Francis,
Are you asking us to register our servers into a great big list of
vulnerable machines?
Chad
On Tue, Apr 8, 2014 at 10:11 AM, Francis Kayiwa <[log in to unmask]> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 4/8/2014 10:06 AM, Cary Gordon wrote:
> > Please read this page and its supporting documents about the
> > Heartbleed Bug.
> >
> > http://heartbleed.com/
> >
> > If you use OpenSSL, and most service providers do, you should patch
> > your servers ASAP. OpenSSL versions 1.0.1 through 1.0.1f
> > (inclusive) are vulnerable. Only version 1.0.1g or newer should be
> > used.
> >
> > Apologies for multiple postings.
>
> A simple tool to test if you are vulnerable
>
> http://filippo.io/Heartbleed/
>
> If you patched already that's cool, if not you should be asking
> yourself why you aren't using SSL? -oh wait. As you were. ;-)
>
> ./fxk
>
>
> - --
> QOTD:
> "A child of 5 could understand this! Fetch me a child of 5."
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.22 (MingW32)
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
> iQEcBAEBAgAGBQJTRAObAAoJEOptrq/fXk6McpAH/3jwnQWowC25cO0gybi0zj9o
> irL/d4pJFyEUMtd2mquW+0OnAOOy9mmXZfL7FqqJ+4nlCUarALsz/EBl7akZvq0Q
> BouG3KtALpNHcoFrPg535CiOK3br5qOKR3SQyn9YqQngfkiyCbgJQWvMYIRhO8mf
> hEVdtL4pKA27d1qDaDR1V8u+XunH3mC3AliOPbytOBhRBilP9b+P8P/m2raaJOvr
> VsLCrMfzhQVAU0lIGWhPpQWsfvBFO6rCGBvA6V6DMpPJATmE6sEc/yqOKfhjiqV3
> TnkWChte/e+uAacY8zxaXBMiSn6XyoN+8p8CFyTdbJwdp8Who3hnKHQKTG9jqNc=
> =WQlE
> -----END PGP SIGNATURE-----
>
|