OpenSSL Heartbleed bug, steam, and you.

This topic is locked from further discussion.

Avatar image for darksusperia
darksusperia

6945

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#1 darksusperia
Member since 2004 • 6945 Posts

OpenSSL has recently announced a severe bug that could lead to compromised information being obtained through https connections. 2/3 of the web is currently effected.

Steam has patched the bug early this AM. It is recommended to reset your steam password and deauthorize all computers under steamguard as a precaution. Better safe then sorry.

https://www.openssl.org/news/secadv_20140407.txt

This obviously has further reaching implications then just steam. Any site using the vunerable openssl package (banks, e-tailers etc) can be exploited.

Avatar image for FelipeInside
FelipeInside

28548

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#2  Edited By FelipeInside
Member since 2003 • 28548 Posts

@darksusperia said:

OpenSSL has recently announced a severe bug that could lead to compromised information being obtained through https connections. 2/3 of the web is currently effected.

Steam has patched the bug early this AM. It is recommended to reset your steam password and deauthorize all computers under steamguard as a precaution. Better safe then sorry.

https://www.openssl.org/news/secadv_20140407.txt

This obviously has further reaching implications then just steam. Any site using the vunerable openssl package (banks, e-tailers etc) can be exploited.

How the hell do you deauthorize PCs in Steam?

Avatar image for darksusperia
darksusperia

6945

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#3  Edited By darksusperia
Member since 2004 • 6945 Posts

go to settings, click manage steamguard, tick the deauthorize all computers box, click next.

Avatar image for JohnF111
JohnF111

14190

Forum Posts

0

Wiki Points

0

Followers

Reviews: 12

User Lists: 0

#4 JohnF111
Member since 2010 • 14190 Posts

I'll pass. I really can't be bothered doing this to a dozen sites.

#noconsequences

Avatar image for crimsonbrute
CrimsonBrute

25603

Forum Posts

0

Wiki Points

0

Followers

Reviews: 12

User Lists: 0

#5 CrimsonBrute  Moderator
Member since 2004 • 25603 Posts
@JohnF111 said:

I'll pass. I really can't be bothered doing this to a dozen sites.

#noconsequences

http://www.quickmeme.com/img/c0/c0ac4af28620ea38e5a1390fd79e61e9bd61daba9eeadb8c86bc5164390c5689.jpg

Avatar image for nutcrackr
nutcrackr

13032

Forum Posts

0

Wiki Points

0

Followers

Reviews: 72

User Lists: 1

#6 nutcrackr
Member since 2004 • 13032 Posts

Man I have so many passwords across many sites. How do I know which ones have been compromised and which ones are now safe to change? I do not have LastPass.

Shouldn't the owners of each site send out emails to all users telling them...

Avatar image for crimsonbrute
CrimsonBrute

25603

Forum Posts

0

Wiki Points

0

Followers

Reviews: 12

User Lists: 0

#7 CrimsonBrute  Moderator
Member since 2004 • 25603 Posts

@nutcrackr: There is a list here that has some sites on there that may or may not have been compromised.

Avatar image for darksusperia
darksusperia

6945

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#8  Edited By darksusperia
Member since 2004 • 6945 Posts

@nutcrackr said:

Man I have so many passwords across many sites. How do I know which ones have been compromised and which ones are now safe to change? I do not have LastPass.

Shouldn't the owners of each site send out emails to all users telling them...

you can test sites that you use with the following.

http://filippo.io/Heartbleed/

Its not recommended to run out and change *ALL* your passwords. Some sites are simply not effected (ie, any running on IIS).

My servers werent affected as I was running OpenBSD 5.2 on the production machine, 5.3 and 5.4 were affected however.

Which is why I only said steam as I know it was affected and was patched rather quickly. Its not a case of they probably have anyones details, its a case of they possibly could have. In the time period before the patch, after the vunerability was made public. - Thats the concern. And they will be targeting any non patched site in hope of catching some information.

If you do receive a link to reset, make sure the link doesnt contain login information. If it does, visit the site manually and reset it via your account profile options.

Avatar image for JigglyWiggly_
JigglyWiggly_

24625

Forum Posts

0

Wiki Points

0

Followers

Reviews: 4

User Lists: 0

#9  Edited By JigglyWiggly_
Member since 2009 • 24625 Posts

Also you may need to update your router firmware if you have someone on your network who isn't too trustworthy.

OpenWRT and pfsense just patched it.

For openwrt you can just upgrade your libssl from the repo

Avatar image for JigglyWiggly_
JigglyWiggly_

24625

Forum Posts

0

Wiki Points

0

Followers

Reviews: 4

User Lists: 0

#10 JigglyWiggly_
Member since 2009 • 24625 Posts

@nutcrackr said:

Man I have so many passwords across many sites. How do I know which ones have been compromised and which ones are now safe to change? I do not have LastPass.

Shouldn't the owners of each site send out emails to all users telling them...

You can't tell if you've been affected from the bug. There's no logs or anything if it's exploited.