The others are mostly porn sites, link shorteners, non-english or others people normally wouldn't have an account/put private data on. These are the sites I feel have the most significance on the list, sorry if I missed any.
This is the problem with a monoculture in security libraries. Back when the gnutls vulnerability came up earlier this year, some people seriously stated that we should only have one tls library and that would ensure the security of it.
Find a vulnerability in a browser, and a minority subset of all users get effected. Find a issue with openssl, and key to the kingdom is there.
This will be similar to the trendnet webcam "/anony/mjpg.cgi" ordeal. To this day there are still many webcams on the internet that can be viewed by anyone and the owners of the webcam have no idea whatsoever.
We're going to have fallout from this for at least the rest of this year and well into the next.
I'm sure all the serious sites will be updated soon. But what I'm more worried about is all those routers. My home router has an admin interface that's served over SSL. I'm not so confident in that manufacturers will push out updates for those routers quickly, or that people will update them at all.
I'm hoping to find a list of largish sites that were vulnerable to this bug just prior to the recent disclosure, so that I can know how to prioritize my password changing. (These forced password rotations are happening quite a lot these days.)
So only a little over 12% is still vulnerable (and possibly ~30% not using OpenSSL). And that number is still shrinking quickly.
For example: Netflix, Yahoo, NASA and OKCupid have updated in the mean time.
1.) If it was made in the US, probably not. Reading the memory of a webserver would be pretty easy for a lawyer to argue is "unauthorized use of a computer system." That is the basic definition presented in the Computer Fraud and Abuse Act.
2.) I don't know enough to be able to argue one way or another on this point. However, if you download the list or disseminate the list you are likely increasing your possible exposure.
Many servers will still be vulnerable, so now you have 2 problems.
Zawinski meme aside, perhaps it would make sense to do it on a server-by-server basis when the machines are verified patched. (Though, even then, how do you know they aren't passing information back to an Internet-exposed-but-unpatched database server?)
If you logged in (as in, typed your username and password) in to the site during the time the exploit has been disclosed and the site has been vulnerable, I would change your password.
Otherwise, insist that the site owners invalidate all existing sessions.
[+] [-] tinalumfoil|12 years ago|reply
yahoo.com indiegogo.com metacafe.com mybet.com nascar.com okcupid.com pch.com paypal-community.com browserstack.com creditkarma.com nasa.gov twitpic.com
The others are mostly porn sites, link shorteners, non-english or others people normally wouldn't have an account/put private data on. These are the sites I feel have the most significance on the list, sorry if I missed any.
[+] [-] thinkling|12 years ago|reply
There are a couple of big european retailers in the list (darty, castorama).
[+] [-] lotsofcows|12 years ago|reply
[+] [-] jackowayed|12 years ago|reply
[+] [-] icodestuff|12 years ago|reply
[+] [-] level|12 years ago|reply
[+] [-] rabino|12 years ago|reply
edit: I contacted the developers and they were super fast to patch everything, roll keys, etc. It's contained now.
[+] [-] teawithcarl|12 years ago|reply
[+] [-] elwell|12 years ago|reply
[+] [-] esturk|12 years ago|reply
(www)gatech.edu (www)ucla.edu (www)uiuc.edu
I mean really? These are top engineering schools too.
[+] [-] belorn|12 years ago|reply
Find a vulnerability in a browser, and a minority subset of all users get effected. Find a issue with openssl, and key to the kingdom is there.
[+] [-] rabino|12 years ago|reply
Having 200 broken TSL libraries is security by obscurity. Not very useful, and a pain for sysadmins.
[+] [-] rodgerd|12 years ago|reply
How many more libraries do you think will provide adequate security?
[+] [-] unknown|12 years ago|reply
[deleted]
[+] [-] robododo|12 years ago|reply
I have a feeling heartbleed will haunt us for a while.
[+] [-] JshWright|12 years ago|reply
[+] [-] smtddr|12 years ago|reply
We're going to have fallout from this for at least the rest of this year and well into the next.
[+] [-] FooBarWidget|12 years ago|reply
[+] [-] stormbrew|12 years ago|reply
[+] [-] Narkov|12 years ago|reply
[+] [-] jpmattia|12 years ago|reply
[+] [-] voltagex_|12 years ago|reply
[+] [-] hughes|12 years ago|reply
[+] [-] 1_player|12 years ago|reply
[+] [-] patrickxb|12 years ago|reply
[+] [-] mkr-hn|12 years ago|reply
[+] [-] philip1209|12 years ago|reply
[+] [-] allochthon|12 years ago|reply
[+] [-] ef47d35620c1|12 years ago|reply
[+] [-] ArloL|12 years ago|reply
[+] [-] rpearl|12 years ago|reply
[+] [-] elwell|12 years ago|reply
[+] [-] molf|12 years ago|reply
[+] [-] euphemize|12 years ago|reply
[+] [-] sukuriant|12 years ago|reply
1) was this list made legally?
2) is viewing the list legal?
[+] [-] pilom|12 years ago|reply
2.) I don't know enough to be able to argue one way or another on this point. However, if you download the list or disseminate the list you are likely increasing your possible exposure.
[+] [-] PeterisP|12 years ago|reply
[+] [-] bpicolo|12 years ago|reply
[+] [-] abc123xyz|12 years ago|reply
fun fun fun
[+] [-] abc123xyz|12 years ago|reply
http://i.imgur.com/RLXeySY.png
[+] [-] newman314|12 years ago|reply
[+] [-] 3rd3|12 years ago|reply
[+] [-] carbocation|12 years ago|reply
Zawinski meme aside, perhaps it would make sense to do it on a server-by-server basis when the machines are verified patched. (Though, even then, how do you know they aren't passing information back to an Internet-exposed-but-unpatched database server?)
[+] [-] regecks|12 years ago|reply
Otherwise, insist that the site owners invalidate all existing sessions.
[+] [-] henryaj|12 years ago|reply
[+] [-] maximux|12 years ago|reply
[+] [-] unknown|12 years ago|reply
[deleted]
[+] [-] zer0defex|12 years ago|reply
[deleted]