SSL Heartbleed iRule update
Updated Mar 18, 2022
Version 2.0Was this article helpful?
Thanks for the quick response iRule :-)
I've tested this rule on a vs which does terminate SSL, to provide visibility of attackers scanning for the vulnerability. It mostly seems to work well; but I've seen a couple of the following log messages:
- missing count for "@" field specifier while executing "binary scan [TCP::payload] @${i}cSS t v r"
Any ideas on what may cause this error message?
Thanks!