From 4dcbb3878be84b8f6d2a0e62662203ffac72d9d3 Mon Sep 17 00:00:00 2001 From: Thorin-Oakenpants Date: Sat, 4 Nov 2017 22:18:13 +1300 Subject: [PATCH] Updated Appendix C: Test Sites (markdown) --- Appendix-C:-Test-Sites.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Appendix-C:-Test-Sites.md b/Appendix-C:-Test-Sites.md index 726cbd8..43fe19d 100644 --- a/Appendix-C:-Test-Sites.md +++ b/Appendix-C:-Test-Sites.md @@ -36,8 +36,9 @@ If you would like to submit a test page to be added to this list, please post th - [How's My SSL](https://www.howsmyssl.com/) - **h**ttps://www.howsmyssl.com/ - [Heartbleed](https://filippo.io/Heartbleed/) - **h**ttps://filippo.io/Heartbleed/ - [Freak Attack](https://freakattack.com/clienttest.html) - **h**ttps://freakattack.com/clienttest.html - * Firefox is not vulnerable to this attack + * Firefox is not vulnerable to this attack [source](http://www.eweek.com/blogs/security-watch/microsoft-admits-windows-users-are-vulnerable-to-freak-attacks) - [Logjam](https://weakdh.org/) - **h**ttps://weakdh.org/ + * Firefox 39+ is not vulnerable [source](https://www.mozilla.org/security/advisories/mfsa2015-70/) - [Symantec](https://cryptoreport.websecurity.symantec.com/checker/views/sslCheck.jsp) - **h**ttps://cryptoreport.websecurity.symantec.com/checker/views/sslCheck.jsp - [GRC Fingerprint](https://www.grc.com/fingerprints.htm) - **h**ttps://www.grc.com/fingerprints.htm * EV [Extended Validation] / SSL Interception check [Do you see a bright green padlock?]