BTW: https://www.ssllabs.com/ssltest/analyze.html?d=openvas.org
This server's certificate is not trusted, see below for details. This server supports anonymous (insecure) suites (see below for details) The server does not support Forward Secrecy with the reference browsers This server is not vulnerable to the Heartbleed attack. Experimental: This server is not vulnerable to the OpenSSL CCS vulnerability Trusted No NOT TRUSTED Chain issues Contains anchor Am 24.07.2014 14:00, schrieb Reindl Harald: > > Am 24.07.2014 13:49, schrieb Michael Meyer: >> *** Reindl Harald wrote: >> >>> how *laughable is that* develop a security scanner and not patch >>> the own wiki of the scanner software? >> >> This server ist hosted and managed by a community member and not >> by the OpenVAS team > > hosted maybe, managed - no way - Heartbleed is not new > don't matter as long it's under the offical domain > > some would expect for good reasons that subdomains > below "openvas.org" are scanned regulary for "eat > your own dogfood" > > now it is redirected to "wiki.openvas.com" which is using the > identical wrong wildcard-cert, has the same leaks and IP > > * This server is vulnerable to the OpenSSL CCS vulnerability (CVE-2014-0224) > * This server is vulnerable to the Heartbleed attack > * The server does not support Forward Secrecy with the reference browsers > > wo is "*.red-net.info" and why that careless with CN?
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
