2014, 3:56 PM

                          @stephenw10:

                          It's less of an issue because no-body is using 2.2 for anything other than internal experimentation are they?  ;)

                          I use it in production because I like to take life to the extreme.

                          I'm actually just a simple home user, but this bug is still somewhat concerning to me. I've disabled WAN WebConfigurator access for the time being, just to be safe.

                          1 Reply Last reply Reply Quote 0
                          • S
                            stephenw10 Netgate Administrator
                            last edited by Apr 9, 2014, 3:58 PM

                            Hardcore!  :P

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • J
                              jasonlitka
                              last edited by Apr 9, 2014, 4:59 PM

                              @ingenieurmt:

                              I'm actually just a simple home user, but this bug is still somewhat concerning to me. I've disabled WAN WebConfigurator access for the time being, just to be safe.

                              Why would you have that enabled in the first place?

                              I can break anything.

                              1 Reply Last reply Reply Quote 0
                              • F
                                fragged
                                last edited by Apr 9, 2014, 5:29 PM

                                You should never ever ever ever ever expose the configuration to internet. Use VPN or SSH to access a machine inside your network and access the configuration from within your network.

                                1 Reply Last reply Reply Quote 0
                                • D
                                  dgcom
                                  last edited by Apr 9, 2014, 5:53 PM

                                  @fragged:

                                  You should never ever ever ever ever expose the configuration to internet. Use VPN or SSH to access a machine inside your network and access the configuration from within your network.

                                  Properly protected web UI (good password, custom port + SSL) is no worse than VPN or SSH.

                                  DG

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    jimp Rebel Alliance Developer Netgate
                                    last edited by Apr 9, 2014, 6:02 PM

                                    @dgcom:

                                    @fragged:

                                    You should never ever ever ever ever expose the configuration to internet. Use VPN or SSH to access a machine inside your network and access the configuration from within your network.

                                    Properly protected web UI (good password, custom port + SSL) is no worse than VPN or SSH.

                                    Except in this case where your SSL could have been spewing confidential data all over… :-)

                                    VPN or SSH is best. Letting anyone even touch your GUI port remotely from an arbitrary IP is a bad thing. As this proves, it's not about a password, it's about exploiting the service itself. Custom ports won't hide you for long.

                                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                    Need help fast? Netgate Global Support!

                                    Do not Chat/PM for help!

                                    1 Reply Last reply Reply Quote 0
                                    • J
                                      jimp Rebel Alliance Developer Netgate
                                      last edited by Apr 9, 2014, 6:04 PM

                                      @jsheed_sa:

                                      Forgive my ignorance, but why could a user not simply grab the new OpenSSL version, from FreeBSD and compile?

                                      I ran some tests doing just that (build openssl package, then pkg_add the package) and the results were OK but I did not perform extensive testing. It did at least stop the GUI from exposing data via Heartbleed. It may have been OK in general even. I'd say it's sufficient as a stopgap but it's not better than a full firmware update where other programs have also been updated.

                                      Don't forget there is also the ECDSA flaw in OpenSSL that was patched in the base system OpenSSL too.

                                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                      Need help fast? Netgate Global Support!

                                      Do not Chat/PM for help!

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        dgcom
                                        last edited by Apr 9, 2014, 6:12 PM

                                        @jimp:

                                        VPN or SSH is best. Letting anyone even touch your GUI port remotely from an arbitrary IP is a bad thing. As this proves, it's not about a password, it's about exploiting the service itself. Custom ports won't hide you for long.

                                        Are you saying VPN or SSH never had any security issues? Don't think so. VPN is also not convenient - does not work from many locations. SSH is better, but theoretically can be exploited as well - with the bug you do not know about (yet).

                                        What is really missing for Web UI is the IP lockout if someone tries to brute force password.

                                        DG

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          doktornotor Banned
                                          last edited by Apr 9, 2014, 6:17 PM

                                          @dgcom:

                                          What is really missing for Web UI is the IP lockout if someone tries to brute force password.

                                          That actually is NOT missing at all… you are welcome to try and lock yourself out. :P

                                          1 Reply Last reply Reply Quote 0
                                          51 out of 150
                                          • First post
                                            51/150
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received