The CVE-2015-0204 FREAK SSL vulnerability abuses intentionally weak “EXPORT” ciphers which could be used to perform a transparent Man In The Middle attack. (We seem to be continually bombarded with not only SSL vulnerabilities but the need to name vulnerabilities with increasing odd names.)
Is your server vulnerable?
This can be tested using the following GIST
If the result is 0; the server is not providing the EXPORT cipher; and as such is not vulnerable.
Is your client vulnerable?
Point your client to https://oneiroi.co.uk:4443/test if this
returns “Vulnerable” then the client is vulnerable, if you find a
connection error your client should not be vulnerable for
example:
root@host:/tmp$ openssl …