[bitfolk] Scanning for "heartbleed" vulnerability

Top Page
Author: Andy Smith
Date:  
To: announce
Old-Topics: [bitfolk] Regarding possible exposure of your BitFolk account credentialsvia the "heartbleed" vulnerability
Subject: [bitfolk] Scanning for "heartbleed" vulnerability

Reply to this message
gpg: Signature made Thu Apr 10 18:31:42 2014 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hi,

We're going to do some scans of our IPv4 space to look for services
vulnerable to the OpenSSL "heartbleed" vulnerability, so we can open
tickets with customers about it¹.

I am warning you in case you have firewalls / IDS mechanisms that
may panic on seeing someone try to make use of it.

The scans will come from 173.255.227.192 and 88.198.54.123 and will
not cause any damage.

Cheers,
Andy

¹ ("Reasonable effort" courtesy free service, no contact doesn't
mean we are certifying you as safe, conditions apply, your
causality is at risk if you misappropriate entropy, etc. etc.)

--
http://bitfolk.com/ -- No-nonsense VPS hosting
_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce