Re: [bitfolk] Scanning for "heartbleed" vulnerability

Top Page
Author: Andy Smith
Date:  
To: users
Subject: Re: [bitfolk] Scanning for "heartbleed" vulnerability

Reply to this message
gpg: Signature made Mon Apr 14 19:34:05 2014 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hi Ian,

On Mon, Apr 14, 2014 at 09:36:27AM +0100, Ian wrote:
> Andy said:
>
> >> What about Webmin (10000) and Usermin(20000)?
> >
> > Thanks, I'll give them a try.
>
> Did you do a test between 2am and now?


Yes, at just after 3am. I found a few webmin and usermin. I haven't
notified the affected people yet, but hope to do so this evening.

Cheers,
Andy

--
http://bitfolk.com/ -- No-nonsense VPS hosting