Home News Forum Articles
  Welcome back Join CF
You are here You are here: Home | Forum | Huge OpenSSL Bug - Heartbleed

You are currently viewing our boards as a guest which gives you limited access to view most of the discussions, articles and other free features. By joining our Virgin Media community you will have full access to all discussions, be able to view and post threads, communicate privately with other members (PM), respond to polls, upload your own images/photos, and access many other special features. Registration is fast, simple and absolutely free so please join our community today.


Welcome to Cable Forum
Go Back   Cable Forum > Computers & IT > Security & Virus Discussion

Huge OpenSSL Bug - Heartbleed
Reply
 
Thread Tools
Old 17-04-2014, 09:26   #61
Osem
Inactive
 
Join Date: Oct 2006
Location: Right here!
Posts: 22,316
Osem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered stars
Osem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered starsOsem is seeing silvered stars
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by Qtx View Post
The information like credit card details which are already stored on a website should be safe (famous last words?). Simply put, it never enters the region of memory on the server that can be read by this attack.

If someone did get your login details through the flaw, they could login to a site and look at the account page but these often hold back enough details to stop criminals making use of it.

A nasty person hanging out on your wifi (or someone running a naughty coffee shop type hotspot with their laptop, which happens more than you think) who managed to get the encryption keys to a site you visit, could log your traffic to that site and decrypt it. So if you brought something on that site by entering your credit card details, they could decrypt it and see your card details that way. Slim chance but possible. The server changing the keys after patching fixes this for future attacks of this kind but traffic logged previous to this can still be decrypted.
TVM for clarifying.

---------- Post added at 09:26 ---------- Previous post was at 09:25 ----------

Quote:
Originally Posted by Matt D View Post
Not necessarily...

Of all the sites and services I've registered with, only three have contacted me about Heartbleed: Tumblr and IFTTT emailed me to admit they were vulnerable and warn me to change me password, while 1Password emailed me to reassure me that it didn't use OpenSSL and there was nothing to worry about regarding 1P.

Yahoo was probably the highest profile site to suffer from Heartbleed, because unlike Google and various others it was not patched until *after* the vulnerability was made public (seems it wasn't warned in advance!)...From reading Twitter and other sites, many people apparently had a field day with Yahoo last Tuesday...

But, despite that, I've had no contact from Yahoo saying I should change my password.

Most "big sites" have relied upon statements to the media, and/or posts buried on their own sites... Some of which gave a lot of detail, others of which have been very vague... I would not take lack of contact as being equivalent to lack of vulnerability or risk.
Cheers.
Osem is offline   Reply With Quote
Advertisement
Old 17-04-2014, 13:31   #62
joglynne
Born again teenager.
 
joglynne's Avatar
 
Join Date: Feb 2007
Location: Manchester. (VM area 20)
Age: 75
Services: Maxit TV, M250 Fibre BB. Phone-Anytime Chatter
Posts: 13,699
joglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aura
joglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aurajoglynne has a golden aura
Re: Huge OpenSSL Bug - Heartbleed

The Register has released a further article this morning. Not sure how much of the content has already been discussed but just in case there is something new covered here is the link.

Quote:
Software that claims to detect the presence of OpenSSL's Heartbleed bug in servers, PCs and other gear may falsely report a system to be safe when users are actually in danger, according to a security consultancy. <snip>
http://www.theregister.co.uk/2014/04...tion_glitches/
__________________
"I intend to live forever, or die trying" - Groucho Marx..... "but whilst I do I shall do so disgracefully." Jo Glynne
joglynne is offline   Reply With Quote
Old 18-04-2014, 22:02   #63
Qtx
CF's Worst Nightmare
 
Join Date: May 2012
Location: Probably outside the M25
Services: Sky Fibre Unlimited 40/10
Posts: 3,473
Qtx has a bronzed appealQtx has a bronzed appeal
Qtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appeal
Re: Huge OpenSSL Bug - Heartbleed

Attackers Exploit the Heartbleed OpenSSL Vulnerability to Circumvent Multi-factor Authentication on VPNs

Quote:
Beginning on April 8, an attacker leveraged the Heartbleed vulnerability against a VPN appliance and hijacked multiple active user sessions. Specifically, the attacker repeatedly sent malformed heartbeat requests to the HTTPS web server running on the VPN device, which was compiled with a vulnerable version of OpenSSL, to obtain active session tokens for currently authenticated users. With an active session token, the attacker successfully hijacked multiple active user sessions and convinced the VPN concentrator that he/she was legitimately authenticated. The attack bypassed both the organization’s multifactor authentication and the VPN client software used to validate that systems connecting to the VPN were owned by the organization and running specific security software.
Lots of companies run VPN's so that employees can access network resources while at home or out of the office so worth remembering that this bug doesn't just affect websites. As well as VPN's other services like email, FTP servers etc are also vulnerable.
Qtx is offline   Reply With Quote
Old 20-04-2014, 13:31   #64
Ignitionnet
Inactive
 
Join Date: Jun 2008
Location: Leeds, West Yorkshire
Age: 45
Posts: 13,996
Ignitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny stars
Ignitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny stars
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by Qtx View Post
Attackers Exploit the Heartbleed OpenSSL Vulnerability to Circumvent Multi-factor Authentication on VPNs



Lots of companies run VPN's so that employees can access network resources while at home or out of the office so worth remembering that this bug doesn't just affect websites. As well as VPN's other services like email, FTP servers etc are also vulnerable.
If a company has the management of their VPN appliances exposed to the internet at large they are in real trouble generally and need to fire their security guy.

There are tons of different devices all over the place whose GUIs are vulnerable to this kind of attack, none of which should be exposed to the internet.
Ignitionnet is offline   Reply With Quote
Old 20-04-2014, 14:19   #65
Qtx
CF's Worst Nightmare
 
Join Date: May 2012
Location: Probably outside the M25
Services: Sky Fibre Unlimited 40/10
Posts: 3,473
Qtx has a bronzed appealQtx has a bronzed appeal
Qtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appeal
Re: Huge OpenSSL Bug - Heartbleed

Ignition, they don't need to have any gui running to exploit this on a VPN. The exploit works over multiple services, not just webservers/http servers. So the attack described above happened by attacking the OpenVPN service on port 1194, not port 80. You can attack mail/ftp servers on their standard ports. The same SSL libraries are used across all these different protocols.
Qtx is offline   Reply With Quote
Old 20-04-2014, 20:12   #66
Tezcatlipoca
Inactive
 
Tezcatlipoca's Avatar
 
Join Date: Jun 2003
Location: Cambridge
Posts: 16,760
Tezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny stars
Tezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny stars
Re: Huge OpenSSL Bug - Heartbleed

The "Not valid before" date for Google's certificate has changed again, from 2nd April to 9th April.
Tezcatlipoca is offline   Reply With Quote
Old 21-04-2014, 15:19   #67
Tezcatlipoca
Inactive
 
Tezcatlipoca's Avatar
 
Join Date: Jun 2003
Location: Cambridge
Posts: 16,760
Tezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny stars
Tezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny starsTezcatlipoca has a pair of shiny stars
Re: Huge OpenSSL Bug - Heartbleed

Heartbleed disclosure timeline
Tezcatlipoca is offline   Reply With Quote
Old 21-04-2014, 23:40   #68
Maggy
The Invisible Woman
Cable Forum Team
 
Maggy's Avatar
 
Join Date: Jun 2003
Location: between Portsmouth and Southampton.
Age: 71
Services: VM XL TV,50 MB VM BB,VM landline, Tivo
Posts: 40,161
Maggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden aura
Maggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden auraMaggy has a golden aura
Re: Huge OpenSSL Bug - Heartbleed

So is there any news of anyone being 'hacked'?
__________________
Hell is empty and all the devils are here. Shakespeare..
Maggy is offline   Reply With Quote
Old 22-04-2014, 01:10   #69
Qtx
CF's Worst Nightmare
 
Join Date: May 2012
Location: Probably outside the M25
Services: Sky Fibre Unlimited 40/10
Posts: 3,473
Qtx has a bronzed appealQtx has a bronzed appeal
Qtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appeal
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by Maggy J View Post
So is there any news of anyone being 'hacked'?
Yahoo mail accounts, ars technica, Mumsnet and the Canadian tax office are the ones the media got hold of. Some companies have had their networks broken in to with this but they probably wont admit it as no customer type information was at risk. Amazon web services (AWS) which is their webserver hosting side of the business was vulnerable and many companies that used them were vulnerable, such as Logitech who still havn't muttered a word.

Probably a lot more to come but most wont even know they were hacked. The Internet Storm Centre at Sans has a nice writeup on how they spotted one of the attacks. Finding the bleeders
Qtx is offline   Reply With Quote
Old 22-04-2014, 09:19   #70
Stuart
-
 
Stuart's Avatar
 
Join Date: Jun 2003
Location: Somewhere
Services: Virgin for TV and Internet, BT for phone
Posts: 26,536
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by qasdfdsaq View Post
While I agree it can be done over WiFi the effort required makes it unlikely unless someone is specifically targeting you.
This is actually an example of one important thing we were taught when I learned software engineering in my degree. You cannot design a totally infallible security system. The best you can hope for is to make it unfeasible for anyone to successfully attack you, or at least not worth the attackers while. For an example of this, look at viruses. Arguably, even Windows is a lot more secure than some OSes from the 90s and before, but no one writes viruses for them as it's not worth anyone's while.
Stuart is offline   Reply With Quote
Old 23-04-2014, 19:00   #71
qasdfdsaq
cf.mega poster
 
Join Date: Aug 2004
Posts: 11,207
qasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronze
qasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronze
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by Ignitionnet View Post
If a company has the management of their VPN appliances exposed to the internet at large they are in real trouble generally and need to fire their security guy.

There are tons of different devices all over the place whose GUIs are vulnerable to this kind of attack, none of which should be exposed to the internet.
You forget the widespread proliferation of SSL VPNs that seem to be getting everywhere these days.

---------- Post added at 19:00 ---------- Previous post was at 18:59 ----------

Quote:
Originally Posted by Stuart View Post
This is actually an example of one important thing we were taught when I learned software engineering in my degree. You cannot design a totally infallible security system. The best you can hope for is to make it unfeasible for anyone to successfully attack you, or at least not worth the attackers while. For an example of this, look at viruses. Arguably, even Windows is a lot more secure than some OSes from the 90s and before, but no one writes viruses for them as it's not worth anyone's while.
Quantum cryptography? Not read about it in a while but last I heard there was a form of it which is "uncrackable", at least without detection.
qasdfdsaq is offline   Reply With Quote
Old 24-04-2014, 10:33   #72
Ignitionnet
Inactive
 
Join Date: Jun 2008
Location: Leeds, West Yorkshire
Age: 45
Posts: 13,996
Ignitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny stars
Ignitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny stars
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by Qtx View Post
Ignition, they don't need to have any gui running to exploit this on a VPN. The exploit works over multiple services, not just webservers/http servers. So the attack described above happened by attacking the OpenVPN service on port 1194, not port 80. You can attack mail/ftp servers on their standard ports. The same SSL libraries are used across all these different protocols.
I see what you are saying but was referring to your quote where the guy was attacking the appliance's GUI.

Quote:
Specifically, the attacker repeatedly sent malformed heartbeat requests to the HTTPS web server running on the VPN device, which was compiled with a vulnerable version of OpenSSL, to obtain active session tokens for currently authenticated users.
Obviously anything compiled with the OpenSSL libraries and exposed to the internet is problematic.

---------- Post added at 10:30 ---------- Previous post was at 10:21 ----------

Quote:
Originally Posted by qasdfdsaq View Post
You forget the widespread proliferation of SSL VPNs that seem to be getting everywhere these days.
Absolutely, I remember their starting to get popular in my formative years in IT. Which was over a decade ago. Ugh. I'm old.

Quote:
Originally Posted by qasdfdsaq View Post
Quantum cryptography? Not read about it in a while but last I heard there was a form of it which is "uncrackable", at least without detection.
Indeed, you're probably thinking of quantum key distribution. Due to quantum indeterminacy bits encoded as quantum data become mangled as soon as they are measured, hence intercepted en route.

It should be remembered that the actual encryption here is robust and remains strong. The issue is with one part of the standard not related in any way to the maths, the TLS heartbeat extension, and a badly written implementation of it. This isn't actually related to encryption at all, it's a plain, simple software bug. It just happens to be a bug on a bit of software attached to a socket that an awful lot of servers have exposed to the internet.

---------- Post added at 10:33 ---------- Previous post was at 10:30 ----------

Quote:
Originally Posted by thenry View Post
Police have charged a 19-year-old man from London, Ont., in connection with the loss of taxpayer data from the Canada Revenue Agency website.

http://www.calgaryherald.com/news/na...952/story.html
What a noob.

Quote:
Solis-Reyes is a computer science student at Western University, a spokesman for the university said.
He'd have failed the degree anyway if he seriously thought he could exploit such a high profile bug without in any way covering his tracks.
Ignitionnet is offline   Reply With Quote
Old 24-04-2014, 10:58   #73
Qtx
CF's Worst Nightmare
 
Join Date: May 2012
Location: Probably outside the M25
Services: Sky Fibre Unlimited 40/10
Posts: 3,473
Qtx has a bronzed appealQtx has a bronzed appeal
Qtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appealQtx has a bronzed appeal
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by Ignitionnet View Post
I see what you are saying but was referring to your quote where the guy was attacking the appliance's GUI.
So it does!
Qtx is offline   Reply With Quote
Old 24-04-2014, 13:43   #74
Stuart
-
 
Stuart's Avatar
 
Join Date: Jun 2003
Location: Somewhere
Services: Virgin for TV and Internet, BT for phone
Posts: 26,536
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by Ignitionnet View Post
There are tons of different devices all over the place whose GUIs are vulnerable to this kind of attack, none of which should be exposed to the internet.
Unfortunately, that is a massive problem. Bit like an article I read a couple of years ago where someone demonstrated how to use Google to search for HP printers.

I think the reasons behind this are twofold:
  1. A lot of these appliances are installed by someone with little or no knowledge of network security.
  2. "Ease of Maintenance". Exposing the admin tools of any network connected device (be it a VPN, printer or even power station control system) to the internet is obviously a stupid thing, but it also seems to be seen as a good way to save money. After all, one technician can sit at his or her desk and diagnose or fix problems with multiple systems, some of which may be thousands of miles away. Unfortunately, when presented with that kind of "saving", a lot of managers will not think about it any further, and a lot won't think of the security implications. They certainly won't think that they may be saving the salary of four or five technicians, but may have to pay out hundreds of thousands of pounds to fix the problems caused when their system is hacked.
Stuart is offline   Reply With Quote
Old 25-04-2014, 10:06   #75
Ignitionnet
Inactive
 
Join Date: Jun 2008
Location: Leeds, West Yorkshire
Age: 45
Posts: 13,996
Ignitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny stars
Ignitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny starsIgnitionnet has a pair of shiny stars
Re: Huge OpenSSL Bug - Heartbleed

Quote:
Originally Posted by Stuart View Post
Unfortunately, that is a massive problem. Bit like an article I read a couple of years ago where someone demonstrated how to use Google to search for HP printers.

I think the reasons behind this are twofold:
  1. A lot of these appliances are installed by someone with little or no knowledge of network security.
  2. "Ease of Maintenance". Exposing the admin tools of any network connected device (be it a VPN, printer or even power station control system) to the internet is obviously a stupid thing, but it also seems to be seen as a good way to save money. After all, one technician can sit at his or her desk and diagnose or fix problems with multiple systems, some of which may be thousands of miles away. Unfortunately, when presented with that kind of "saving", a lot of managers will not think about it any further, and a lot won't think of the security implications. They certainly won't think that they may be saving the salary of four or five technicians, but may have to pay out hundreds of thousands of pounds to fix the problems caused when their system is hacked.
The first of the two shouldn't be an issue. An appliance like this should be privately addressed and using a mapped IP on the firewall for access for access to the services it provides only, not its management interface.

The second isn't saving money so much as lazy. If you want to manage a VPN appliance from outside of your network why not VPN into the appliance to manage it?

If access from the Internet is required in case of VPN failure simply ensure that the guy managing devices has a static IP address on the interwebs and permit them access, only, to the management interfaces.

Zero excuse for a leaky perimeter. Internal security is problematic, holes are punched in firewalls to allow services to work, but perimeter should really have a single management point, the big scary security/network guy.
Ignitionnet is offline   Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +1. The time now is 04:09.


Server: osmium.zmnt.uk
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.