Bonum Certa Men Certa

Some Perspective on Heartbleed€®

Looking through the tube



Summary: Our views on the whole Heartbleed€® bonanza, which seems like partly a PR stunt (for multiple stakeholders)

A LOT has been said about Heartbleed€® since the firm of Microsoft's 'former' security chief (who had worked with the FBI, the NSA's more evil twin) irresponsibly 'leaked' the flaw, and did so at the very same moment that Windows XP users rushed to GNU/Linux for security reasons. I know of such users (even corporations I deal with) and I saw their reaction to this unforeseen 'leak'. Funny timing.



In this post we outline some key facts (carefully and patiently studied over the past 10 days). As my doctoral degree is not far from cryptography and I have consulted people who do security for a living, I can assure readers that we do grasp the technical details, unlike many so-called 'journalists' with degrees in English or history. We are not going to delve into less plausible theories like a connection between the flaw and the NSA although there are circumstantial connections, an NSA program specifically designated to this (NSA operation ORCHESTRA), and we already know that Red Hat relays non-SELinux code directly from the NSA to Torvalds, as we covered earlier this year (meaning that only a developer in the middle knows where the code originally came from). In this particular post we are going to focus on other important points that ought to be made now that Heartbleed€® is mostly out of the headlines and little new information will come out during Easter. This post is based on assessment of about 100 reports and subsequent research lasting many hours.

A little and slightly old tidbit shared with us by iophk (a network security professional) said that even the NSA and its circles are negatively affected by Heartbleed€®. This article states: ""I am waiting for a patch," said Jeff Moss, a security adviser to the U.S. Department of Homeland Security and founder of the Def Con hacking conference."

There are reasons to believe that the NSA was not aware of this flaw or had not exploited it. For instance, the government's demands from Lavabit may suggest that OpenSSL back doors were not known at that time (2013). Also, reading all about the personal background of the man behind the bug, it's nearly impossible to find any connection to the NSA and its ilk. The guy is German, but another German Danish developer (Poul-Henning Kamp, a FreeBSD and Varnish developer) spoke only some months ago about a US program of introducing bugs into FOSS (see "NSA operation ORCHESTRA" above).

iophk responds to the article about firewalls woes by asking: "Why the hell is he not running one based on Linux or BSD? Something's not right. Proprietary "solutions" have no place in infrastructure for just these kinds of reasons."

Well, with Windows, for example, the NSA perhaps assumes a monopoly on back doors. It's a form of total control.

The BSD community, which is also behind OpenSSH, has begun doing some commendable things [1,2] short of throwing away OpenSSL [3]. There is a new release of GnuTLS [4], for example, but we cannot be 100% certain that GnuTLS is immune to "bug doors", as Julian Assange recently called them. "GnuTLS was immune to the OpenSSL bug," writes iophk, "but in regards to the latter was 'responsible disclosure' followed? I got the feeling that it wasn't and that the web site was set up and publicized before even the OpenSSL team was informed. Where can I find a detailed timeline of events?"

Well, a deceiving timeline was later published by the Australian press. Security gurus have widely chastised this form of 'responsible' disclosure of Heartbleed€®; even the project site of OpenSSL hadn't been patched before the disclosure. The same goes for the FBI, which again helps validate claims that the government was not fully aware of the issue.

OpenSSL was having limited resources and some articles covered it [5-7]. Regardless, it's now claimed NSA knew about the bug for 2 years and we should always remember that Microsoft's Howard Schmidt was connected to FBI before his firm published Heartbleed€® for fame, fun, and profit. It's not just Microsoft that makes his motives a tad suspicious. The whole Heartbleed€® thing "has a very media friendly name and a cute logo," as a British FOSS professional put it. It's like a branding exercise. Also see this post titled "What Heartbleed Can Teach The OSS Community About Marketing". "Ties in a bit with what you've posted," iophk told me after I had noted the marketing angle.

As a recap, Heartbleed€® was pretty much branded and released like a product by a firm headed by a Microsoft (and FBI) veteran. This firm also works with Microsoft, so the disclosure on Windows XP's EOL date is too hard to ignore, If this was already known about by the NSA for years, then one may wonder if the disclosure came through whispers rather than research. Glyn Moody was told by Wikileaks (Twitter account seemingly run only by Julian Assange) that "Assange spoke about vulnerability of OS's to bribes and bugdoors in upstream components."

Howard Schmidt (chairman of board of company that marketed Heartbleed€®) worked with the FBI and another NSA partner/PRISM pioneer (Microsoft). If the NSA knew about the bug, then one wonders what role Schmidt may have played. The last thing that the NSA wants is people (especially outside the US) adopting Free software and GNU/Linux because Microsoft is where back doors are; by design, not by accident. Heartbleed€® was reportedly known to the NSA for years (every article that claims this cites Bloomberg, which is notable corporate press and usually a bit dubious when it comes to agenda). If true, this was the type of bug that Edward Snowden's leaks had alluded to (bug doors, not back doors). Schmidt et al. might be trying to exploit it for FUD and profit, by opportunistically divulging it as soon as mass migration to GNU/Linux in enterprises and homes begins. A decade ago it seemed like a back door had been put inside Linux by the NSA, but the developers caught the intrusion and removed it. There were numerous reports last year saying that the NSA had approached Torvalds, asking him for back doors in Linux, so what Seggelmann did in OpenSSL should not be treated too lightly. The time of the committal is a little suspicious [8] (people away from home to celebrate New Year) and the reputation of OpenSSL is now thoroughly destroyed, which will help its competitors (including proprietary) [9]. There is now a lot of FUD out there about FOSS (the only one we're willing to cite is [10] because it's not too malicious), sometimes coming from the mouths of Microsoft boosters or challenging Torvalds' famous "law" [11,12]. I even get taunted over this in Twitter. The old FUD is back, never mind Coverity's latest report which again contradicts such FUD.

Mind the article "Heartbleed security flaw may not be as dangerous as thought" [13], which sheds some light on who's able to exploit and who's not able to exploit Heartbleed€® given the resource limitations (the thing about crackers of the NSA and GCHQ is that they have supercomputers to have a crack at it, and the same is probably true when it comes to the FBI, which is in many ways worse and more aggressive than the NSA; the FBI infiltrates Windows with CIPAV). If the widely-cited reports are true and the NSA knew Heartbleed€® (and used it for two years) [14-17], then it's a massive revelation (the NSA denies this, but denials from the NSA are worthless given its track record when it comes to truth-telling).

Perhaps the most disturbing thing about the story is, the NSA may have discovered Heartbleed€® years ago (if not made it, which sounds unlikely [18]) and the firm of Microsoft's 'former' security chief is making a profit from this [19] (the Heartbleed€® bounty is partly paid by Microsoft and the partly Microsoft-owned Facebook). A bunch of opportunists got paid for irresponsible disclosure that damaged the Internet [20,21] and harmed many people's privacy (potentially leading to some people's deaths).

The GNU/Linux brand is profoundly damaged by this (many GNU/Linux sites mentioned it [22-24]) even though the bug also affects Windows and Apple operating systems. To us it will always seem like marketing campaign coordinated to take place at a strategic date (Windows XP EOL).

Has Microsoft's Howard Schmidt decided to 'leak' it to distract from XP EOL (which means insecurity by policy)? Perhaps. Schmidt had worked with the FBI, so he could have some inside knowledge. He might have former colleagues who could tell him about this (even leak it to him) before he would hype it up, give it a scary name, make a dot com web site, a logo, et cetera, essentially 'merchandising' the FUD.

Related/contextual items from the news:


  1. OpenBSD Team Cleaning Up OpenSSL
  2. OpenBSD has started a massive strip-down and cleanup of OpenSSL
  3. Please Put OpenSSL Out of Its Misery


  4. GNUtls: GnuTLS 3.3.0


  5. How to stop the next Heartbleed bug: pay open-source coders to protect us


  6. Will Open-Source Money Prevent the Next Heartbleed?
  7. 3 big lessons to learn from Heartbleed
    The devastating OpenSSL vulnerability proves the importance of data center orchestration, the wisdom of running older versions, and the need to give back to the OpenSSL project


  8. Heartbleed: developer who introduced the error regrets 'oversight'
    Submitted just seconds before new year in 2012, the bug 'slipped through' – but discovery 'validates' open source


  9. After Heartbleed: 4 OpenSSL alternatives that work


  10. Heartbleed: Open source's worst hour">Heartbleed: Open source's worst hour


  11. Does the Heartbleed bug refute Linus’s Law?
    The mistake being made here is a classic example of Frederic Bastiat’s “things seen versus things unseen”. Critics of Linus’s Law overweight the bug they can see and underweight the high probability that equivalently positioned closed-source security flaws they can’t see are actually far worse, just so far undiscovered.


  12. Heartbleed: Is Linus Torvald’s law invalid?
    How much data was compromised? How many billions lost? None that we know of. How much does the world loses every year because of Microsoft’s proprietary technologies? Billions of dollars are lost; nations’ securities are compromised and people lives are exposed to risks.

    A majority of NSA attacks won’t be possible without bugs in Microsoft products which the company reportedly shares with the agency so that it can be exploited to hack into computers that NSA can spy on. Microsoft bugs allowed USA to take down nuclear programs of countries like Iran, Microsoft bugs enabled NSA to spy on French president. Microsoft bugs allowed ‘alleged’ Chinese crackers to run a massive scale espionage against human rights activists in the US. In addition there are unaccounted thousands of cases every year where people and businesses lose millions due to security holes in Microsoft products.


  13. Heartbleed security flaw may not be as dangerous as thought
    But today, the content distribution network CloudFlare has announced Heartbleed may not allow access to those private keys after all. In two weeks of testing, the company has been unable to successfully access private keys with Heartbleed, suggesting the attack may not be possible at all. "If it is possible, it is at a minimum very hard," researcher Nick Sullivan writes. "And we have reason to believe... that it may in fact be impossible." If true, it makes Heartbleed much less dangerous than many had feared, offering a saving grace for compromised sites. Sullivan acknowledged that, in security tests, some private keys had been revealed by first requests to Apache servers, but he linked this to the process of restarting the server, which would severely limit the exposure to outside actors. Methods have also surfaced to help services tell if attackers have hit their servers using the bug. "Heartbleed still is extremely dangerous," says CEO Matthew Prince, "but some of the worst fears about it having been used by organizations like the NSA to hoover up everyone's private SSL keys look pretty unlikely to us based on this testing."


  14. NSA has been exploiting Heartbleed for two years, leaving Americans exposed to cyber criminals: report [updated]
    As people were wondering NSA’s role in Heartbleed, it turned out that the agency was reportedly aware of the bug, as Bloomberg reports, for the last two years and has been exploiting it to spy on people. If the reports are true and NSA was aware of the bug and instead of getting it fixed it let extremely critical info of US citizens exposed to cyber criminals then NSA does need more oversight from the government.

    Heartbleed was not some minor bug, it affected almost every major web-service including Gmail, Amazon, Yahoo! and many more – holding the potential of exposing sensitive data to criminals. However, as soon as the bug was discovered the Open Source community immediately responded, patched the bug and start pushing the updates.

    While the Americans and the people from around the globe were exposed to cybercriminals, NSA was supposedly busy harvesting passwords and other critical to add it to already massive database.

    Bloomberg quotes Jason Healey, director of the cyber statecraft initiative at the Atlantic Council and a former Air Force cyber officer, “It flies in the face of the agency’s comments that defense comes first. They are going to be completely shredded by the computer security community for this.”


  15. NSA Said to Exploit Heartbleed Bug for Intelligence for Years


  16. Bloomberg: NSA Knew About, Exploited Open Source Heartbleed Bug for Years
  17. The NSA has exploited Heartbleed bug for years, Bloomberg reports


  18. Heartbleed coder admits 'oversight' but backs open source
    Seggelmann submitted the code at 11:59pm on New Year's Eve 2011, but claims the timing had nothing to do with the mistake. Although the bug was also missed by the review process for OpenSSL, an open source project written and reviewed by volunteers, Seggelmann told British newspaper The Guardian that the bug's eventual discovery shows the value of publically available open source code.


  19. Why a hacker got paid for finding the Heartbleed bug
    Microsoft and Facebook have also provided financial backing to Internet Bug Bounty, out of which Mehta's prize money came, after running their own internal bug bounties that were very successful. Their money is benefiting the internet as a whole, but they don't decide what money goes where.


  20. The Internet’s Telltale Heartbleed


  21. Heartbleed developer explains OpenSSL mistake that put Web at risk


  22. SteamOS Affected by Heartbleed Bug, Valve Hasn't Updated the OS Yet


  23. Linux Foundation Responds to the Heartbleed Bug
    It's nearly impossible to know for sure, due to the nature of the vulnerability, how much the Heartbleed vulnerability was used to snoop on secure data. We recommend for our sites the same as for other sites: first, watch for a statement to come out from your financial institutions, email providers, and others, which shares whether they were affected. Start changing your passwords. Use different passwords on different sites and store them in a password safe like KeePass, LastPass or 1Password. That way, if any sites that remain vulnerable leak your password, it won't affect any other sites. Check back on sites that post statements after you changed the password, and then change the passwords again if needed.
  24. Working Out "Serious Security Flaws" In DRM Drivers
    While many are still busy working through fallout of the OpenSSL Heartbleed bug within organizations, on a separate but security related note, kernel developers specializing in the Direct Rendering Manager (DRM) graphics drivers are working to beef up their own driver security.


Comments

Recent Techrights' Posts

IBM Effect at Confluent: Mass Layoffs and IBM's Business Conduct Guidelines (BCGs) Said to be Violated
For Confluent employees who survived the layoffs there will be "culture chock"
 
SLAPP Censorship - Part 16 Out of 200: Detailing the Actors and Explaining Techrights' Own Internet Relay Chat (IRC) Network
For those who have not followed our story
Microsoft "hiding behind bigger news of war, Epstein, other companies' layoffs"
They know what's coming, they just don't know when
Joerg Jaspert (Debian Account Manager/DAM) personally approved Raphael Hertzog's wife Sophie Brun
Reprinted with permission from Daniel Pocock
Letter 'A' prohibited by Code of Conduct extremism
Reprinted with permission from Daniel Pocock
Spoiler: Diversity & Debian means different things to different people
Reprinted with permission from Daniel Pocock
Solicitors Regulation Authority (SRA) Admits Failures and Criticism of Inaction on SLAPPs
many if not all solicitors and solicitor firms in the UK are in effect unregulated
Archiving or Preserving Pages About IBM Layoffs
Layoffs at IBM and the media does not talk about these
ABC, the American National Broadcaster, "Now Publishes Slop"
If the "big media" absorbs slop, it'll no longer be trusted and therefore not read/watched by the public
Links 19/03/2026: Culling Deepfakes of Artists’ Music and "Age Verification Isn’t the Answer"
Links for the day
Gemini Links 19/03/2026: "Aktion GPT-4" and "Kill All Descendants"
Links for the day
"AI" 15 Times in Short 'Article' From The Register MS. And The Register MS Got Paid to Publish It.
gets paid to do this
People Who Decided to Boycott Novell Over Its Microsoft Alliance Should Also Boycott Canonical
As an associate put it, "selling out further, due to Microsoft moles inside Canonical"
Links 19/03/2026: "AI Glasses" as Euphemism for Mass Surveillance and ABC (US) Has Begun Publishing Slop as 'News'
Links for the day
The European Patent Office, Europe's Second-Largest Institution, is on Strike Today
Lots more to come
What People Impacted by the Bluewashing Layoffs at IBM Confluent Say (While the Media Says Nothing at All, in Effect Burying the News)
Worse yet, the mainstream media spreads lies about it right now
IBM Has Turned Red Hat and Fedora Into Slop
This is IBM policy
IBM is Being Robbed, Companies and Jobs Are Destroyed
Companies taken over by IBM will be exploited and destroyed to keep a bubble inflated for a little while longer
In Confluent Layoffs, IBM Vapourises a Quarter of Its Workforce (IBM Buys Something That It Destroys Already)
In the past, such things were typically referred to as "media blackout"; now it's just "the norm".
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, March 18, 2026
IRC logs for Wednesday, March 18, 2026
Links 19/03/2026: LLM Fatigue (It Doesn't Work as Advertised), "Small Web Feeds"
Links for the day
SLAPP Censorship - Part 15 Out of 200: Background and Particulars of Truth Regarding Techrights and Tux Machines
the basic facts (this has aged well, except the times/ages/numbers)
A Slopfarms Survey for Today (linuxteck.com, linuxsecurity.com, linuxjournal.com)
Not only did Google news link to a slopfarm; it linked to three run by the same team!
Links 18/03/2026: "Venture Capitalist Warns That It’s All About to Come Crashing Down" Due to Slop Bubble, "Birdwatching for Fun and no Profit"
Links for the day
IBM Red Hat is Still Promoting Restricted Boot Which Restricts Users' Control Over Their Computers
Red Hat under IBM is a total catastrophe
Arvind Says... Something Something "Hey Hi" (the State of Today's Media)
Look for news about IBM and most likely it'll boil down to some sound bites from an executive and nothing else
New Post Has Just Explained How IBM Gets Robbed by the People Who Fail IBM
Their plan for IBM is a personal plan
Slop-Spewing GAFAM LLM That Knows Nothing and Understands Nothing, It's a Stochastic Parrot That Cannot Even Figure Out Tux Machines is a Community That Started in Tennessee 22 Years Ago
RMS rightly calls those things "bullshit generators"
Cusdeb Makes New Presentation About Where GNU Hurd (Still a Possible Linux Replacement) Stands in 2026
coming from a generally RMS-friendly account
Gemini Links 18/03/2026: Librarians, Phone Anxiety, Growing 'Small' Net, and Slop Versus Software Engineering
Links for the day
Estimates That IBM to Lay Off Close to 10,000 Workers in 2026 (Not Counting People Pushed Out)
There's still chatter about Confluent mass layoffs
Smug Threat by Garrett to Put My Family and I in Prison Doesn't Prove We Did Anything Wrong, It Only Proves He's Truly Desperate to Stop Further Publications That Embarrass Him
his reputation is poor in the United States
systemd Increasingly Microsoft Project, Controlled by Microsoft and Slopware
Cannot allow choice
What IBM Meant to Red Hat: "Proprietary Bundling, Restricted Source Access"
Anyone or anything that joins IBM likely shortens its lifespan
IBM Thrashing Confluent Upon Arrival, Based on Rumours
We deem it a bigger issue that investigative journalism perished, not that one must rely on hearsay online or mere "rumours"
Slop Is Plagiarism, Not (Vibe) Coding, and It's Not Automated, It Doesn't Save Money
Reject misnomers, explain what's actually happening
UPC is Still Illegal and Unconstitutional (Kangaroo Court for Patents, Manned by Corporate Staff), Federal Court of Justice of Germany Receives Belated Complaint About It
What is happening to Europe???
EPO Demonstration Happening Right Now, Later This Week Things Will Only Escalate Further
The SUEPO The Hague Committee wrote to staff this morning
Sophie Brun, Raphael Hertzog & Debian sexual conflicts of interest
Reprinted with permission from Daniel Pocock
Links 18/03/2026: Commodore's Hedley Davis Dies, Apple Not Good Enough, Cheeto "Floats Treason Charges for Iran War Coverage"
Links for the day
A Step Close to Shutting Down the European Patent Office (EPO)
Not going to work all month long
EPO Staff Demonstration Today
The demonstration will be live-streamed for those thousands of colleagues who don't live in Munich
Gemini Links 18/03/2026: Brazilian SYN Attacks and BGP
Links for the day
LibreLocal Also Coming to Jordan, Kenya, Mexico, New Zealand, and Spain
It helps raise awareness of Software Freedom
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, March 17, 2026
IRC logs for Tuesday, March 17, 2026
Microsofters' SLAPP Censorship - Part 14 Out of 200: Men Who Strangle Women (and Worse) Trying to Force Us to Write Public Apologies to These Men
For those who never before saw a SLAPP, they basically make many demands
Instant Bluewashing at Confluent: Mass Layoffs Alleged at IBM
So the main question is, did IBM just fire 800 people?
"Vibe-forking" and Why It'll Ultimately Fail (Hype on Top of Hype)
Code made with LLMs sucks; converting solid, human-tested code into slop only complicates matters and increases risk
Updates About Richard Stallman's Free Software Foundation
After all those years (a decade) and in spite of phony scandals many people out there still respect him
LLM Slop With "Linux" in the Domain Names
This is becoming a pain and a problem also in the arts and in software engineering
The EFF Has a Bug, Fixing This Bug is Likely Not Possible Anymore
"the EFF's continued existence impairs the arrival of a replacement organization, one which will actually champion digital rights."
Links 17/03/2026: Microsoft Windows Broken by Samsung, Afghanistan-Pakistan War Escalation
Links for the day
Gemini Links 17/03/2026: Newcomers and False-Positive 'Slop'
Links for the day
Héctor Orón Martínez & Debian shadow candidate pressure on Sruthi Chandran
Reprinted with permission from Daniel Pocock
Links 17/03/2026: American Fentanylware (TikTok) Investors Implicated in Kickbacks, "Big Oil Knew It Was Wrecking Louisiana’s Coast"
Links for the day
For Third Time in a Week The Register MS Runs Google SPAM That Paints Google as an Ally of Women (Which is False, They're Womanisers)
What does that make The Register MS to women?
British Justice Minister Sarah Sackman Blasts Solicitors Regulation Authority (SRA)
The "legal industry" is due for "some reckoning"
GAFAM Deprecating Old Videos ("Content") by Removing the Support for Their Format for No Good Reason
"Security" is not a valid excuse
Credit/Debit Cards Have Long Been Called Plastics, Over Time They're Becoming More Like Pure Plastics
They cost less than a dollar to manufacture
The European Patent Office (EPO) Holds a Public Demonstration Tomorrow and It'll be Live-streamed
The EPO's workforce was meant to be capable of speaking many languages and have extensive experience in the sciences
People Who Attacked Techrights Also Attacked My Mother
Picking on old ladies because you don't like Free software advocates is never OK
Little Community Element Left in CentOS
CentOS, unlike Fedora, was meant to be long supported and solid
Social Control Media is Cancel Culture (Companies Like Facebook Also Punish/Ban Accounts for Mentioning "Linux" and Lobby for Anti-Linux Legislation)
The masters of Social Control Media decide what ideas can and cannot be expressed
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, March 16, 2026
IRC logs for Monday, March 16, 2026