Francis, Are you asking us to register our servers into a great big list of vulnerable machines? Chad On Tue, Apr 8, 2014 at 10:11 AM, Francis Kayiwa <[log in to unmask]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 4/8/2014 10:06 AM, Cary Gordon wrote: > > Please read this page and its supporting documents about the > > Heartbleed Bug. > > > > http://heartbleed.com/ > > > > If you use OpenSSL, and most service providers do, you should patch > > your servers ASAP. OpenSSL versions 1.0.1 through 1.0.1f > > (inclusive) are vulnerable. Only version 1.0.1g or newer should be > > used. > > > > Apologies for multiple postings. > > A simple tool to test if you are vulnerable > > http://filippo.io/Heartbleed/ > > If you patched already that's cool, if not you should be asking > yourself why you aren't using SSL? -oh wait. As you were. ;-) > > ./fxk > > > - -- > QOTD: > "A child of 5 could understand this! Fetch me a child of 5." > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.22 (MingW32) > Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ > > iQEcBAEBAgAGBQJTRAObAAoJEOptrq/fXk6McpAH/3jwnQWowC25cO0gybi0zj9o > irL/d4pJFyEUMtd2mquW+0OnAOOy9mmXZfL7FqqJ+4nlCUarALsz/EBl7akZvq0Q > BouG3KtALpNHcoFrPg535CiOK3br5qOKR3SQyn9YqQngfkiyCbgJQWvMYIRhO8mf > hEVdtL4pKA27d1qDaDR1V8u+XunH3mC3AliOPbytOBhRBilP9b+P8P/m2raaJOvr > VsLCrMfzhQVAU0lIGWhPpQWsfvBFO6rCGBvA6V6DMpPJATmE6sEc/yqOKfhjiqV3 > TnkWChte/e+uAacY8zxaXBMiSn6XyoN+8p8CFyTdbJwdp8Who3hnKHQKTG9jqNc= > =WQlE > -----END PGP SIGNATURE----- >