81.174.235.134:25
Vulnerable Because: supports SSLv2 export ciphers
Lorenzo iw3her
2016-03-01 23:34 GMT+01:00 Geoff Joy -KE6QH- <geoff(a)windowmeister.com>om>:
(Please trim inclusions from previous messages)
_______________________________________________
On Tue, 1 Mar 2016 19:05:46 +0000, G1FEF <chris(a)g1fef.co.uk> wrote:
(Please trim inclusions from previous messages)
_______________________________________________
I think they are caching results not testing live because the mail server
hasn’t
supported SSLv2 (or v3) since the last update, does anyone know of a
live test facility so I can double check?
Source code for a client-side DROWN scanner.
https://github.com/nimia/public_drown_scanner
--
Geoff Joy - ke6qh -
AmprNet IP Address Coordinator for San Bernardino & Riverside Counties.
(44.18/16)
_________________________________________
44Net mailing list
44Net(a)hamradio.ucsd.edu
http://hamradio.ucsd.edu/mailman/listinfo/44net