skip to main content
10.1145/2663716.2663755acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article
Open Access

The Matter of Heartbleed

Authors Info & Claims
Published:05 November 2014Publication History

ABSTRACT

The Heartbleed vulnerability took the Internet by surprise in April 2014. The vulnerability, one of the most consequential since the advent of the commercial Internet, allowed attackers to remotely read protected memory from an estimated 24--55% of popular HTTPS sites. In this work, we perform a comprehensive, measurement-based analysis of the vulnerability's impact, including (1) tracking the vulnerable population, (2) monitoring patching behavior over time, (3) assessing the impact on the HTTPS certificate ecosystem, and (4) exposing real attacks that attempted to exploit the bug. Furthermore, we conduct a large-scale vulnerability notification experiment involving 150,000 hosts and observe a nearly 50% increase in patching by notified hosts. Drawing upon these analyses, we discuss what went well and what went poorly, in an effort to understand how the technical community can respond more effectively to such events in the future.

References

  1. Alexa Top 1,000,000 Sites. http://s3.amazonaws.com/alexa-static/top-1m.csv.zip.Google ScholarGoogle Scholar
  2. Bitcoin Core Version History. https://bitcoin.org/en/version-history.Google ScholarGoogle Scholar
  3. Installing OpenDKIM. http://www.opendkim.org/INSTALL.Google ScholarGoogle Scholar
  4. Telnet Server with SSL Encryption Support. https://packages.debian.org/stable/net/telnetd-ssl.Google ScholarGoogle Scholar
  5. Install Ejabberd, Oct. 2004. http://www.ejabberd.im/tuto-install-ejabberd.Google ScholarGoogle Scholar
  6. Cassandra Wiki - Internode Encryption, Nov. 2013. http://wiki.apache.org/cassandra/InternodeEncryption.Google ScholarGoogle Scholar
  7. Android Platform Versions, Apr. 2014. https://developer.android.com/about/dashboards/index.html#Platform.Google ScholarGoogle Scholar
  8. Apple Says iOS, OSX and "Key Web Services" Not Affected by Heartbleed Security Flaw, Apr. 2014. http://recode.net/2014/04/10/apple-says-ios-osx-and-key-web-services-not-affected-by-heartbleed-security-flaw/.Google ScholarGoogle Scholar
  9. Heartbleed F.A.Q., 2014. https://www.startssl.com/?app=43.Google ScholarGoogle Scholar
  10. The Heartbleed Hit List: The Passwords You Need to Change Right Now, Apr. 2014. http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/.Google ScholarGoogle Scholar
  11. HP Support Document c04249852, May 2014. http://goo.gl/AcUG8I.Google ScholarGoogle Scholar
  12. Is Openfire Affected by Heartbleed?, Apr. 2014. https://community.igniterealtime.org/thread/52272.Google ScholarGoogle Scholar
  13. June 2014 Web Server Survey, 2014. http://news.netcraft.com/archives/2014/06/06/june-2014-web-server-survey.html.Google ScholarGoogle Scholar
  14. NGINX and the Heartbleed Vulnerability, Apr. 2014. http://nginx.com/blog/nginx-and-the-heartbleed-vulnerability/.Google ScholarGoogle Scholar
  15. Official BTCJam Update, Apr. 2014. http://blog.btcjam.com/post/82158642922/official-btcjam-update.Google ScholarGoogle Scholar
  16. SSL Pulse, Apr. 2014. https://www.trustworthyinternet.org/ssl-pulse/.Google ScholarGoogle Scholar
  17. Tomcat Heartbleed, Apr. 2014. https://wiki.apache.org/tomcat/Security/Heartbleed.Google ScholarGoogle Scholar
  18. Wikimedia's Response to the "Heartbleed" Security Vulnerability, Apr. 2014. https://blog.wikimedia.org/2014/04/10/wikimedias-response-to-the-heartbleed-security-vulnerability/.Google ScholarGoogle Scholar
  19. Adobe. Heartbleed Update, Apr. 2014. http://blogs.adobe.com/psirt/?p=1085.Google ScholarGoogle Scholar
  20. M. Al-Bassam. Top Alexa 10,000 Heartbleed Scan-April 14, 2014. https://github.com/musalbas/heartbleed-masstest/blob/94cd9b6426311f0d20539e696496ed3d7bdd2a94/top1000.txt.Google ScholarGoogle Scholar
  21. Alienth. We Recommend that You Change Your Reddit Password, Apr. 2014. http://www.reddit.com/r/announcements/comments/231hl7/we_recommend_that_you_change_your_reddit_password/.Google ScholarGoogle Scholar
  22. J. Amann, M. Vallentin, S. Hall, and R. Sommer. Extracting Certificates from Live Traffic: A Near Real-Time SSL Notary Service. Technical Report TR-12-014, ICSI, Nov. 2012.Google ScholarGoogle Scholar
  23. AWeber Communications. Heartbleed: We're Not Affected. Here's What You Can Do To Protect Yourself, Apr. 2014. http://blog.aweber.com/articles-tips/heartbleed-how-to-protect-yourself.htm.Google ScholarGoogle Scholar
  24. Bitcoin. OpenSSL Heartbleed Vulnerability, Apr. 2014. https://bitcoin.org/en/alert/2014-04--11-heartbleed.Google ScholarGoogle Scholar
  25. Bro Network Security Monitor Web Site. http://www.bro.org.Google ScholarGoogle Scholar
  26. N. Craver. Is Stack Exchange Safe from Heartbleed?, Apr. 2014. http://meta.stackexchange.com/questions/228758/is-stack-exchange-safe-from-heartbleed.Google ScholarGoogle Scholar
  27. R. Dingledine. Tor OpenSSL Bug CVE-2014-0160, Apr. 2014. https://blog.torproject.org/blog/openssl-bug-cve-2014-0160.Google ScholarGoogle Scholar
  28. Dropbox Support. https://twitter.com/dropbox_support/status/453673783480832000, Apr. 2014. Quick Update on Heartbleed: We've Patched All of Our User-Facing Services & Will Continue to Work to Make Sure Your Stuff is Always Safe.Google ScholarGoogle Scholar
  29. Z. Durumeric, J. Kasten, M. Bailey, and J. A. Halderman. Analysis of the HTTPS Certificate Ecosystem. In Proc. ACM Internet Measurement Conference, Oct. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast Internet-Wide Scanning and its Security Applications. In Proc. USENIX Security Symposium, Aug. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Ellis. Akamai heartbleed Update (V3), Apr. 2014. https://blogs.akamai.com/2014/04/heartbleed-update-v3.html.Google ScholarGoogle Scholar
  32. A. S. Foundation. CouchDB and the Heartbleed SSL/TLS Vulnerability, Apr. 2014. https://blogs.apache.org/couchdb/entry/couchdb_and_the_heartbleed_ssl.Google ScholarGoogle Scholar
  33. GoDaddy. OpenSSL Heartbleed: We've Patched Our Servers, Apr. 2014. http://support.godaddy.com/godaddy/openssl-and-heartbleed-vulnerabilities/.Google ScholarGoogle Scholar
  34. L. Grangeia. Heartbleed, Cupid and Wireless, May 2014. http://www.sysvalue.com/en/heartbleed-cupid-wireless/.Google ScholarGoogle Scholar
  35. S. Grant. The Bleeding Hearts Club: Heartbleed Recovery for System Administrators, Apr. 2014. https://www.eff.org/deeplinks/2014/04/bleeding-hearts-club-heartbleed-recovery-system-administrators.Google ScholarGoogle Scholar
  36. B. Grubb. Heartbleed Disclosure Timeline: Who Knew What and When. Apr. 2014. http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140415-zqurk.html.Google ScholarGoogle Scholar
  37. L. Haisley. OpenSSL Crash with STARTTLS in Courier, May 2014. http://sourceforge.net/p/courier/mailman/message/32298514/.Google ScholarGoogle Scholar
  38. IBM. OpenSSL Heartbleed (CVE-2014-0160), May 2014. https://www-304.ibm.com/connections/blogs/PSIRT/entry/openssl_heartbleed_cve_2014_0160.Google ScholarGoogle Scholar
  39. Infusionsoft. What You Need to Know About Heartbleed, Apr. 2014. http://blog.infusionsoft.com/company-news/need-know-heartbleed/.Google ScholarGoogle Scholar
  40. Internal Revenue Service. IRS Statement on "Heartbleed" and Filing Season, Apr. 2014. http://www.irs.gov/uac/Newsroom/IRS-Statement-on-Heartbleed-and-Filing-Season.Google ScholarGoogle Scholar
  41. W. Kamishlian and R. Norris. Installing OpenSSL for Jabberd 2. http://www.jabberdoc.org/app_openssl.html.Google ScholarGoogle Scholar
  42. Litespeed Technologies. LSWS 4.2.9 Patches Heartbleed Bug, Apr. 2014. http://www.litespeedtech.com/support/forum/threads/lsws-4--2--9-patches-heartbleed-bug.8504/.Google ScholarGoogle Scholar
  43. S. Marquess. Of Money, Responsibility, and Pride, Apr. 2014. http://veridicalsystems.com/blog/of-money-responsibility-and-pride/.Google ScholarGoogle Scholar
  44. M. Masnick. Shameful Security: StartCom Charges People To Revoke SSL Certs Vulnerable to Heartbleed, Apr. 2014. http://www.techdirt.com/articles/20140409/11442426859/shameful-security-startcom-charges-people-to-revoke-ssl-certs-vulnerable-to-heartbleed.shtml.Google ScholarGoogle Scholar
  45. N. Mehta and Codenomicon. The Heartbleed Bug. http://heartbleed.com/.Google ScholarGoogle Scholar
  46. Microsoft. Microsoft Services unaffected by OpenSSL Heartbleed vulnerability, Apr. 2014. http://blogs.technet.com/b/security/archive/2014/04/10/microsoft-devices-and-services-and-the-openssl-heartbleed-vulnerability.aspx.Google ScholarGoogle Scholar
  47. MongoDB. MongoDB Response on Heartbleed OpenSSL Vulnerability, Apr. 2014. http://www.mongodb.com/blog/post/mongodb-response-heartbleed-openssl-vulnerability.Google ScholarGoogle Scholar
  48. K. Murchison. Heartbleed Warning - Cyrus Admin Passowrd Leak!, Apr. 2014. http://lists.andrew.cmu.edu/pipermail/info-cyrus/2014-April/037351.html.Google ScholarGoogle Scholar
  49. E. Ng. Tunnel Fails after OpenSSL Patch, Apr. 2014. https://lists.openswan.org/pipermail/users/2014-April/022934.html.Google ScholarGoogle Scholar
  50. M. O'Connor. Google Services Updated to Address OpenSSL CVE-2014-0160 (the Heartbleed Bug), Apr. 2014. http://googleonlinesecurity.blogspot.com/2014/04/google-services-updated-to-address.html.Google ScholarGoogle Scholar
  51. P. Ondruska. Does OpenSSL CVE-2014-0160 Effect Jetty Users', Apr. 2014. http://dev.eclipse.org/mhonarc/lists/jetty-users/msg04624.html.Google ScholarGoogle Scholar

Index Terms

  1. The Matter of Heartbleed

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference
      November 2014
      524 pages
      ISBN:9781450332132
      DOI:10.1145/2663716

      Copyright © 2014 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 November 2014

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IMC '14 Paper Acceptance Rate32of103submissions,31%Overall Acceptance Rate277of1,083submissions,26%

      Upcoming Conference

      IMC '24
      ACM Internet Measurement Conference
      November 4 - 6, 2024
      Madrid , AA , Spain

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader