Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Patching/Upgrading OpenSSL

    Problems Installing or Upgrading pfSense Software
    50
    150
    72.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      ewhac
      last edited by

      A whacking great hole in OpenSSL 1.0.1 was announced today.  Can a fixed version be installed on pfSense 2.1 and/or 2.1.1?  How is this done?

      1 Reply Last reply Reply Quote 0
      • C
        charliem
        last edited by

        You may be able to fix it by hand, but a better approach would be to roll out 2.1.2 with the fix right now, and encourage updates.

        1 Reply Last reply Reply Quote 0
        • D
          drees
          last edited by

          pfSense 2.1.1 ships with OpenSSL 0.9.8g which is not vulnerable and neither are earlier versions of pfSense, either.

          Edit: pfSense 2.1 and 2.1.1 also ship with OpenSSL 1.0.1 which is vulnerable.

          1 Reply Last reply Reply Quote 0
          • C
            charliem
            last edited by

            @drees:

            pfSense 2.1.1 ships with OpenSSL 0.9.8g which is not vulnerable and neither are earlier versions of pfSense, either.

            You have half the story right, but you need the whole story … freebsd ships with 0.9.8g, but pfsense adds 1.0.1e in /usr/local/bin and uses that version for most pfsense needs.

            So, yes, I'd say pfsense is vulnerable.

            1 Reply Last reply Reply Quote 0
            • D
              drees
              last edited by

              My apologies, you are correct. I have confirmed that both pfSense 2.1 and 2.1.1 shipped with a vulnerable version of openssl.

              1 Reply Last reply Reply Quote 0
              • P
                pfoo
                last edited by

                pfsense 2.1.1 is vulnerable (webserver for sure, openvpn, ipsec and other crypto might be using libssl also).

                1 Reply Last reply Reply Quote 0
                • A
                  adam65535
                  last edited by

                  So 2.0.3 is not vulnerable.  The new features that were advertised for that version show openssl 0.9.8y and searches for libssl turn up 'OpenSSL 0.9.8y 5 Feb 2013'.  Any chance some packages put their own version of openssl in?  I don't use many packages so I don't know.

                  https://doc.pfsense.org/index.php/2.0.3_New_Features_and_Changes

                  1 Reply Last reply Reply Quote 0
                  • M
                    maverick_slo
                    last edited by

                    2.1 and 2.1.1 ARE vulnerable.

                    1 Reply Last reply Reply Quote 0
                    • D
                      dgcom
                      last edited by

                      Large number of reputable projects already updated and fixed the issue.

                      Longer pfSense is without an update, lower reputation it will be… I think, it is unacceptable for such security-centric project not to fix the problem ASAP.

                      DG

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by

                        @dgcom:

                        Large number of reputable projects already updated and fixed the issue.

                        Longer pfSense is without an update, lower reputation it will be… I think, it is unacceptable for such security-centric project not to fix the problem ASAP.

                        You know, this requires a full new release… It's not a matter of compiling/packaging one package and typing one command in a package manager, unlike those other reputable projects.

                        1 Reply Last reply Reply Quote 0
                        • D
                          dgcom
                          last edited by

                          @doktornotor:

                          You know, this requires a full new release… It's not a matter of compiling/packaging one package and typing one command in a package manager, unlike those other reputable projects.

                          Yes, I know. But I haven't heard that it is being worked on yet… And pfsense.org site is still vulnerable, so someone can exploit and put a rogue download mirror... :(

                          There is also a package to apply custom system patches - may be that can be used in interim to update openssl?

                          And not having mechanism for quickly applying such security fixes is not really good approach to a security application, you know...

                          DG

                          1 Reply Last reply Reply Quote 0
                          • D
                            doktornotor Banned
                            last edited by

                            Nice rant. However, you should focus that rant at the openssl guys who introduced this brainfart in the first place… Additionally, reading the source code, the entire openssl thing needs a rewrite from scratch.

                            1 Reply Last reply Reply Quote 0
                            • JeGrJ
                              JeGr LAYER 8 Moderator
                              last edited by

                              "And pfsense.org site is still vulnerable, so someone can exploit and put a rogue download mirror"

                              How should that magic happen? To set up a rogue download mirror one doesn't only need to have the certificate and key to let this site seem like the legit pfsense.org domain, but you also had to inject and poison dns queries for all the hosts to actually use your new rogue download mirror. So problem with SSL aside, let's not leap to wild speculations here and throw around FUD.

                              Greets

                              Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                              If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                              1 Reply Last reply Reply Quote 0
                              • E
                                El Scorcho
                                last edited by

                                @doktornotor:

                                Nice rant. However, you should focus that rant at the openssl guys who introduced this brainfart in the first place… Additionally, reading the source code, the entire openssl thing needs a rewrite from scratch.

                                That strategy isn't helpful for fixing the product that we're here to discuss, which is still vulnerable.

                                I really like pfSense, but the response here is discouraging. This is being treated quite seriously and with high priority almost everywhere else, but here it seems the users are being lectured for even asking about a fix.

                                1 Reply Last reply Reply Quote 0
                                • D
                                  dgcom
                                  last edited by

                                  @JeGr:

                                  "And pfsense.org site is still vulnerable, so someone can exploit and put a rogue download mirror"

                                  How should that magic happen? To set up a rogue download mirror one doesn't only need to have the certificate and key to let this site seem like the legit pfsense.org domain, but you also had to inject and poison dns queries for all the hosts to actually use your new rogue download mirror. So problem with SSL aside, let's not leap to wild speculations here and throw around FUD.

                                  Greets

                                  "for all the hosts to actually use your new rogue download mirror"
                                  That doesn't have to be all the hosts, just the one you want to target.
                                  This is, of course, theoretical, however still a real security risk and I would not call this FUD - I know, similar things happen to other sites in the past.

                                  DG

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    Dregnus
                                    last edited by

                                    There is a point to lack of response, as some of us have Gold support subscriptions. Granted, $99 a year is not a lot, but since the community has confirmed both 2.1 and 2.1.1 (the release that I just received a notification about) is vulnerable, you'd think at the very least we'd have a notification urging users not to upgrade to the latest version.

                                    Furthermore, http://filippo.io/Heartbleed/ shows that the portal.pfsense.org site is vulnerable. Not that this is particularly the same as the PfSense platform, but it does have some minor things such as credit card payment information…

                                    To be fair, 66% of the Internet is broken, but you'd expect some kind of announcement on the issue by now. Luckily, I'm a fairly lazy sysadmin and all my PfSense implementations are sitting at 2.0.3 :)

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      SectorNine50
                                      last edited by

                                      Has anyone successfully patched this by hand?

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        doktornotor Banned
                                        last edited by

                                        No, of course not.@SectorNine50:

                                        Has anyone successfully patched this by hand?

                                        No. Patching by hand would require access to the t0p-s3cr3t pfSense©®™-tools  repo…

                                        1 Reply Last reply Reply Quote 0
                                        • P
                                          phil.davis
                                          last edited by

                                          Quote from JimP 1 hour ago:

                                          It's known and we're already working on it.

                                          on RedMine issue https://redmine.pfsense.org/issues/3588
                                          It would be much easier if those managing this took 1 minute to post here so people would know that the fix is being worked on. That would save all this banter in the forum.

                                          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            adam65535
                                            last edited by

                                            FYI… for those that haven't checked that bug report in the past hour... There is a reply to the redmine bug report as of around an hour ago saying it is already known and being worked on.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.