I will probably:
- review the list for sites storing truly sensitive information
- change those as soon as it seems clear the site is ready for that
- change the remainder the next time I use the site or if the site requests/forces a change.
This means some of them will never be changed, because I will never use the site again, and that's the source of the efficiency gain over doing them all now. In fact this might eventually provoke a clear-up of pointless accounts. In the context of doing that, changing passwords isn't such a big operation.
I think (although I am not sure) that if I very infrequently use a site then there's relatively little chance of my password on that site having being compromised due to heartbleed. Hence the preference for sites I actually use.
The main danger of that guess being wrong is if it turns out that heartbleed has been actively exploited for a long time. Then there is plenty of opportunity for masses of passwords to have been compromised either directly via heartbleed, or by the use of private keys or admin credentials from heartbleed.
[Edit: it's starting to look like maybe heartbleed has been exploited by the NSA for about as long as it has existed. Will have to wait for more information on that, but in any case I'm not as concerned by the NSA having my passwords as you might expect. If the NSA wants my passwords then it has them, heartbleed is one of only many means by which they might acquire them. If they've had them for two years then another month until I find time to change a bunch of low-value accounts won't make a difference.]
The main danger of delaying the password change is that somebody might already have my password, but either hasn't got around to pulling it out of the GB of data they obtained using heartbleed, or else hasn't got around to using it yet. Hence the preference for more sensitive systems.
Dashlane can apparently do this as a service. – CMCDragonkai – 2015-05-20T12:20:41.743
6
Please read this fine literature before changing all your passwords: http://security.stackexchange.com/questions/55283/should-i-change-all-my-passwords-due-to-heartbleed
– MonkeyZeus – 2014-04-09T19:43:25.4104
I'm glad you enjoyed my humor :) but in all seriousness there is no easy way out. And I think you may have missed the main point of my link which is this section: Changing passwords on a site that is/was vulnerable to Heartbleed is only effective after
– MonkeyZeus – 2014-04-09T20:08:17.240Referencing this question on [security.se]: API to change passwords?
– unor – 2014-04-11T18:07:53.2901good thing that we're now moving on to OpenID/OpenAuth based signon. All you need is just change the password for the identity provider and the rest is on the individual websites. Also, do note that it's only worth it to change password for sites that have already updated their OpenSSL library; probably a good number of those 200 websites you have never makes any updates on their system even in the face of Heartbleed. – Lie Ryan – 2014-04-12T20:52:53.573
it will probably take a weekend of dedicated work. – Sam – 2014-04-13T22:39:22.947
2Congratulations on being the one user that actually uses different passwords for each different service. – JFA – 2014-04-14T00:22:33.853
@JFA hah, thanks! :-) It's like being chased by a bear, I guess: I don't have to outrun the bear, it's enough if I outrun my buddy! – Torben Gundtofte-Bruun – 2014-04-14T10:57:32.227