OT: Heartbleed, OpenSSL vulnerability
Fairlight
fairlite at fairlite.com
Mon Apr 14 09:06:28 PDT 2014
On Sun, Apr 13, 2014 at 04:46:44PM -0400, J. P. Radley thus spoke:
> https://lastpass.com/heartbleed/
That testing is near-useless, and also a Really Bad Idea[tm] to use.
1) I tried it against my own VPS, which I -know- to be patched with a safe
version of OpenSSL. It couldn't even give me a definitive answer other
than it's using OpenSSL but -might- be using a safe version.
2) It calls a perfectly valid Comodo certificate "possibly unsafe".
3) The total assessment said it's unclear.
4) The results pop up staggered, and it does indeed appear to be a
real-time test. The issue with trying this against sites you don't own is
that you're essentially attempting unauthorised access to a computing
system you do not own - a felony in many jurisdictions. This is why
penetration testing services have you sign off that you own the systems
you're testing.
This is -not- cool. Besides being shoddily implemented, it's legally
questionable, at best.
mark->
--
Audio panton, cogito singularis.
More information about the Filepro-list
mailing list