Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.
The findings come shortly after a challenge created by CloudFlare, a San Francisco-based company that runs a security and redundancy service for website operators.
[ Also on InfoWorld: 5 no-bull facts you need to know about Heartbleed right now. | And: After Heartbleed: 4 OpenSSL alternatives that work. | Prevent corporate data leaks with Roger Grimes' "Data Loss Prevention Deep Dive" PDF expert guide, only from InfoWorld. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
CloudFlare asked the security community if the flaw in the OpenSSL cryptographic library, made public last week, could be used to obtain the private key used to create an encrypted channel between users and websites, known as SSL/TLS (Secure Sockets Layer/Transport Security Layer).
The private key is part of a security certificate that verifies a client computer isn't connecting with a fake website purporting to be a legitimate one. Browsers indicate a secure connection with a padlock and show a warning if the certificate is invalid.
Security experts thought it might be possible that the private key could be divulged by exploiting the Heartbleed flaw, which may have affected two-thirds of the Internet and set off a mad scramble to apply a patch that fixes it.
"This result reminds us not to underestimate the power of the crowd and emphasizes the danger posed by this vulnerability," wrote Nick Sullivan of CloudFlare on the company's blog.
By obtaining the private key for an SSL/TLS certificate, an attacker could set up a fake website that passes the security verification. They could also decrypt traffic passing between a client and a server, known as a man-in-the-middle attack, or possibly unscramble encrypted communications they've collected in the past.
CloudFlare set up a server running the Nginx-1.5.13 Web server software using OpenSSL version 1.0.1.f on Ubuntu 13.10 x86_64.
Fedor Indutny of Moscow was the first person to obtain the key, Sullivan wrote. The Heartbleed bug divulges data in 64K batches from a computer's memory. The data can include log-in credentials for people who have recently logged into the server.
Attackers can keep hitting the server repeatedly, each time obtaining 64K of data in memory. The Heartbleed attack is particularly dangerous since it leaves few traces, allowing attackers to continue to try until they obtain the desired information.
Researchers are still trying to figure out the conditions under which what specific data is revealed. OpenSSL, an open source program, is used in a wide variety of operating systems, mobile applications, routers, and other networking equipment.
Sullivan wrote Indutny sent 2.5 million requests to the test server over the course of a day. The second person to get the key, Ilkka Mattila of the National Cyber Security Centre Finland, obtained it with fewer requests, around 100,000, he wrote.
"We confirmed that all individuals used only the Heartbleed exploit to obtain the private key," Sullivan wrote.
How the researchers each accomplished obtaining the private key hasn't been revealed. "It is at the discretion of the researchers to share the specifics of the techniques used," Sullivan wrote.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk