From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from localhost (71-34-83-176.ptld.qwest.net [71.34.83.176]) by hurricane.the-brannons.com (Postfix) with ESMTPSA id 851BB7961F; Wed, 4 Mar 2015 09:11:01 -0800 (PST) From: Chris Brannon To: Karl Dahlke References: <20150204111907.eklhad@comcast.net> Date: Wed, 04 Mar 2015 09:10:59 -0800 In-Reply-To: <20150204111907.eklhad@comcast.net> (Karl Dahlke's message of "Wed, 04 Mar 2015 11:19:07 -0500") Message-ID: <87r3t47knw.fsf@mushroom.localdomain> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.4 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain Cc: Edbrowse-dev@lists.the-brannons.com Subject: Re: [Edbrowse-dev] FREAK X-BeenThere: edbrowse-dev@lists.the-brannons.com X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Edbrowse Development List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 04 Mar 2015 17:11:01 -0000 Karl Dahlke writes: > Has anyone looked into the freak attack > as it relates to edbrowse and/or openssl? Well, the freak attack site offers a client test. Unfortunately, it is too JS heavy for edbrowse. I'm thinking this may be one of those deals where if we're vulnerable, we just upgrade our libraries, and it'll be fixed. -- Chris