Roll20 uses cookies to improve your experience on our site. Cookies enable you to enjoy certain features, social sharing functionality, and tailor message and display ads to your interests on our site and others. They also help us understand how our site is being used. By continuing to use our site, you consent to our use of cookies. Update your cookie preferences .
×
Create a free account

Heartbleed Bug

1397851573

Edited 1397860290
The Storyteller
Sheet Author
Was Roll20 affected by this bug? I figure there are enough active users where it might be good to inquire. <a href="http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/" rel="nofollow">http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/</a>
1397856816

Edited 1397856985
Lithl
Pro
Sheet Author
API Scripter
Heartbleed Fix has scanned both app.roll20.net and marketplace.roll20.net and found it not vulnerable to the heartbleed exploit. That said, I believe Roll20 uses a third party for account payment information. The upshot of that is even if Roll20 were vulnerable, an attacker wouldn't get things like users' financial information; at worst, they'd gain DB access, delete campaigns, and send spam email. On the other hand, without knowing what that third party vendor is, I can't say whether they're vulnerable. ~_^ Note that only the OpenSSL implementation of SSL/TLS is vulnerable to heartbleed . OpenSSL is by and large only in use on *nix servers, while IIS (Windows) servers use an alternate implementation that is not vulnerable. Further, OpenSSL version 1.0.1g was released in less than 48 hours of the exploit's discovery, fixing the vulnerability, and the fix was also backported to other 1.0.1 versions; closing a server's vulnerability to the bug takes less than two minutes of a server administrator's time. (I should know, I did it myself on my personal server.) (Interesting side note: the vulnerability in OpenSSL was committed to the repository at ~11:58pm on a New Years' Eve, and was written by the same guy who proposed the heartbeat extension to TLS in the first place -- the very piece of the protocol being exploited by the bug.)
Brilliant! Curiosity satiated... for now. -.-