by Krupashankar S, Wednesday, March 11, 2015, 13:03 (3305 days ago)
Is wodSSH.NET affected by the OpenSSL Freak vulnerability? I am using v2.0. If it is affected, is there a hotfix or a patch available to overcome this vulnerability?
Freak vulnerability
by Jasmine, Wednesday, March 11, 2015, 13:38 (3305 days ago)@ Krupashankar S
Hi Krupashankar,
FREAK affects only SSL/TLS protocol, not the SSH, so wodSSH.NET is not vulnerable in any way.
I hope this helps!
Jasmine.
It was no small factor, however, that your support in getting me up and running made me buy from you.
Charles Taylor
InterWeave, Inc.
Your component works really great. With minor effort I have been able to convert my delphi application...
Gilles Hache
Cisco Systems Inc.
We have recently completed a large 1200+ location project where reliable Telnet and SSH connectivity was required. wodSSH worked flawlessly and allowed our staff to complete our project ontime and within budget.
James Sievers
Harbor Technologies
The wodCrypt product is great and we appreciate your effort to add support for UNIX Crypt.
William Ruf
Siemens Information and Communication Networks
The people at WeOnlyDo are amazing! ... I always get a super fast response from customer service, and the products are great too. Thanks WeOnlyDo
Jeff Hall
Occupational Health Research
Your professionalism is reflected into your email, your product and your web site. I am confident that these will make the difference.
Sylvain Paquette
R&D Analyst at InfoPharm Inc.
Don't be fooled by the cost, it's value and quality far exceeds the price being charged!
Ian D. Mead, author of UltraEdit-32
IDM Computer Solutions
Thank you so much for your hard work and commitment in producing well thought-out solutions. WeOnlyDo is very committed to customer satisfaction!
Mike McPherson
Nokia Inc.
Count us as a satisfied WeOnlyDo customer. We appreciate your terrific support to get the secure Telnet working properly.
Don Fitzpatrick
InterNetworx Systems
...with the SFTP interface you produced, everything was so simple to understand, we were able to start coding almost immediately!