看板 FB_security 關於我們 聯絡資訊
--Apple-Mail=_6788341D-62A9-4D63-9D50-95C54FD54F1F Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=windows-1252 On 11.4.2014, at 15.53, sbremal@hotmail.com wrote: > ext 65281 (renegotiation info, length=3D1) > ext 00011 (EC point formats, length=3D4) > ext 00035 (session ticket, length=3D0) > ext 00015 (heartbeat, length=3D1) <-- Your server supports heartbeat. = Bug is possible when linking against OpenSSL 1.0.1f or older. Let me = check. > Actively checking if CVE-2014-0160 works: Your server appears to be = patched against this bug. >=20 > K=F6sz! ;-) >=20 > Is there any reason why nightly security patches are not enabled by = default in FreeBSD? >=20 >=20 > Cheers > B. >=20 Why do you make such claim? The security patches are very much = =93enabled=94 (by using your words) in FreeBSD by default. This assuming = that you are in fact aware of the update methods that are available and = how they work. And for the update methods and how they work there=92s a = tremendous amount of information out there, even translated to your = native language in some cases if the language barrier is a problem for = you. -Kimmo --Apple-Mail=_6788341D-62A9-4D63-9D50-95C54FD54F1F Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQEcBAEBCgAGBQJTR+pHAAoJEFvLZC0FWRVpeC8H/2TqUD9sGJSnOITspPYASBJZ 6mqH7sTNNZG0GoeYAaIyg5SAhG2pWRBSRrnT7wmWwWbbGDf20rTfyEkfIxwclkbB fRdfMVFKFDNYx2GmZWgAi7XZaZskMRxMIwlgOXGUc2EtluLJdTnHvbqThHgn3xB9 QarWxr61yqfArPkq5by0RvWIXoFMRE3bWevtkrdIwwIfQAVKaNFbhkvE+k6T7K5n lLDnEucvkADuUWUr9t2MKQ7Xd6/lLi2sdjnT24i6TxiQATJiquy/sIsq6unFmgMT rqWME4xJP3nG7Qb4lYSNxiYILbVGT1onxZ0zhvwyBY9OFlQDAL3Dw9c/7fDFngQ= =lXK5 -----END PGP SIGNATURE----- --Apple-Mail=_6788341D-62A9-4D63-9D50-95C54FD54F1F--