Re: [bitfolk] SSL POODLE (CVE-2014-3566) vulnerabilities amo…

Top Page
Author: Andy Smith
Date:  
To: announce
Subject: Re: [bitfolk] SSL POODLE (CVE-2014-3566) vulnerabilities amongst the customer base

Reply to this message
gpg: Signature made Tue Dec 16 17:44:45 2014 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hello,

On Tue, Dec 09, 2014 at 07:39:05PM +0000, Andy Smith wrote:
> ShadowServer have started reporting on this now, and their latest
> report still shows 79 IPs in BitFolk's customer IP space that are
> vulnerable to SSLv3/Poodle.
>
> I still don't want to be opening tickets with people individually
> over this so unless there is an outrage against the idea then I'm
> thinking of just posting next Tuesday's report here.


Here you go:

    http://dl.shadowserver.org/4o9jR_W433PVUJ4CIuqH8V7ht7A?mXSocjvDYp7FJ-vqyoRiow


Cheers,
Andy

--
http://bitfolk.com/ -- No-nonsense VPS hosting
_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce