mirror of
				https://github.com/drwetter/testssl.sh.git
				synced 2025-10-31 05:45:26 +01:00 
			
		
		
		
	Trim excess whitespace
This commit is contained in:
		| @@ -14,7 +14,7 @@ The certificate trust stores were retrieved from | ||||
|   --> "Keychain Access" (2 click). In that window --> "Keychains" --> "System" | ||||
|   --> "Category" --> "All Items" | ||||
|   Select all CA certificates except for Developer ID Certification Authority,  "File" --> "Export Items" | ||||
|     2. __Internet:__ Pick the latest subdir (=highest number) from https://opensource.apple.com/source/security_certificates/. They are in DER format despite their file extension. Download them with ``wget --level=1 --cut-dirs=5  --mirror --convert-links --adjust-extension --page-requisites  --no-parent https://opensource.apple.com/source/security_certificates/security_certificates-*/certificates/roots/`` | ||||
|     2. __Internet:__ Pick the latest subdir (=highest number) from https://opensource.apple.com/source/security_certificates/. They are in DER format despite their file extension. Download them with ``wget --level=1 --cut-dirs=5 --mirror --convert-links --adjust-extension --page-requisites --no-parent https://opensource.apple.com/source/security_certificates/security_certificates-*/certificates/roots/`` | ||||
|  | ||||
|  | ||||
| Google Chromium uses basically the trust stores above, see https://www.chromium.org/Home/chromium-security/root-ca-policy. | ||||
|   | ||||
| @@ -22,7 +22,3 @@ The whole process is done manually. | ||||
| * "ciphersutes" are TLS 1.3 ciphersuites. You can identify them as they currently are like 0x130?. Retrieve them from above see ``~/utils/hexstream2cipher.sh`` | ||||
| * Figure out the services by applying a good piece of human logic | ||||
| * Before submitting a PR: test it yourself! You can also watch it again via wireshark | ||||
|  | ||||
|  | ||||
|  | ||||
|  | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 a1346054
					a1346054