From owner-freebsd-stable@FreeBSD.ORG Thu Apr 10 06:02:23 2014 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0751863F for ; Thu, 10 Apr 2014 06:02:22 +0000 (UTC) Received: from www.airsltd.com (www.airsltd.com [174.136.97.202]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "www.airsltd.com", Issuer "RapidSSL CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BFBA81603 for ; Thu, 10 Apr 2014 06:02:22 +0000 (UTC) Received: from [10.11.0.199] (97-113-26-132.tukw.qwest.net [97.113.26.132]) (authenticated bits=0) by www.airsltd.com (8.14.7/8.14.4) with ESMTP id s3A5xcTE084263 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO) for ; Wed, 9 Apr 2014 22:59:39 -0700 (PDT) (envelope-from jon@airsltd.com) Message-ID: <5346330B.1020203@airsltd.com> Date: Wed, 09 Apr 2014 22:58:35 -0700 From: Jon Boley User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0 MIME-Version: 1.0 To: freebsd-stable@freebsd.org Subject: FreeBSD, VPS and Heartbleed Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Apr 2014 06:02:23 -0000 Hello, I'm running 9.2 and my openssl is a safe version. However, I do have a VPS running 9.2 and wonder if I should be concerned about the system that is providing me with the VPS. Thanks! Jon Boley