<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
<big>This morning the CBC mentioned that some "hardware" is affected by
the Heartbleed issue.<br>
If the CBC knows, I am sure that you can rest assured that the vendors
know as well.<br>
Whether or not they "are on top of it" is anyone's guess.<br>
<br>
JohnJ</big><br>
<br>
<br>
On 2014-04-11 15:26, Bob Jonkman wrote:
<blockquote cite="mid:534841D3.1030504@sobac.com" type="cite">
<pre wrap="">-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
If you're using a tool to check for Heartbleed vulnerabilities, be
sure to check the Web interface on your router and/or modem as well.
I'm not sure if router vendors are on top of this, but according to
ssltest.py my Tomato/MLPPP Version 1.25-mp3alpha6 (from
<a class="moz-txt-link-freetext" href="http://fixppp.org">http://fixppp.org</a> ) is not vulnerable, nor my Thomson Speedtouch modem
with firmware 6.1.0.5
Also, somebody asked me how safe these vulnerability checking tools
are, especially the online and Javascript-based ones. What's to say
they're not merely displaying "all is well", and actually compiling a
list of vulnerable sites for later exploitation?
- --Bob.
On 14-04-08 12:06 PM, Khalid Baheyeldin wrote:>
</pre>
<blockquote type="cite">
<pre wrap="">You can use this python tool ssltest.py to check if your servers
are vulnerable:
$ wget -O ssltest.py <a class="moz-txt-link-rfc2396E" href="http://pastebin.com/raw.php?i=WmxzjkXJ">"http://pastebin.com/raw.php?i=WmxzjkXJ"</a> $
python ssltest.py example.com
</pre>
</blockquote>
<pre wrap="">
On 14-04-11 10:51 AM, CrankyOldBugger wrote:
</pre>
<blockquote type="cite">
<pre wrap="">Mashable has a list going of sites affected by Heartbleed:
<a class="moz-txt-link-freetext" href="http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/">http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/</a>
Don't forget to add Canada Revenue (and most other government
sites) to your list of passwords to change!
</pre>
</blockquote>
<pre wrap="">
Bob Jonkman <a class="moz-txt-link-rfc2396E" href="mailto:bjonkman@sobac.com"><bjonkman@sobac.com></a> Phone: +1-519-669-0388
SOBAC Microcomputer Services <a class="moz-txt-link-freetext" href="http://sobac.com/sobac/">http://sobac.com/sobac/</a>
<a class="moz-txt-link-freetext" href="http://bob.jonkman.ca/blogs/">http://bob.jonkman.ca/blogs/</a> <a class="moz-txt-link-freetext" href="http://sn.jonkman.ca/bobjonkman/">http://sn.jonkman.ca/bobjonkman/</a>
Software --- Office & Business Automation --- Consulting
GnuPG Fngrprnt:04F7 742B 8F54 C40A E115 26C2 B912 89B0 D2CC E5EA
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Ensure confidentiality, authenticity, non-repudiability
iEYEARECAAYFAlNIQdEACgkQuRKJsNLM5epRdwCg2lOb8IU+MasK5tbnLKueZNcf
KEoAoNhd+K0k9s0y4zKqtof8iYTxxOHY
=Sm+H
-----END PGP SIGNATURE-----
_______________________________________________
kwlug-disc mailing list
<a class="moz-txt-link-abbreviated" href="mailto:kwlug-disc@kwlug.org">kwlug-disc@kwlug.org</a>
<a class="moz-txt-link-freetext" href="http://kwlug.org/mailman/listinfo/kwlug-disc_kwlug.org">http://kwlug.org/mailman/listinfo/kwlug-disc_kwlug.org</a>
-----
Checked by AVG - <a class="moz-txt-link-abbreviated" href="http://www.avg.com">www.avg.com</a>
Version: 2014.0.4355 / Virus Database: 3882/7329 - Release Date: 04/10/14
</pre>
</blockquote>
<br>
</body>
</html>