Re: [bitfolk] Scanning for "heartbleed" vulnerability

Top Page
Author: Andy Smith
Date:  
To: users
Subject: Re: [bitfolk] Scanning for "heartbleed" vulnerability

Reply to this message
gpg: Signature made Sun Apr 13 13:34:37 2014 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hi Rodrigo,

On Sat, Apr 12, 2014 at 03:16:43AM +0100, Rodrigo Campos wrote:
> On Fri, Apr 11, 2014 at 06:54:06PM +0000, Andy Smith wrote:
> > At the moment we are only checking ports: 25, 443, 465, 587, 993,
> > 995, 8443. Can you think of any others that are likely to have SSL
> > services on?
>
> Jabber on SSL ? 5222/5223 ?


I don't know, but I will add them to my next scan. Prior to adding
these my current list had grown to:

my @ports = qw(
       25   261   375   443   448   465   563   587   614   636   664   684
      695   832   989   990   992   993   995  1129  1131  1184  1203  1204
     1750  2252  2381  2478  2479  2482  2484  2679  2762  2793  3077  3078
     3128  3183  3191  3220  3269  3410  3424  3468  3471  3478  3496  3509
     3529  3539  3568  3660  3661  3713  3747  3864  3885  3896  3995  4031
     4036  4062  4064  4081  4083  4116  4536  4590  4740  4843  4849  5007
     5061  5321  5349  5351  5443  5671  5783  5986  5989  5990  6116  6251
     6443  6513  6514  6619  6771  6789  7443  7673  7674  7677  8080  8243
     8443  8989  8991  9001  9089  9295  9318  9443  9444  9614  9802 10161
    10162 11751 12013 12109 16993 16995 20003
);


Cheers,
Andy

--
http://bitfolk.com/ -- No-nonsense VPS hosting