Date: Tue, 08 Apr 2014 15:21:23 -0400 From: Mike Tancsa <mike@sentex.net> To: freebsd-security@freebsd.org Subject: Re: FreeBSD's heartbleed response Message-ID: <53444C33.4060408@sentex.net> In-Reply-To: <20140408190227.70A5CDB9@hub.freebsd.org> References: <20140408174210.GA5433@behemoth> <CAMCLrkFXsnY-_KCw2PF0VtY6C0J-4CL03GzFskXmzUtLL2Ebig@mail.gmail.com> <20140408195049.04129f2a@azsupport.com> <20140408190227.70A5CDB9@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 4/8/2014 2:54 PM, Niklaus Schiess wrote: > Plenty of FreeBSD deployments use 1.0.1x due to the lack of TLS 1.2 > support in 0.9.x. So thats not an excuse. The FreeBSD security team only maintains advisories for the base distributions. What people install from the ports are not covered by those advisories. Issues affecting the FreeBSD Ports Collection are covered in http://vuxml.freebsd.org/ ---Mike -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53444C33.4060408>