]> jfr.im git - irc/freenode/web-7.0.git/blame - content/news/2014-04-15-heartbleed.md
Mention #ircpuzzles
[irc/freenode/web-7.0.git] / content / news / 2014-04-15-heartbleed.md
CommitLineData
849bdd6f
SB
1author: Pricey
2date: 2014-04-15 18:52:05+00:00
3slug: heartbleed
4title: Heartbleed
c5191f36
EK
5category: infrastructure
6category: security
7category: technical
849bdd6f 8---
849bdd6f 9The recently exposed [heartbleed bug](http://heartbleed.com/) in the OpenSSL library has surprised everyone with a [catastrophic](https://www.schneier.com/blog/archives/2014/04/heartbleed.html) vulnerability in many of the world's secure systems.
34876803 10
849bdd6f 11In common with many other SSL-exposed services, some freenode servers were running vulnerable versions of OpenSSL, exposing us to this exploit. Consequently, all of our affected services have been patched to mitigate the vulnerability, and we have also regenerated our private SSL keys and certificates.
34876803 12
849bdd6f 13In an unrelated event, due to service disruption & the misconfiguration of a single server on our network, an unauthorised user was allowed to use the 'NickServ' nickname for a short period Sunday morning. Unfortunately there is a possibility that your client sent data (including your freenode services password) to this unauthorised client. Identification via SASL, certfp or server password were not affected, but any password sent directly to the "NickServ" user might have been.
34876803 14
849bdd6f
SB
15Because of these two recent issues, we would like to make the following recommendations to all of our users. It would also be good practice to follow them at regular intervals.
16
17
18
951245ff 19
849bdd6f
SB
20 * Though we are not aware of any evidence that we have been targeted, or our private key compromised, [this is inevitably a possibility](https://www.eff.org/deeplinks/2014/04/wild-heart-were-intelligence-agencies-using-heartbleed-november-2013). SSL sessions established prior to 2014/04/12 may be vulnerable. If your current connection was established prior to this date via ssl then you should** consider reconnecting to the network.
21**
22
23
24
849bdd6f 25
951245ff 26 * **We would advise that users reset their password** (after reconnecting) using instructions returned by the following command:
849bdd6f
SB
27
28
29
849bdd6f 30
951245ff 31> /msg nickserv help set password
849bdd6f
SB
32
33
34
35This should help ensure that if your password was compromised through an exploitation of the Heartbleed vulnerability, the damage is limited.
36
37
38
39
40
34876803 41
951245ff 42
849bdd6f
SB
43 * In line with general best practice, we would always recommend using separate passwords on separate systems - if you shared your freenode services password with other systems, you should **change your password on all of these systems**; preferably into individual ones.
44
45
46
951245ff 47
849bdd6f
SB
48 * If you use CertFP, you should **regenerate your client certificate** ([instructions](http://freenode.net/certfp/makecert.shtml)) ****and ensure that you update NickServ with the new certificate hash. You can find out how to do this using the following command:
49
50
51
52
951245ff
EK
53> /msg nickserv help cert
54
849bdd6f
SB
55
56
57
58
59
849bdd6f
SB
60 * Having changed passwords and/or certificate hashes, it cannot hurt to **verify your other authentication methods** (such as [email](http://blog.freenode.net/2013/08/check-your-nickserv-email/), ACCESS or CERT). It is possible you have additional access methods configured either from past use or (less likely) due to an account compromise.
61
62
63
951245ff 64
849bdd6f
SB
65 * At the recommendation of the Tor Project, we have regenerated private keys for our hidden services. [The new list of addresses is now available on our website](http://freenode.net/irc_servers.shtml#tor). **Please update your tor configuration!**
66
67
68
951245ff 69
849bdd6f
SB
70 * Finally, it is worth noting that although probably the least likely attack vector, [Heartbleed can also be used as client-side attack](https://www.eff.org/deeplinks/2014/04/wild-heart-were-intelligence-agencies-using-heartbleed-november-2013), i.e. if you are still running a vulnerable client a server could attack you. This could be a viable attack if, for instance, you connect to a malicious IRC server and freenode at the same time; hypothetically the malicious IRC server could then attack your client and steal your IRC password or other data. If affected, you should** ensure your OpenSSL install is updated and not vulnerable then restart your client**.
71
72
73As ever, staff are available in #freenode to respond to any questions or concerns.