Heartbleed is a security bug in some outdated versions of the OpenSSLcryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbleed could be exploited regardless of whether the vulnerable OpenSSL instance is running as a TLS server or client. It resulted from improper input validation (due to a missing bounds check) in the implementation of the TLS heartbeat extension.[5] Thus, the bug's name derived from heartbeat.[6] The vulnerability was classified as a buffer over-read,[7] a situation where more data can be read than should be allowed.[8]
System administrators were frequently slow to patch their systems. As of 20 May 2014[update], 1.5% of the 800,000 most popular TLS-enabled websites were still vulnerable to the bug,[12] and by 21 June 2014[update], 309,197 public web servers remained vulnerable.[13] According to a 23 January 2017[update] report[14] from Shodan, nearly 180,000 internet-connected devices were still vulnerable to the bug,[15][16] but by 6 July 2017[update], the number had dropped to 144,000 according to a search performed on shodan.io for the vulnerability.[17] Around two years later, 11 July 2019[update], Shodan reported[18] that 91,063 devices were vulnerable. The U.S. had the most vulnerable devices, with 21,258 (23%), and the 10 countries with the most vulnerable devices had a total of 56,537 vulnerable devices (62%). The remaining countries totaled 34,526 devices (38%). The report also broke the devices down by 10 other categories such as organization (the top 3 were wireless companies), product (Apache httpd, Nginx), and service (HTTPS, 81%).
History
The Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols was proposed as a standard in February 2012 by RFC6520.[19] It provides a way to test and keep alive secure communication links without the need to renegotiate the connection each time. In 2011, one of the RFC's authors, Robin Seggelmann, then a Ph.D. student at the Fachhochschule Münster, implemented the Heartbeat Extension for OpenSSL. Following Seggelmann's request to put the result of his work into OpenSSL,[20][21][22] his change was reviewed by Stephen N. Henson, one of OpenSSL's four core developers. Henson failed to notice a bug in Seggelmann's implementation, and introduced the flawed code into OpenSSL's source code repository on 31 December 2011. The defect spread with the release of OpenSSL version 1.0.1 on 14 March 2012. Heartbeat support was enabled by default, causing affected versions to be vulnerable.[3][23]
Discovery
According to Mark J. Cox of OpenSSL, Neel Mehta of Google's security team privately reported Heartbleed to the OpenSSL team on 1 April 2014 11:09 UTC.[24]
The bug was named by an engineer at Synopsys Software Integrity Group, a Finnish cyber security company that also created the bleeding heart logo,[25] designed by a Finnish graphic designer Leena Kurjenniska, and launched an informational website, heartbleed.com.[26] While Google's security team reported Heartbleed to OpenSSL first, both Google and Codenomicon discovered it independently at approximately the same time.[27][28] Codenomicon reports 3 April 2014 as their date of discovery and their date of notification of NCSC-FI [fi] for vulnerability coordination.[29]
Some might argue that Heartbleed is the worst vulnerability found (at least in terms of its potential impact) since commercial traffic began to flow on the Internet.[38]
An unidentified UK Cabinet Office spokesman recommended that:
People should take advice on changing passwords from the websites they use.
Most websites have corrected the bug and are best placed to advise what action, if any, people need to take.[39]
If you need strong anonymity or privacy on the Internet, you might want to stay away from the Internet entirely for the next few days while things settle.[40]
The Sydney Morning Herald published a timeline of the discovery on 15 April 2014, showing that some organizations had been able to patch the bug before its public disclosure. In some cases, it is not clear how they found out.[41]
Bugfix and deployment
Bodo Möller and Adam Langley of Google prepared the fix for Heartbleed. The resulting patch was added to Red Hat's issue tracker on 21 March 2014.[42] Stephen N. Henson applied the fix to OpenSSL's version control system on 7 April.[43] The first fixed version, 1.0.1g, was released on the same day. As of 21 June 2014[update], 309,197 public web servers remained vulnerable.[13] As of 23 January 2017[update], according to a report[14] from Shodan, nearly 180,000 internet-connected devices were still vulnerable.[15][16] The number had dropped to 144,000 as of 6 July 2017[update], according to a search on shodan.io for "vuln:cve-2014-0160".[17]
Certificate renewal and revocation
According to Netcraft, about 30,000 of the 500,000+ X.509 certificates which could have been compromised due to Heartbleed had been reissued by 11 April 2014, although fewer had been revoked.[44]
By 9 May 2014, only 43% of affected web sites had reissued their security certificates. In addition, 7% of the reissued security certificates used the potentially compromised keys. Netcraft stated:
By reusing the same private key, a site that was affected by the Heartbleed bug still faces exactly the same risks as those that have not yet replaced their SSL certificates.[45]
eWeek said, "[Heartbleed is] likely to remain a risk for months, if not years, to come."[46]
The Canada Revenue Agency reported a theft of social insurance numbers belonging to 900 taxpayers, and said that they were accessed through an exploit of the bug during a 6-hour period on 8 April 2014.[48] After the discovery of the attack, the agency shut down its website and extended the taxpayer filing deadline from 30 April to 5 May.[49] The agency said it would provide credit protection services at no cost to anyone affected. On 16 April, the RCMP announced they had charged a computer science student in relation to the theft with unauthorized use of a computer and mischief in relation to data.[50][51]
The UK parenting site Mumsnet had several user accounts hijacked, and its CEO was impersonated.[52] The site later published an explanation of the incident saying it was due to Heartbleed and the technical staff patched it promptly.[53]
Anti-malware researchers also exploited Heartbleed to their own advantage in order to access secret forums used by cybercriminals.[54] Studies were also conducted by deliberately setting up vulnerable machines. For example, on 12 April 2014, at least two independent researchers were able to steal private keys from an experimental server intentionally set up for that purpose by CloudFlare.[55][56] Also, on 15 April 2014, J. Alex Halderman, a professor at University of Michigan, reported that his honeypot server, an intentionally vulnerable server designed to attract attacks in order to study them, had received numerous attacks originating from China. Halderman concluded that because it was a fairly obscure server, these attacks were probably sweeping attacks affecting large areas of the Internet.[57]
In August 2014, it was made public that the Heartbleed vulnerability enabled hackers to steal security keys from Community Health Systems, the second-biggest for-profit U.S. hospital chain in the United States, compromising the confidentiality of 4.5 million patient records. The breach happened a week after Heartbleed was first made public.[58]
Possible prior knowledge and exploitation
Many major web sites patched the bug or disabled the Heartbeat Extension within days of its announcement,[59] but it is unclear whether potential attackers were aware of it earlier and to what extent it was exploited.[citation needed]
Based on examinations of audit logs by researchers, it has been reported that some attackers may have exploited the flaw for at least five months before discovery and announcement.[60][61] Errata Security pointed out that a widely used non-malicious program called Masscan, introduced six months before Heartbleed's disclosure, abruptly terminates the connection in the middle of handshaking in the same way as Heartbleed, generating the same server log messages, adding "Two new things producing the same error messages might seem like the two are correlated, but of course, they aren't.[62]"
According to Bloomberg News, two unnamed insider sources informed it that the United States' National Security Agency had been aware of the flaw since shortly after its appearance but—instead of reporting it—kept it secret among other unreported zero-day vulnerabilities in order to exploit it for the NSA's own purposes.[63][64][65] The NSA has denied this claim,[66] as has Richard A. Clarke, a member of the National Intelligence Review Group on Intelligence and Communications Technologies that reviewed the United States' electronic surveillance policy; he told Reuters on 11 April 2014 that the NSA had not known of Heartbleed.[67] The allegation prompted the American government to make, for the first time, a public statement on its zero-day vulnerabilities policy, accepting the recommendation of the review group's 2013 report that had asserted "in almost all instances, for widely used code, it is in the national interest to eliminate software vulnerabilities rather than to use them for US intelligence collection", and saying that the decision to withhold should move from the NSA to the White House.[68]
Behavior
The RFC 6520 Heartbeat Extension tests TLS/DTLS secure communication links by allowing a computer at one end of a connection to send a Heartbeat Request message, consisting of a payload, typically a text string, along with the payload's length as a 16-bit integer. The receiving computer then must send exactly the same payload back to the sender.[citation needed]
The affected versions of OpenSSL allocate a memory buffer for the message to be returned based on the length field in the requesting message, without regard to the actual size of that message's payload. Because of this failure to do proper bounds checking, the message returned consists of the payload, possibly followed by whatever else happened to be in the allocated memory buffer.[citation needed]
Heartbleed is therefore exploited by sending a malformed heartbeat request with a small payload and large length field to the vulnerable party (usually a server) in order to elicit the victim's response, permitting attackers to read up to 64 kilobytes of the victim's memory that was likely to have been used previously by OpenSSL.[69] Where a Heartbeat Request might ask a party to "send back the four-letter word 'bird'", resulting in a response of "bird", a "Heartbleed Request" (a malicious heartbeat request) of "send back the 500-letter word 'bird'" would cause the victim to return "bird" followed by whatever 496 subsequent characters the victim happened to have in active memory. Attackers in this way could receive sensitive data, compromising the confidentiality of the victim's communications. Although an attacker has some control over the disclosed memory block's size, it has no control over its location, and therefore cannot choose what content is revealed.[citation needed]
Affected OpenSSL installations
The affected versions of OpenSSL are OpenSSL 1.0.1 through 1.0.1f (inclusive). Subsequent versions (1.0.1g[70] and later) and previous versions (1.0.0 branch and older) are not vulnerable.[71] Installations of the affected versions are vulnerable unless OpenSSL was compiled with -DOPENSSL_NO_HEARTBEATS.[72][73]
Vulnerable program and function
The vulnerable program source files are t1_lib.c and d1_both.c and the vulnerable functions are tls1_process_heartbeat() and dtls1_process_heartbeat().[74][75]
Patch
The problem can be fixed by ignoring Heartbeat Request messages that ask for more data than their payload need, as required by the RFC.
Version 1.0.1g of OpenSSL adds some bounds checks to prevent the buffer over-read. The test listed below was one introduced to determine whether a heartbeat request would trigger Heartbleed; it silently discards malicious requests.
if(1+2+payload+16>s->s3->rrec.length)return0;/* silently discard per RFC 6520 sec. 4 */
The OpenSSL version control system contains a complete list of changes.[43]
Impact
The data obtained by a Heartbleed attack may include unencrypted exchanges between TLS parties likely to be confidential, including any form post data in users' requests. Moreover, the confidential data exposed could include authentication secrets such as session cookies and passwords, which might allow attackers to impersonate a user of the service.[76]
An attack may also reveal private keys of compromised parties,[3][77] which would enable attackers to decrypt communications (future or past stored traffic captured via passive eavesdropping, unless perfect forward secrecy is used, in which case only future traffic can be decrypted if intercepted via man-in-the-middle attacks).[citation needed]
An attacker having gained authentication material may impersonate the material's owner after the victim has patched Heartbleed, as long as the material is accepted (for example, until the password is changed or the private key revoked). Heartbleed therefore constitutes a critical threat to confidentiality. However, an attacker impersonating a victim may also alter data. Indirectly, Heartbleed's consequences may thus go far beyond a confidentiality breach for many systems.[78]
A survey of American adults conducted in April 2014 showed that 60 percent had heard about Heartbleed. Among those using the Internet, 39 percent had protected their online accounts, for example by changing passwords or canceling accounts; 29 percent believed their personal information was put at risk because of the Heartbleed bug; and 6 percent believed their personal information had been stolen.[79]
Client-side vulnerability
Although the bug received more attention due to the threat it represents for servers,[80] TLS clients using affected OpenSSL instances are also vulnerable. In what The Guardian therefore dubbed Reverse Heartbleed, malicious servers are able to exploit Heartbleed to read data from a vulnerable client's memory.[81] Security researcher Steve Gibson said of Heartbleed that:
It's not just a server-side vulnerability, it's also a client-side vulnerability because the server, or whomever you connect to, is as able to ask you for a heartbeat back as you are to ask them.[82]
Cisco Systems has identified 78 of its products as vulnerable, including IP phone systems and telepresence (video conferencing) systems.[84]
Websites and other online services
An analysis posted on GitHub of the most visited websites on 8 April 2014 revealed vulnerabilities in sites including Yahoo!, Imgur, Stack Overflow, Slate, and DuckDuckGo.[85][86] The following sites have services affected or made announcements recommending that users update passwords in response to the bug:
The Canadian federal government temporarily shut online services of the Canada Revenue Agency (CRA) and several government departments over Heartbleed bug security concerns.[111][112] Before the CRA online services were shut down, a hacker obtained approximately 900 social insurance numbers.[113][114] Another Canadian Government agency, Statistics Canada, had its servers compromised due to the bug and also temporarily took its services offline.[115]
Platform maintainers like the Wikimedia Foundation advised their users to change passwords.[108]
The servers of LastPass were vulnerable,[116] but due to additional encryption and forward secrecy, potential attacks were not able to exploit this bug. However, LastPass recommended that its users change passwords for vulnerable websites.[117]
The Tor Project recommended that Tor relay operators and hidden service operators revoke and generate fresh keys after patching OpenSSL, but noted that Tor relays use two sets of keys and that Tor's multi-hop design minimizes the impact of exploiting a single relay.[40] 586 relays later found to be susceptible to the Heartbleed bug were taken off-line as a precautionary measure.[118][119][120][121]
LogMeIn claimed to have "updated many products and parts of our services that rely on OpenSSL".[127]
Multiple McAfee products, in particular some versions of software providing anti-viral coverage for Microsoft Exchange, software firewalls, and McAfee Email and Web Gateways[128]
Oracle MySQL Connector/C 6.1.0-6.1.3 and Connector/ODBC 5.1.13, 5.2.5-5.2.6, 5.3.2[129]
Android 4.1.1, used in various portable devices.[137] Chris Smith writes in Boy Genius Report that just this one version of Android is affected but that it is a popular version of Android (Chitika claim 4.1.1 is on 50 million devices;[138] Google describe it as less than 10% of activated Android devices). Other Android versions are not vulnerable as they either have heartbeats disabled or use an unaffected version of OpenSSL.[139][140]
Several services have been made available to test whether Heartbleed affects a given site. However, many services have been claimed to be ineffective for detecting the bug.[148] The available tools include:
Lookout Mobile Security Heartbleed Detector, an app for Android devices that determines the OpenSSL version of the device and indicates whether the vulnerable heartbeat is enabled[159]
CrowdStrike Heartbleed Scanner[167] – Scans routers, printers and other devices connected inside a network including intranet web sites.[168]
Netcraft Site Report[169] – indicates whether a website's confidentiality could be jeopardized due to a past exploitation of Heartbleed by checking data from Netcraft's SSL Survey to determine whether a site offered the heartbeat TLS Extension prior to the Heartbleed disclosure. The Netcraft Extensions for Chrome, Firefox and Opera[170] also perform this check, whilst looking for potentially compromised certificates.[171]
Other security tools have added support for finding this bug. For example, Tenable Network Security wrote a plugin for its Nessus vulnerability scanner that can scan for this fault.[172] The Nmap security scanner includes a Heartbleed detection script from version 6.45.[173]
Sourcefire has released Snort rules to detect Heartbleed attack traffic and possible Heartbleed response traffic.[174] Open source packet analysis software such as Wireshark and tcpdump can identify Heartbleed packets using specific BPF packet filters that can be used on stored packet captures or live traffic.[175]
Remediation
Vulnerability to Heartbleed is resolved by updating OpenSSL to a patched version (1.0.1g or later). OpenSSL can be used either as a standalone program, a dynamic shared object, or a statically-linked library; therefore, the updating process can require restarting processes loaded with a vulnerable version of OpenSSL as well as re-linking programs and libraries that linked it statically. In practice this means updating packages that link OpenSSL statically, and restarting running programs to remove the in-memory copy of the old, vulnerable OpenSSL code.[citation needed]
After the vulnerability is patched, server administrators must address the potential breach of confidentiality. Because Heartbleed allowed attackers to disclose private keys, they must be treated as compromised; key pairs must be regenerated, and certificates that use them must be reissued; the old certificates must be revoked. Heartbleed also had the potential to allow disclosure of other in-memory secrets; therefore, other authentication material (such as passwords) should also be regenerated. It is rarely possible to confirm that a system which was affected has not been compromised, or to determine whether a specific piece of information was leaked.[176]
Since it is difficult or impossible to determine when a credential might have been compromised and how it might have been used by an attacker, certain systems may warrant additional remediation work even after patching the vulnerability and replacing credentials. For example, signatures made by keys that were in use with a vulnerable OpenSSL version might well have been made by an attacker; this raises the possibility integrity has been violated, and opens signatures to repudiation. Validation of signatures and the legitimacy of other authentications made with a potentially compromised key (such as client certificate use) must be done with regard to the specific system involved.[citation needed]
Browser security certificate revocation awareness
Since Heartbleed threatened the privacy of private keys, users of a website which was compromised could continue to suffer from Heartbleed's effects until their browser is made aware of the certificate revocation or the compromised certificate expires.[177] For this reason, remediation also depends on users making use of browsers that have up-to-date certificate revocation lists (or OCSP support) and honour certificate revocations.[178]
Root causes, possible lessons, and reactions
Although evaluating the total cost of Heartbleed is difficult, eWeek estimated US$500 million as a starting point.[179]
David A. Wheeler's paper How to Prevent the next Heartbleed analyzes why Heartbleed wasn't discovered earlier, and suggests several techniques which could have led to a faster identification, as well as techniques which could have reduced its impact. According to Wheeler, the most efficient technique which could have prevented Heartbleed is a test suite thoroughly performing robustness testing, i.e. testing that invalid inputs cause failures rather than successes. Wheeler highlights that a single general-purpose test suite could serve as a base for all TLS implementations.[180]
According to an article on The Conversation written by Robert Merkel, Heartbleed revealed a massive failure of risk analysis. Merkel thinks OpenSSL gives more importance to performance than to security, which no longer makes sense in his opinion. But Merkel considers that OpenSSL should not be blamed as much as OpenSSL users, who chose to use OpenSSL, without funding better auditing and testing. Merkel explains that two aspects determine the risk that more similar bugs will cause vulnerabilities. One, the library's source code influences the risk of writing bugs with such an impact. Secondly, OpenSSL's processes affect the chances of catching bugs quickly. On the first aspect, Merkel mentions the use of the C programming language as one risk factor which favored Heartbleed's appearance, echoing Wheeler's analysis.[180][181]
On the same aspect, Theo de Raadt, founder and leader of the OpenBSD and OpenSSH projects, has criticized the OpenSSL developers for writing their own memory management routines and thereby, he claims, circumventing OpenBSD C standard library exploit countermeasures, saying "OpenSSL is not developed by a responsible team."[182][183] Following Heartbleed's disclosure, members of the OpenBSD project forked OpenSSL into LibreSSL.[184] LibreSSL made a big code cleanup, removing more than 90,000 lines of C code just in its first week.[185]
The author of the change which introduced Heartbleed, Robin Seggelmann,[186] stated that he missed validating a variable containing a length and denied any intention to submit a flawed implementation.[20] Following Heartbleed's disclosure, Seggelmann suggested focusing on the second aspect, stating that OpenSSL is not reviewed by enough people.[187] Although Seggelmann's work was reviewed by an OpenSSL core developer, the review was also intended to verify functional improvements, a situation making vulnerabilities much easier to miss.[180]
OpenSSL core developer Ben Laurie claimed that a security audit of OpenSSL would have caught Heartbleed.[188] Software engineer John Walsh commented:
Think about it, OpenSSL only has two [fulltime] people to write, maintain, test, and review 500,000 lines of business critical code.[189]
The OpenSSL foundation's president, Steve Marquess, said "The mystery is not that a few overworked volunteers missed this bug; the mystery is why it hasn't happened more often."[189] David A. Wheeler described audits as an excellent way to find vulnerabilities in typical cases, but noted that "OpenSSL uses unnecessarily complex structures, which makes it harder to both humans and machines to review." He wrote:
There should be a continuous effort to simplify the code, because otherwise just adding capabilities will slowly increase the software complexity. The code should be refactored over time to make it simple and clear, not just constantly add new features. The goal should be code that is "obviously right", as opposed to code that is so complicated that "I can't see any problems".[180]
According to security researcher Dan Kaminsky, Heartbleed is sign of an economic problem which needs to be fixed. Seeing the time taken to catch this simple error in a simple feature from a "critical" dependency, Kaminsky fears numerous future vulnerabilities if nothing is done. When Heartbleed was discovered, OpenSSL was maintained by a handful of volunteers, only one of whom worked full time.[190] Yearly donations to the OpenSSL project were about US$2,000.[191] The Heartbleed website from Codenomicon advised money donations to the OpenSSL project.[3] After learning about donations for the 2 or 3 days following Heartbleed's disclosure totaling US$841, Kaminsky commented "We are building the most important technologies for the global economy on shockingly underfunded infrastructure."[192] Core developer Ben Laurie has qualified the project as "completely unfunded".[191] Although the OpenSSL Software Foundation has no bug bounty program, the Internet Bug Bounty initiative awarded US$15,000 to Google's Neel Mehta, who discovered Heartbleed, for his responsible disclosure.[191] Mehta later donated his reward to a Freedom of the Press Foundation fundraiser.[193]
Paul Chiusano suggested Heartbleed may have resulted from failed software economics.[194]
The industry's collective response to the crisis was the Core Infrastructure Initiative, a multimillion-dollar project announced by the Linux Foundation on 24 April 2014 to provide funds to critical elements of the global information infrastructure.[195] The initiative intends to allow lead developers to work full time on their projects and to pay for security audits, hardware and software infrastructure, travel, and other expenses.[196] OpenSSL is a candidate to become the first recipient of the initiative's funding.[195]
After the discovery Google established Project Zero which is tasked with finding zero-day vulnerabilities to help secure the Web and society.[197][198]
^Lee, Ariana (13 April 2014). "How Codenomicon Found The Heartbleed Bug Now Plaguing The Internet". ReadWrite. Archived from the original on 5 September 2017. Retrieved 4 December 2017. Discovered independently by Google engineer Neel Mehta and the Finnish security firm Codenomicon, Heartbleed has been called 'one of the most serious security problems to ever affect the modern web.'
^Rainie, Lee; Duggan, Maeve (30 April 2014). "Heartbleed's Impact". Pew Research Internet Project. Pew Research Center. p. 2. Archived from the original on 28 December 2017. Retrieved 22 May 2014.
^"Tripwire SecureScan". Tripwire – Take Control of IT Security and Regulatory Compliance with Tripwire Software. Archived from the original on 16 April 2014. Retrieved 7 October 2014.
^Smith, Gerry (10 April 2014). "How The Internet's Worst Nightmare Could Have Been Avoided". The Huffington Post. Archived from the original on 19 July 2017. Retrieved 16 April 2020. The bug revealed this week was buried inside 10 lines of code and would have been spotted in an audit, according to Laurie, who works on the security team at Google.
^ abWalsh, John (30 April 2014). "Free Can Make You Bleed". SSH Communications Security. Archived from the original on 2 December 2016. Retrieved 11 September 2016.
^Kaminsky, Dan (10 April 2014). "Be Still My Breaking Heart". Dan Kaminsky's Blog. Archived from the original on 14 April 2014. Retrieved 22 April 2014.
Durumeric, Zakir; Li, Frank; et al. (5 November 2014). "The Matter of Heartbleed". Proceedings of the 2014 Conference on Internet Measurement Conference. New York, NY, USA: ACM. pp. 475–488. doi:10.1145/2663716.2663755. ISBN978-1-4503-3213-2. S2CID142767.
v · mFamille franciscaine Religieux (premier ordre et second ordre) François d'Assise Claire d'Assise Marguerite de Cortone Thomas de Celano Bonaventure Antoine de Padoue Bernardin de Sienne Jean Duns Scot Rose de Viterbe Franciscains martyrs du Maroc Roger Bacon Santig Du Jacopone da Todi Pascal Baylon Thomas Illyricus Nikola Tavelić Colette de Corbie Jean de Capistran Jacques de la Marche Martyrs de Gorkum François de Meyronnes Thomas Murner Jean Tisserand Diego de Landa Crispin d...
Artikel ini bukan mengenai Sumeru. Untuk layanan kereta api milik PT Kereta Api Indonesia, lihat kereta api Argo Semeru. Gunung SemeruMount SemeruSemeru pada tahun 1985.Titik tertinggiPuncak3.676 m (12.060 ft)Masuk dalam daftarRibu, Gunung api Tipe AKoordinat8°6′28.8″S 112°55′12.0″E / 8.108000°S 112.920000°E / -8.108000; 112.920000 PenamaanNama lokalꦒꦸꦤꦸꦁꦱꦼꦩꦺꦫꦸGeografiSemeruKabupaten Malang dan Kabupaten Lumajang, Jawa ...
The Coffee Bean & Tea LeafKantor pusat The Coffee Bean & Tea Leaf sebelumnya di La Cienega Blvd., Los AngelesJenisSwastaIndustriRestoranRetail kopi dan tehDidirikanBrentwood, California (1963)PendiriHerbert B. HymanKantorpusatLos Angeles, California, Amerika SerikatTokohkunciSunny Sassoon, ChairmanMelvin Elias, CEOKaryawan4.400 (2007)IndukInternational Coffee & Tea, LLC (1963-2019)Jollibee Foods Corporation (2019-sekarang)Situs webcoffeebean.com The Coffee Bean & Tea Leaf (kad...
Early Yoga text in Sanskrit from ancient India by Patanjali Some pages from a historic Yogasutra manuscript (Sanskrit, Devanagari). The verses are highlighted and are embedded inside the bhasya (commentary). Part of a series onHindu scriptures and texts Shruti Smriti List Vedas Rigveda Samaveda Yajurveda Atharvaveda Divisions Samhita Brahmana Aranyaka Upanishads UpanishadsRig vedic Aitareya Kaushitaki Sama vedic Chandogya Kena Yajur vedic Brihadaranyaka Isha Taittiriya Katha Shvetashvatara Ma...
Khālid bin al-Walīdخالد بن الوليدKaligrafi Khalid Bin Walid R.AJulukanPedang Allah Yang TerhunusLahir585Makkah, Jazirah ArabMeninggal642 (umur 57)Homs, SyamDikebumikanMasjid Khalid bin al-WalidPengabdianKekhalifahan RasyidinDinas/cabangPasukan RasyidinLama dinas632–638PangkatPanglima tertinggiKesatuanPengawal berkudaKomandanPanglima tertinggi (632–634)Komandan lapangan (634–638)Komandan Pengawal berkuda (634–638)Gubernur Militer Irak (633–634)Gubernur Chalcis (Qin...
PGM-11 Redstone adalah sebuah peluru kendali / rudal balistik besar yang pertama Amerika. Sebuah roket jarak pendek permukaan-ke-permukaan, senjata itu dalam pelayanan aktif dengan Angkatan Darat Amerika Serikat di Jerman Barat dari bulan Juni 1958 sampai bulan Juni 1964 sebagai bagian dari pertahanan NATO di Perang Dingin Eropa Barat. Referensi Bullard, John W (October 15, 1965). History Of The Redstone Missile System (Historical Monograph Project Number: AMC 23 M). Historical Division, Adm...
Questa voce sull'argomento calciatori spagnoli è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Segui i suggerimenti del progetto di riferimento. Carlos Merino Nazionalità Spagna Altezza 174 cm Peso 69 kg Calcio Ruolo Centrocampista Termine carriera 2016 Carriera Squadre di club1 1997-2000 Nottingham Forest? (?)2000-2004 Athletic Bilbao8 (0)2001-2002→ Burgos8 (0)2004-2005 Numancia28 (5)2005-2007 Gimnàstic? (?)2007-20...
Pour les articles homonymes, voir Taxis. Maison de Tour et Taxis Blason de la famille Thurn und Taxis. Données clés Pays Saint-Empire romain germaniqueRoyaume d'Italie Titres PrinceDuc de Castel Duino Chef actuel Albert II Branche della Torre e Tasso (Italie) modifier La maison de Tour et Taxis ou la maison princière de Thurn und Taxis (également appelée, en français, maison de La Tour et Tassis, en allemand von Thurn und Taxis, en italien della Torre e Tasso, et en néerlandais Thurn ...
Caisse de mesure Michelot, un modèle ancien de compteur d'eau, permettant de mesurer le débit d'eau Le QIX, ou « quantité instantanée maximale », est la valeur du débit instantané maximal d'un cours d'eau sur une période donnée[1]. Types de calculs Calculé pour différentes durées (2 ans, 5 ans, etc.), il permet d'apprécier statistiquement les risques rattachés à l'écoulement de l'eau en surface. Le QIX est estimé en ayant recours à une loi statistique de Gumb...
ليرجيت 35 / 36 Learjet 35/36معلومات عامةالنوع نفاثة أعمالبلد الأصل الولايات المتحدةالمهام business aviation (en) التطوير والتصنيعالصانع ليرجيتسنة الصنع 1973الكمية المصنوعة 738طورت من ليرجيت 25سيرة الطائرةدخول الخدمة 1973 أول طيران 22 أغسطس 1973الخدمةالمستخدم الأساسي الأرجنتين — سلاح الجو البولي...
This article is about the project management process. For other uses, see Quality control (disambiguation). For the record label, see Quality Control Music. Processes that maintain quality at a constant level Quality inspector in a Volkseigener Betrieb sewing machine parts factory in Dresden, East Germany, 1977 Quality control (QC) is a process by which entities review the quality of all factors involved in production. ISO 9000 defines quality control as a part of quality management focused o...
French statesman and lawyer (1506–1573) Michel de l'HôpitalChancellor of FrancePortrait of the chancellorBornc. 1506Died13 March 1573Spouse(s)Marie MorinIssueMagdalaine de l'Hôpital Michel de l'Hôpital (or l'Hospital) (1506 – 13 March 1573) was a French lawyer, diplomat and chancellor during the latter Italian Wars and the early French Wars of Religion. The son of a doctor in the service of Constable Bourbon he spent his early life exiled from France at Bourbon's and then the emp...
Papa Pio VII, miniatura ad acquerello. Museo Glauco Lombardi, Parma. Antonio Pasini (Borgo San Donnino, 21 febbraio 1770 – Parma, 23 luglio 1835) è stato un pittore italiano. Indice 1 Biografia 2 Note 3 Bibliografia 4 Altri progetti 5 Collegamenti esterni Biografia Studiò all'Accademia di Belle Arti di Parma, dove ebbe come maestro Domenico Muzzi. Nel 1790 vinse il primo premio nella sezione composizione con un dipinto che raffigura Meleagro che porge alla vergine Atalanta la testa del ci...
Greek-American artist (1936–2024) Lucas SamarasΛουκάς ΣαμαράςSelf-portrait, Photo-Transformation, Polaroid SX-70 print, 1973, Getty MuseumBorn(1936-09-14)September 14, 1936Kastoria, GreeceDiedMarch 7, 2024(2024-03-07) (aged 87)New York City, New York, U.S.NationalityAmericanEducationRutgers UniversityKnown forPhotography, sculpture, printmaking Lucas Samaras (Greek: Λουκάς Σαμαράς; September 14, 1936 – March 7, 2024) was a Greek-born American photograph...
В Википедии есть статьи о других людях с такой фамилией, см. Гольтгоер. Фёдор Григорьевич Гольтгоернем. Friedrich August Goldgeuer портрет работы Карла Шрейнцера,1844-1848 гг. Рождение 14 (25) марта 1771Германия Смерть 17 (29) октября 1848 (77 лет) Деятельность директор Лицея (1824—1840) Награды Военн...
В Википедии есть статьи о других людях с такой фамилией, см. Петров; Петров, Александр; Петров, Александр Александрович. Александр Александрович Петров На отрытии персональной выставки в Елабуге, 2018 год Дата рождения 17 апреля 1951(1951-04-17) (73 года) Место рождения Ямаш, Альме�...
دوري ناصر بن حمد الممتاز تفاصيل الموسم 2021-2022 البلد البحرين المنظم الاتحاد البحريني لكرة القدم الصاعدون الحالة الخالدية كأس الاتحاد الآسيوي الرفاع مباريات ملعوبة 90 أهداف مسجلة 216 معدل الأهداف 2.4 الهداف مهدي عبد الجبار (المنامة) (16 هدف) أفضل حارس مرمى سيد شبر علوي (الخا...