It appears that way if you put the whole URL in there.
REMOVE the "http://"; or the "https://";

add the ":443" after the domain if you want to be sure to test the SSL
(which is the whole point of this exercise)

I think you'll find response is quite quick if you leave off the https://

On Thu, Apr 10, 2014 at 8:55 AM, Bruce Walker <[email protected]> wrote:
> That site has been swamped with requests and times-out before
> returning an answer. But this articles lists common sites and their
> vulnerability or not:
>
> http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
>
>
> On Wed, Apr 9, 2014 at 11:11 AM, Darren Addy <[email protected]> wrote:
>> If you want to test your bank's web site (for example), just replace
>> the domain name here:
>> http://filippo.io/Heartbleed/
>>
>> I believe you either need to begin the URL with https: OR leave the
>> :443 (port number) in that field. Assuming they are running SSL on
>> standard port.
>>
>>
>>
>> On Wed, Apr 9, 2014 at 12:08 AM, David Mann <[email protected]> wrote:
>>> My server is fine as well.  Glad I had been procrastinating with an 
>>> upgrade, now I have an excuse to wait a bit longer :D
>>>
>>> Cheers,
>>> Dave
>>>
>>> On Apr 9, 2014, at 3:20 am, Tim Bray <[email protected]> wrote:
>>>
>>>> Yeah, you're right; e.g. my own tbray.org server is fine because it's
>>>> been up for 1080 days and has openssl 0.9.8.  My estimation of NSA's
>>>> cleverness is a little lower than yours, I bet it was a surprise to
>>>> them too.  Someone should ask Snowden ;)
>>>>
>>>> On Tue, Apr 8, 2014 at 7:51 AM, Igor Roshchin <[email protected]> wrote:
>>>>>
>>>>> Tim,
>>>>>
>>>>> Thanks a lot for the heads-up.
>>>>> Apparently, I saw it here before I saw it through the "proper" channels.
>>>>>
>>>>> Strictly speaking it is not a "zero-day", as it was introduced in the
>>>>> version 1.0.1, and the earlier versions are not vulnerable.
>>>>> (I haven't seen any discussion of this yet, but I wouldn't be too
>>>>> surprised if the NSA had known about this bug way before the disclosure.)
>>>>>
>>>>> Cheers,
>>>>>
>>>>> Igor
>>>>>
>>>>>
>>>>> On 4/7/2014 8:13 PM, Tim Bray wrote:
>>>>>> In the unlikely event that any of you run https-enabled web sites and
>>>>>> haven't visited heartbleed.com today, get thee over there post-haste
>>>>>> and find out what version of OpenSSL you're running and consider
>>>>>> replacing your certs, stat.
>>>>>>
>>>>>> I'm not sure I've ever seen a more damaging zero-day.
>>>>>>
>>>>>
>>>>> --
>>>>> PDML Pentax-Discuss Mail List
>>>>> [email protected]
>>>>> http://pdml.net/mailman/listinfo/pdml_pdml.net
>>>>> to UNSUBSCRIBE from the PDML, please visit the link directly above and 
>>>>> follow the directions.
>>>>
>>>> --
>>>> PDML Pentax-Discuss Mail List
>>>> [email protected]
>>>> http://pdml.net/mailman/listinfo/pdml_pdml.net
>>>> to UNSUBSCRIBE from the PDML, please visit the link directly above and 
>>>> follow the directions.
>>>
>>>
>>> --
>>> PDML Pentax-Discuss Mail List
>>> [email protected]
>>> http://pdml.net/mailman/listinfo/pdml_pdml.net
>>> to UNSUBSCRIBE from the PDML, please visit the link directly above and 
>>> follow the directions.
>>
>>
>>
>> --
>> Photographers must learn not to be ashamed to have their photographs
>> look like photographs.
>> ~ Alfred Stieglitz
>>
>> --
>> PDML Pentax-Discuss Mail List
>> [email protected]
>> http://pdml.net/mailman/listinfo/pdml_pdml.net
>> to UNSUBSCRIBE from the PDML, please visit the link directly above and 
>> follow the directions.
>
>
>
> --
> -bmw
>
> --
> PDML Pentax-Discuss Mail List
> [email protected]
> http://pdml.net/mailman/listinfo/pdml_pdml.net
> to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
> the directions.



-- 
Photographers must learn not to be ashamed to have their photographs
look like photographs.
~ Alfred Stieglitz

-- 
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
the directions.

Reply via email to