On Tue, Apr 08, 2014 at 05:56:45PM -0600, Me wrote: > > On 04/08/2014 10:16 AM, Patrick W. Gilmore wrote: > >Lots of tools available. I'm with ferg, surprised more haven't been > >mentioned here. > > > >Tools to check for the bug: > > • on your own box: > > https://github.com/musalbas/heartbleed-masstest/blob/master/ssltest.py > > • online: http://filippo.io/Heartbleed/ (use carefully as they might > > log what you check) > > • online: http://possible.lv/tools/hb/ > > • offline: https://github.com/tdussa/heartbleed-masstest <--- Tobias > > Dussa, also Takes a CSV file with host names for input and ports as > > parameter > > • offline: http://s3.jspenguin.org/ssltest.py > > • offline: https://github.com/titanous/heartbleeder > > > >List of vulnerable Linux distributions: <http://www.circl.lu/pub/tr-21/>. > > > >Anyone have any more? > > > Thanks for the expanded list, I had some of these already. I'm not > comfortable in letting some online code that I can't see test my > site though. > > --John
or, there is this: http://git.openssl.org/gitweb/?p=openssl.git /bill