2014-04-10 20:31 GMT+02:00 Andy Smith <andy@???>:
> Hi,
>
> We're going to do some scans of our IPv4 space to look for services
> vulnerable to the OpenSSL "heartbleed" vulnerability, so we can open
> tickets with customers about it¹.
>
> I am warning you in case you have firewalls / IDS mechanisms that
> may panic on seeing someone try to make use of it.
>
> The scans will come from 173.255.227.192 and 88.198.54.123 and will
> not cause any damage.
>
> Cheers,
> Andy
>
> ¹ ("Reasonable effort" courtesy free service, no contact doesn't
> mean we are certifying you as safe, conditions apply, your
> causality is at risk if you misappropriate entropy, etc. etc.)
>
> --
> http://bitfolk.com/ -- No-nonsense VPS hosting
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
>
> iEYEAREDAAYFAlNG444ACgkQIJm2TL8VSQsznwCff4VF7BV2992hno3Q0c2bTcad
> lloAn35Qn0X4wtX6SYSiF2e+StGIwBGa
> =2Gau
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> announce mailing list
> announce@???
> https://lists.bitfolk.com/mailman/listinfo/announce >
> _______________________________________________
> users mailing list
> users@???
> https://lists.bitfolk.com/mailman/listinfo/users >
>