Reply
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
Re: ROS 6, OpenSSL, and package updates?
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-07
11:13 PM
2014-04-07
11:13 PM
ROS 6, OpenSSL, and package updates?
No sooner do I read this evening that Fedora and others a re quickly working to get OpenSSL 1.0.1e out to fix the latest TLS bug that I log into my 516 to see what version it's running. Oh my, 1.0.1e. When did that happen? Are there magic upgrade faeries on the NAS? 😄
Message 1 of 48
Labels:
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
12:21 AM
2014-04-08
12:21 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
OpenSSL 1.0.1e is over a year old. It does not fix the latest TLS bug reported today (CVE-2014-0160, aka "Heartbleed"). All versions of OpenSSL 1.0.1 before 1.0.1g are vulnerable, as are the 1.0.2 betas up to and including 1.0.2-beta1.
The 1.0.0 and 0.9.8 branches are NOT affected, although of course they have other vulnerabilities and non-security bugs that have been fixed in the later versions.
ReadyNAS devices running OS4 are unaffected by the new bug; they're running 0.9.8o at best. I don't know what version of OpenSSL is running on the OS5 devices.
The 1.0.0 and 0.9.8 branches are NOT affected, although of course they have other vulnerabilities and non-security bugs that have been fixed in the later versions.
ReadyNAS devices running OS4 are unaffected by the new bug; they're running 0.9.8o at best. I don't know what version of OpenSSL is running on the OS5 devices.
Message 2 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
12:23 AM
2014-04-08
12:23 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
Yeah, I was reading more about the patch and realized it's 1.0.1g that has the fix. So ROS 6.1.6 is definitely vulnerable.
Message 3 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
04:41 AM
2014-04-08
04:41 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
My RN102 is running OpenSSL 1.0.1e as part of OS6.1.6,
Can we upgrade it by hand or do we have to wait for an update from Netgear?
Can we upgrade it by hand or do we have to wait for an update from Netgear?
Message 4 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
07:34 AM
2014-04-08
07:34 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
I wouldn't wait for an update. With Netgear's average speed of updating, you'll be waiting for months.
Download either the AMD64 or i386 package depending on the architecture of your NAS. To find out which one you need, log in to SSH on your device and type "uname -m". If that returns "x86" take the i386, if it returns "x86_64" use the AMD64 version.
AMD64: http://security.debian.org/debian-secur ... _amd64.deb
i386: http://security.debian.org/debian-secur ... 5_i386.deb
While in SSH, enter the following commands:
AMD64:
i386:
You're good to go.
Download either the AMD64 or i386 package depending on the architecture of your NAS. To find out which one you need, log in to SSH on your device and type "uname -m". If that returns "x86" take the i386, if it returns "x86_64" use the AMD64 version.
AMD64: http://security.debian.org/debian-secur ... _amd64.deb
i386: http://security.debian.org/debian-secur ... 5_i386.deb
While in SSH, enter the following commands:
AMD64:
wget http://security.debian.org/debian-security/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_amd64.deb
dpkg -i openssl_1.0.1e-2+deb7u5_amd64.deb
service apache2 restart
service ssh restart
i386:
wget http://security.debian.org/debian-security/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_i386.deb
dpkg -i openssl_1.0.1e-2+deb7u5_i386.deb
service apache2 restart
service ssh restart
You're good to go.
Message 5 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
08:14 AM
2014-04-08
08:14 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
Don't those two options both re-install the current (insecure) version - 1.0.1e?
I believe the fixed version is 1.0.1g, which I don't see anywhere.
I believe the fixed version is 1.0.1g, which I don't see anywhere.
Message 6 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
08:19 AM
2014-04-08
08:19 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
Yeah according to http://heartbleed.com/, "Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4" is considered unsafe. It wouldn't appear the package version in the links is any different.
Message 7 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
09:34 AM
2014-04-08
09:34 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
I'm on RN102 (ReadyNas Duo v2?) where # uname -a gives (<masked>):
Linux <HOSTNAME> 3.0.101.RN_ARM.1 #1 <INSTALLDATE> armv7l GNU/Linux
Looking at the Debian ports there are "armel" and "armhf" variants, and from https://wiki.debian.org/ArmHardFloatPort#Name_of_the_port I think it is armhf I would need.
But as alanwsg already pointed out it seems we still need to wait for a 1.0.1g package. Or is it feasible to compile from source? Searching for arm compilation I mostly found cross-compling howtos. Is it as simple as extracting the source of openssl in a directory, and running make? Will that screw up future web-GUI ReadyNAS upgrades?
Linux <HOSTNAME> 3.0.101.RN_ARM.1 #1 <INSTALLDATE> armv7l GNU/Linux
Looking at the Debian ports there are "armel" and "armhf" variants, and from https://wiki.debian.org/ArmHardFloatPort#Name_of_the_port I think it is armhf I would need.
But as alanwsg already pointed out it seems we still need to wait for a 1.0.1g package. Or is it feasible to compile from source? Searching for arm compilation I mostly found cross-compling howtos. Is it as simple as extracting the source of openssl in a directory, and running make? Will that screw up future web-GUI ReadyNAS upgrades?
Message 8 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
11:03 AM
2014-04-08
11:03 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
Reading https://www.debian.org/security/2014/dsa-2896 and https://security-tracker.debian.org/tracker/CVE-2014-0160
I have to guess Debian backported the fix to the above linked versions, so although their names contain "1.0.1e" the suffix "+deb7u5" seems to mark a version patched with the fix yesterday. The +deb7u6 released today presumably still contains the fix but I didn't see any clear statement about it. Thus alanwsg, btaroli and I were probably wrong in our last comments.
The steps I now took to upgrade my ReadyNas RN102 were (as root):
Edit /etc/apt/sources.list to append "deb http://security.debian.org/debian-security wheezy/updates main" on a new line. (Since I have a plain install I had to use the vi editor, http://www.cs.fsu.edu/general/vimanual.html)
# apt-get update
# apt-get install openssl/wheezy
(An apt-get upgrade did not select openssl, presumably due to the pinning -- http://jaqque.sbih.org/kplug/apt-pinning.html)
# apt-get install libssl1.0.0/wheezy
(I did not install libssl-dev, libssl-doc or libcrypto++9 since they first two were not previously installed and the latter under a lower version number, maybe before the bug was introduced.)
I have to guess Debian backported the fix to the above linked versions, so although their names contain "1.0.1e" the suffix "+deb7u5" seems to mark a version patched with the fix yesterday. The +deb7u6 released today presumably still contains the fix but I didn't see any clear statement about it. Thus alanwsg, btaroli and I were probably wrong in our last comments.
The steps I now took to upgrade my ReadyNas RN102 were (as root):
Edit /etc/apt/sources.list to append "deb http://security.debian.org/debian-security wheezy/updates main" on a new line. (Since I have a plain install I had to use the vi editor, http://www.cs.fsu.edu/general/vimanual.html)
# apt-get update
# apt-get install openssl/wheezy
(An apt-get upgrade did not select openssl, presumably due to the pinning -- http://jaqque.sbih.org/kplug/apt-pinning.html)
# apt-get install libssl1.0.0/wheezy
(I did not install libssl-dev, libssl-doc or libcrypto++9 since they first two were not previously installed and the latter under a lower version number, maybe before the bug was introduced.)
Message 9 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
11:55 AM
2014-04-08
11:55 AM
Re: ROS 6, OpenSSL, and magic package upgrades?
hma9 wrote: I have to guess Debian backported the fix to the above linked versions, so although their names contain "1.0.1e" the suffix "+deb7u5" seems to mark a version patched with the fix yesterday. The +deb7u6 released today presumably still contains the fix but I didn't see any clear statement about it. Thus alanwsg, btaroli and I were probably wrong in our last comments.
Yes, versions 1.0.1e-2+deb7u5 and 1.0.1e-2+deb7u6 contain the fix. From the changelog:
openssl (1.0.1e-2+deb7u6) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Enable checking for services that may need to be restarted
* Update list of services to possibly restart
-- Salvatore Bonaccorso <carnil@debian.org> Tue, 08 Apr 2014 10:44:53 +0200
openssl (1.0.1e-2+deb7u5) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2014-0160.patch patch.
CVE-2014-0160: Fix TLS/DTLS hearbeat information disclosure.
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or
server.
-- Salvatore Bonaccorso <carnil@debian.org> Mon, 07 Apr 2014 22:26:55 +0200
Message 10 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
12:40 PM
2014-04-08
12:40 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
I need to update an NV+ (v1). It would seem I need to do this:
But before I mess things up, I'm hoping someone can let me know if this will work.
Thanks.
wget http://security.debian.org/debian-security/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_ sparc.deb
dpkg -i openssl_1.0.1e-2+deb7u5_sparc.deb
/etc/init.d/apache2 restart
/etc/init.d/ssh restart
But before I mess things up, I'm hoping someone can let me know if this will work.
Thanks.
Message 11 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
12:50 PM
2014-04-08
12:50 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
On further checking, my NV+ (v1) has 0.9.8g installed, so it appears that it doesn't not have the heartbleed bug.
Message 12 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
01:20 PM
2014-04-08
01:20 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
I'm afraid I've lost the plot here, my RN102 says it's running 1.0.1e, am I secure or not?
Message 13 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
01:49 PM
2014-04-08
01:49 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
The bug fixes started rolling out yesterday (7 April 2014), so if you haven't updated OpenSSL manually you are not secure.
alanwsg wrote: I'm afraid I've lost the plot here, my RN102 says it's running 1.0.1e, am I secure or not?
I am also confused on how 1.0.1e-2+deb7u5 and 1.0.1e-2+deb7u6 relate to 1.0.1g.
Message 14 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
01:54 PM
2014-04-08
01:54 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
The simplest way to figure out if you have the bug is to check your version:
And the build date:
Any 1.0.1 version with a date older than April 7, 2014 is vulnerable to compromise.
dpkg -l | grep openssl
And the build date:
openssl version -b
Any 1.0.1 version with a date older than April 7, 2014 is vulnerable to compromise.
Message 15 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
02:11 PM
2014-04-08
02:11 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
StephenB wrote: 1.0.1e-2+deb7u6
Backported security fix for wheezy.
Message 16 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
02:33 PM
2014-04-08
02:33 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
Yes, though the guidance from heartbleed.com is to use 1.0.1g. I'm unclear as to what other changes might be missing from 1.0.1e-2+deb7u6.
mangrove wrote:
StephenB wrote: 1.0.1e-2+deb7u6
Backported security fix for wheezy.
Message 17 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
02:48 PM
2014-04-08
02:48 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
StephenB wrote: The bug fixes started rolling out yesterday (7 April 2014), so if you haven't updated OpenSSL manually you are not secure.
That is correct.
StephenB wrote: I am also confused on how 1.0.1e-2+deb7u5 and 1.0.1e-2+deb7u6 relate to 1.0.1g.
OpenSSL is its own project; it released 1.0.1e a year ago. Shortly thereafter, the Debian project maintainers incorporated it into their Linux distro.
The OpenSSL project released 1.0.1g yesterday, and the Debian project will undoubtedly incorporate that version into the next release of Debian Linux. But it would be imprudent for them to update the earlier, already-released versions of Debian (like "Wheezy", the version used by the ReadyNAS OS6 devices) to 1.0.1g without significant testing, because over the last year many other changes were made between 1.0.1e and 1.0.1g. That testing would take a lot of time, but the bug is serious and should be fixed immediately.
Fortunately, the fix is very straightforward -- just a couple lines of code -- so the Debian Security team decided that it was safe to make just that one bugfix change to Wheezy's 1.0.1e (without adding any of the other changes made to Open SSL over the last year). They released the slightly-modified 1.0.1e as 1.0.1e-2+deb7u5 yesterday, then made some minor tweaks to it today and released that as 1.0.1e-2+deb7u6. Both those versions contain the crucial bugfix; the latter one also handles service-restarts better.
You can see the list of other major changes between 1.0.1e and 1.0.1g by looking at the OpenSSL release notes here: http://www.openssl.org/news/openssl-1.0.1-notes.html. I posted the Debian changelog for 1.0.1e-2+deb7u5 and 1.0.1e-2+deb7u6 in an earlier message.
Message 18 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
03:08 PM
2014-04-08
03:08 PM
Re: ROS 6, OpenSSL, and magic package upgrades?
Yes, though the guidance from heartbleed.com is to use 1.0.1g. I'm unclear as to what other changes might be missing from 1.0.1e-2+deb7u6.[/quote]
StephenB wrote: Backported security fix for wheezy.
Debian are after all famously conservative 😄
Security fixes are always backported though.
The version of OpenSSL I use on OS4 was too old to be affected... :roll:
Message 19 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-08
03:12 PM
2014-04-08
03:12 PM
Re: ROS 6, OpenSSL, and package updates?
http://www.debian.org/security/2014/dsa-2896
For wheezy (which 6.1.6 falls into) it's fixed in 1.0.1e-2+deb7u5. I'm not sure which major release NV+ and 5.x systems run. Patching it may (for some older systems) come down to Netgear? Not sure.
Don't necessarily go by package version, though. Build is safer. But in general, check the CVE report from each distro to be absolutely sure.
For wheezy (which 6.1.6 falls into) it's fixed in 1.0.1e-2+deb7u5. I'm not sure which major release NV+ and 5.x systems run. Patching it may (for some older systems) come down to Netgear? Not sure.
Don't necessarily go by package version, though. Build is safer. But in general, check the CVE report from each distro to be absolutely sure.
Message 20 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-09
12:02 AM
2014-04-09
12:02 AM
Re: ROS 6, OpenSSL, and package updates?
I've applied the deb7u5 openssl to my 6.1.7 installation, as described earlier, and it seems to have worked OK. Strangely, "openssl version" still reports "11 Feb 2013" but the build is dated 07-APR-2014 20:32:27 UTC.
Message 21 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-09
12:35 AM
2014-04-09
12:35 AM
Re: ROS 6, OpenSSL, and package updates?
OK guys, plot still lost!
If my RN102 says "1.0.1e 11 Feb 2013" when I run "openssl version" ....
-- how do I know if I'm running the patched version?
-- if I update it as described earlier, how will I know if it's worked?
-- how do I view the build number?
-- did they REALLY update the package but not change the version number?
If my RN102 says "1.0.1e 11 Feb 2013" when I run "openssl version" ....
-- how do I know if I'm running the patched version?
-- if I update it as described earlier, how will I know if it's worked?
-- how do I view the build number?
-- did they REALLY update the package but not change the version number?
Message 22 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-09
01:04 AM
2014-04-09
01:04 AM
Re: ROS 6, OpenSSL, and package updates?
better to add this in /etc/apt/sources.list :
deb http://security.debian.org/ wheezy/updates main contrib non-free
that's my opinion
don't forget to regenerate certificates and keys , restarting apache is not enough
to regenerate the certificate change the name clicking on https button
then delete keys in /etc/ssh/ (ssh_host_xxxx files) , delete also files in /root/.ssh
reboot the nas
deb http://security.debian.org/ wheezy/updates main contrib non-free
that's my opinion
don't forget to regenerate certificates and keys , restarting apache is not enough
to regenerate the certificate change the name clicking on https button
then delete keys in /etc/ssh/ (ssh_host_xxxx files) , delete also files in /root/.ssh
reboot the nas
Message 23 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-09
01:06 AM
2014-04-09
01:06 AM
Re: ROS 6, OpenSSL, and package updates?
alanwsg wrote: -- how do I view the build number?
-- did they REALLY update the package but not change the version number?
openssl version -a
will give you the build date.
It's not a new "version", per se. It's a patched old version. Debian is not bleeding edge. If you want bleeding edge, you will be ill served by "Debian stable", but there is the "Debian testing" release. Typically Debian users are looking for extreme stability and longevity.
Message 24 of 48
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2014-04-09
01:20 AM
2014-04-09
01:20 AM
Re: ROS 6, OpenSSL, and package updates?
alanwsg wrote: OK guys, plot still lost!
If my RN102 says "1.0.1e 11 Feb 2013" when I run "openssl version" ....
-- how do I know if I'm running the patched version?
-- if I update it as described earlier, how will I know if it's worked?
-- how do I view the build number?
-- did they REALLY update the package but not change the version number?
run "dpkg -l | grep openssl"
Message 25 of 48