<div dir="ltr"><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><font size="2">Dear members ,<br><br>Network traffic encrypted using an RSA-based SSL certificate may be 
decrypted if enough SSLv2 handshake data can be collected. Exploitation 
of this vulnerability - referred to as DROWN in public reporting - may 
allow a remote attacker to obtain the private key of a server supporting
 SSLv2.<br clear="all"></font></div><font size="2"><br></font><div class="gmail_default" style="font-family:arial,helvetica,sans-serif"><font size="2">​For more information please visit ,<br><br></font>

<p class="MsoNormal"><font size="2"><a href="https://www.us-cert.gov/ncas/current-activity/2016/03/01/SSLv2-DROWN-Attack"><span style="line-height:115%">https://www.us-cert.gov/ncas/current-activity/2016/03/01/SSLv2-DROWN-Attack</span></a><span style="line-height:115%"></span></font></p>

<p class="MsoNormal"><font size="2"><a href="https://www.us-cert.gov/ncas/current-activity/2016/03/01/OpenSSL-Releases-Security-Advisory"><span style="line-height:115%">https://www.us-cert.gov/ncas/current-activity/2016/03/01/OpenSSL-Releases-Security-Advisory</span></a><span style="line-height:115%"></span></font></p>

<font size="2">​</font></div><br><br><br><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div><i><font size="2"><span style="font-family:arial,helvetica,sans-serif">Regards / Jahangir</span></font></i><div class="gmail_default" style="font-family:arial,helvetica,sans-serif;display:inline"><i><font size="2">​ | Open Comm​</font></i></div><br><div class="gmail_default" style="font-family:arial,helvetica,sans-serif;font-size:small"><br></div><br></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div>