Hi Steve,
That’s quite a few in one go - is this due to greater testing of OpenSSL and
more scrutiny of the code by the community?
Of the flaws listed, which is the one of most concern?
This kind of begs the question what to do with all those embedded systems that
run older versions of OpenSSL
%-> But, then again, after nearly 18 years of "Internet" connectivity and
%-> constant urging of our fellow employees who remember the "good
%-> old days", we
%-> are fairly close to what one might call "zero tolerance".
Yep, and ORBS' insistence on abusing non-relaying MTAs that have never been
%-> There probably is a way - perhaps a direct tap into orbs - BUT
%-> that would
%-> affect us more than them. See - if they ISP the emails are originating
%-> from is in say ORBS then all mail from that ISP will get bounced - hense
Not ORBS, thanks. It has spite-listed most of my ISP's netbloc
This is as far as I get...
../certs/vsigntca.pem: OK
Generate a set of DH parameters
./dhtest
.+.++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*++*+
+*++*++*
p=E063DD42B2E294D3
g=5
pri 1=46C278B63CE23DAD
pub 1=C4BF8DF2FF965D66
pri 2=4DEFB8E041D68290
pub 2=6F7EA01B7