Guarding against Heartbleed not so simple

Placeholder Image for Article Template

The Department of Homeland Security's cybersecurity chief said the ongoing assessment of the impact of the Heartbleed OpenSSL flaw on federal IT systems will take time -- and IT security experts warned it might take even longer than initially expected.

In an April 18 post on the agency's website, Phyllis Schneck, DHS' deputy undersecretary for cybersecurity, said the vulnerability was unusual in its reach, ease of use and length of time before it was discovered.

"It is important to note that it takes time to address this issue properly," she wrote. She urged agencies to identify where the vulnerability is, formulate a response and implement that response without inflicting harm on critical systems.

DHS, the Internal Revenue Service and other agencies have declared that their sites were not threatened by Heartbleed. The Defense Department joined that chorus on April 19, when Deputy CIO Richard Hale said the software bug has no effect on DOD's classified networks and minimal effect on its unclassified sites. Upon learning of the OpenSSL flaw, Hale said, DOD immediately blocked "the exploitation of this vulnerability at the boundary between the department's network and the Internet."

Yet Schneck's recommendations and recent steps taken with logins show that agencies are proceeding carefully and still determining the full effects of the flaw.

IT security experts agreed that Heartbleed's impact could be insidious and long-lasting for federal systems. "With security, you never know when you're done," said Sushil Jajodia, director of the Center for Secure Information Systems at George Mason University. Heartbleed can be fixed by patching vulnerable equipment such as servers, but security issues evolve, he added.

Heartbleed is a very slippery problem that could open up more ways for criminals or even nation states to sneak into federal IT systems and steal information, said Angelos Stavrou, associate professor of computer science at GMU's Volgenau School of Engineering. One exploit, dubbed Reverse Heartbleed, could be particularly troubling for DHS, said Stavrou, who works mainly on national security projects. Meldium, the firm that discovered the variant on the exploit, said Reverse Heartbleed allows access to networks even though underlying servers have been patched.

According to a statement on Meldium's website, the most straightforward Heartbleed attack would be "a malicious client attacking an HTTPS server to steal cookies, private keys and other secrets." However, "a malicious server can also send bad heartbeat packets to a client that uses OpenSSL and extract data from that client. The [Transport Layer Security] heartbeats used in this attack are symmetric: They can be initiated by either the 'client' or the 'server' in a TLS connection, and both endpoints use the same vulnerable parsing code."

Stavrou said that means DHS and large federal IT agencies not only have to patch hundreds of servers but also have to keep a close eye on external devices at companies and other entities that work with federal agencies.

Meldium said the reverse attack can affect browsers, applications that use HTTP APIs (everything from Dropbox to Microsoft Office) and many mobile apps that run on iOS and Android. "It could be easy to direct one of those clients to connect to a malicious server (as in the case of a Web browser), or it might require a man-in-the-middle attack to redirect a client to an evil endpoint," the company states on its website.

With Reverse Heartbleed, "the problem went from hundreds of servers to thousands of client devices," Stavrou said. He advised federal IT managers to quickly take advantage of patches being offered by IT gear makers such as Cisco Systems and others.

Neither Stavrou nor Jajodia would speculate on how long it might take the government to apply patches to all vulnerable federal systems, but both said the job would eventually get done.

In her April 18 post, Schneck advised agencies that use OpenSSL to update to secure versions of the open-source code, reissue certificates for their websites and ask users to reset passwords.

The federal government "is working at an aggressive yet appropriate pace in our response and acting out of an abundance of caution," she wrote.

The government has enabled network defenses across agencies to detect anyone trying to use the exploit and in many cases to block those attempts, she said. Officials have also started scanning for the Heartbleed vulnerability in IT operations.

FCW staff writer Sean Lyngaas contributed to this report.

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at or follow him on Twitter at @MRockwell4.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group