On 11.4.2014, at 15.53, sbre...@hotmail.com wrote: > ext 65281 (renegotiation info, length=1) > ext 00011 (EC point formats, length=4) > ext 00035 (session ticket, length=0) > ext 00015 (heartbeat, length=1) <-- Your server supports heartbeat. Bug is > possible when linking against OpenSSL 1.0.1f or older. Let me check. > Actively checking if CVE-2014-0160 works: Your server appears to be patched > against this bug. > > Kösz! ;-) > > Is there any reason why nightly security patches are not enabled by default > in FreeBSD? > > > Cheers > B. >
Why do you make such claim? The security patches are very much “enabled” (by using your words) in FreeBSD by default. This assuming that you are in fact aware of the update methods that are available and how they work. And for the update methods and how they work there’s a tremendous amount of information out there, even translated to your native language in some cases if the language barrier is a problem for you. -Kimmo
signature.asc
Description: Message signed with OpenPGP using GPGMail