Re: [bitfolk] Scanning for "heartbleed" vulnerability

Top Page
Author: Andy Smith
Date:  
To: announce
Subject: Re: [bitfolk] Scanning for "heartbleed" vulnerability

Reply to this message
gpg: Signature made Fri Apr 11 18:54:06 2014 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
On Thu, Apr 10, 2014 at 06:31:42PM +0000, Andy Smith wrote:
> We're going to do some scans of our IPv4 space to look for services
> vulnerable to the OpenSSL "heartbleed" vulnerability, so we can open
> tickets with customers about it¹.


The first round of these tickets has now been created, so if you
didn't get one that means:

- Congratulations, you weren't vulnerable! Or;
- We missed something, or;
- Our email (from support@???) went into your spam folder

At the moment we are only checking ports: 25, 443, 465, 587, 993,
995, 8443. Can you think of any others that are likely to have SSL
services on?

I'll save further discussion for the users list from now on.

Cheers,
Andy

--
http://bitfolk.com/ -- No-nonsense VPS hosting
_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce