<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body bgcolor="#FFFFFF" text="#000000">
Again, we have a bunch of customers who are all "Vulnerable"
(because all Windows machines are) who are also trying to find out
if they are "at any risk whatsoever" from SSLMAGEDON. This is
especially important because the <a
href="http://aws.amazon.com/security/security-bulletins/ms14-066-advisory/">patch
has issues</a> and so people have to do a complex triage calculus
with it.<br>
<br>
Right now we're in a situation where nobody knows how bad the bug
really is going to be so while exploit writers are racing to get
something working, noone is truly sure if they are exposed. Of
course, the denial of service is a lot easier to trigger than full
remote code execution.<br>
<br>
And yet you'll notice that many IIS-based web sites are still
reachable! That means people are pretty nice in this world! A voice
for hope.<br>
<br>
-dave<br>
<br>
</body>
</html>