I see this on Linux-Plug list:
"If your operating system uses OpenSSL 1.0.1 its servers are vulnerable.
CentOS and pulled his patch here:
http://lists.centos.org/pipermail/centos-announce/2014-April/020249.html
If you have servers with Ubuntu 12.04 LTS you should take a look at this
discussion:
http://serverfault.com/questions/587574/apache-2-is-still-vulnerable-to-heartbleed-after-update-reboot"
2014-04-08 17:18 GMT-05:00 mex <nginx-forum@nginx.us>:
> Guide to Nginx + SSL + SPDY has been updated with some infos, links and
> tests
> regarding heartbleed
>
> https://www.mare-system.de/guide-to-nginx-ssl-spdy-hsts/#heartbleed
>
>
>
>
> regards,
>
> mex
>
> Posted at Nginx Forum:
> http://forum.nginx.org/read.php?2,249102,249131#msg-249131
>
> _______________________________________________
> nginx mailing list
> nginx@nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
>
--
Un abrazo!
*Raúl Hugo http://twitter.com/raulhugo*
*Miembro Asociadohttp://apesol.org.pe http://apesol.org.pe/SysAdmin Cel.
#961-710-096 Linux Registered User #482081 - http://counter.li.org/
http://counter.li.org/P Antes de imprimir este e-mail piense bien si es
necesario hacerlo*
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx