Date: Tue, 08 Apr 2014 20:54:35 +0200 From: Niklaus Schiess <nschiess@adversec.com> To: freebsd-security@freebsd.org Subject: Re: FreeBSD's heartbleed response In-Reply-To: <20140408195049.04129f2a@azsupport.com> References: <20140408174210.GA5433@behemoth> <CAMCLrkFXsnY-_KCw2PF0VtY6C0J-4CL03GzFskXmzUtLL2Ebig@mail.gmail.com> <20140408195049.04129f2a@azsupport.com>
| previous in thread | raw e-mail | index | archive | help
Plenty of FreeBSD deployments use 1.0.1x due to the lack of TLS 1.2 support in 0.9.x. So thats not an excuse. On 08.04.2014 19:50, Andrei wrote: > On Tue, 8 Apr 2014 10:46:12 -0700 > Mark Boolootian <booloo@ucsc.edu> wrote: > >> While it may not be quite what you're looking for, ports contains >> OpenSSL 1.0.1g. > > And also FreeBSD 8.x/9.x not affected because have 0.9.x OpenSSL in base. > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" > -- PGP FP: CB84 8C68 ADDB 6C50 7DF1 4227 F2A6 056A A799 76DA
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?>