![](https://seccdn.libravatar.org/avatar/9c06031aaadda145089b2480338feb86.jpg?s=120&d=mm&r=g)
Dne Pá 11. dubna 2014 09:04:42, Greg Freemyer napsal(a):
On April 11, 2014 8:25:31 AM EDT, Per Jessen <per@computer.org> wrote:
Greg Freemyer wrote:
On April 11, 2014 6:45:54 AM EDT, "Vojtěch Zeisek"
<vojtech.zeisek@opensuse.org> wrote:
Dear openSUSE on-line friend, how do You test Your servers to ensure they weren't compromised? I have to say I have no idea at all... :-/ Good luck, Vojtěch
It's not easy: Try this: http://filippo.io/Heartbleed/
There is also a command-line version.
You answered a different question.
E.g.
You answered "how can I tell if I am currently vulnerable?"
I think the question was "how can I tell if I was compromised in the 2 years between this bug / vulnerability being introduced and today?"
Yes, thank You. As I expected, there is no easy way how to find out if my server was attacked or not... I use denyhosts and fail2ban to block attackers randomly trying random combinations of username and password...
I tried to answer the second question.
Greg
All the best, Vojtěch -- Vojtěch Zeisek Komunita openSUSE GNU/Linuxu Community of the openSUSE GNU/Linux http://www.opensuse.org/ http://trapa.cz/