[170904] in North American Network Operators' Group
RE: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]
daemon@ATHENA.MIT.EDU (Warren Bailey)
Sat Apr 12 02:43:51 2014
From: Warren Bailey <wbailey@satelliteintelligencegroup.com>
To: Frank Bulk <frnkblk@iname.com>, "Valdis.Kletnieks@vt.edu"
<Valdis.Kletnieks@vt.edu>, Matt Palmer <mpalmer@hezmatt.org>
Date: Sat, 12 Apr 2014 06:43:28 +0000
In-Reply-To: <000c01cf560f$2e4696f0$8ad3c4d0$@iname.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Reply-To: Warren Bailey <wbailey@satelliteintelligencegroup.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
I'd be interested in the other 0 days they have..;)
Sent from my T-Mobile 4G LTE Device
-------- Original message --------
From: Frank Bulk <frnkblk@iname.com>
Date: 04/11/2014 11:24 PM (GMT-07:00)
To: Valdis.Kletnieks@vt.edu,Matt Palmer <mpalmer@hezmatt.org>
Cc: nanog@nanog.org
Subject: RE: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Year=
s]
I'm not sure if anyone of you has access to those automated tools, but I'd
be interested in learning if any of them do catch the bug.
Frank
-----Original Message-----
From: Valdis.Kletnieks@vt.edu [mailto:Valdis.Kletnieks@vt.edu]
Sent: Friday, April 11, 2014 7:50 PM
To: Matt Palmer
Cc: nanog@nanog.org
Subject: Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for
Years]
On Sat, 12 Apr 2014 07:56:01 +1000, Matt Palmer said:
<snip>
Heck, there's a good chance that automated tools could have spotted it.