top | item 7743041

Many sites reusing Heartbleed-compromised private keys

50 points| eliot_sykes | 12 years ago |zdnet.com

10 comments

order
[+] abritishguy|12 years ago|reply
You should not be responsible for website security if you don't understand the absolute basics of SSL certificates.

It would be helpful if the CA (or reseller) confirmed (dispay a warning) that you really want to reissue with the same private key and explain the implications of doing so.

When reissuing a certificate the default behaviour should be to revoke the old one after some specified time has elapsed - that is what reissuing is for and what distinguishes it from simply buying a new certificate.

[+] mobiplayer|12 years ago|reply
This.

The problem is that many people in the industry doesn't really understand the basics. How come is there a leak of your certificate, if that's the public key you're showing to every single client that connects to your SSL enabled site?

I've even seen sysads advising on forums about reissuing certs after Heartbleed, but no word about the keys.

[+] mikeash|12 years ago|reply
I think that "no word about the keys" is simply due to a huge gulf in understanding. To the people giving out the advice, it's obvious that "reissue your certificates" implies "with a new private key", so obvious that they can't even imagine someone doing otherwise. It's easy to skip out on the basics that you're sure "everyone knows".
[+] higherpurpose|12 years ago|reply
Maybe they should just be advised to use PFS/ECDHE instead (which should be done anyway), and it would solve this problem by itself.
[+] nodata|12 years ago|reply
i.e. they re-used the same CSR without realising that the CSR references the old compromised key.
[+] unreal37|12 years ago|reply
The odds of this being a real issue that will affect anyone are in the tiny fractions of a percent range.