4865 Commits

Author SHA1 Message Date
Dirk
ebb7cf558e Update handshake 2025-04-16 21:48:30 +02:00
Dirk
81e4856b79 fix typo 2025-04-16 21:35:27 +02:00
Dirk
4a2228f401 Updating Android handshakes
- Android 13 and 14 were added. They are the same, see ja3 + ja4 value
- as it turned out Android 11 and 12 have also the same ja3 + ja4 values (retrieved from old pcap files)
- so both will be labeled 11/12 an 13/14
- old pcaps from Android 11/12 showed no ALPN --> corrected
2025-04-16 21:28:08 +02:00
Dirk
fdb2da80d6 fix typo 2025-04-09 20:35:44 +02:00
Dirk
5d9d5276e3 Firefox 137 (Win 11) 2025-04-09 20:28:31 +02:00
Dirk
51fce5feb1 fix ja3/4 for Edge 133 Win 11 23H2 2025-04-09 20:18:24 +02:00
Dirk
b18dd2aa28 Edge 133 Win 11 23H2 2025-04-09 20:14:42 +02:00
Dirk
647aeae205 Update docu and (futile) perl script 2025-04-09 20:00:47 +02:00
Dirk
f337f53e49 Reorder Java 8 2025-04-09 19:40:12 +02:00
Dirk
85232b7bc5 Chromium 137 Win 11 2025-04-09 19:31:35 +02:00
Dirk
84e77d2bb0 Java 21 2025-04-09 17:07:19 +02:00
Dirk
31e2f43eec LibreSSL update 3.3.6 (MacOS)
.. renaming that to macOS instead "Apple".
2025-04-09 16:51:26 +02:00
Dirk
4f696f94df Add openssl 3.0.15 (from Debian)
... and set OpenSSL 3.0.3 (git) as not to list
2025-04-09 16:39:05 +02:00
Dirk
e4cdca9e63 Add Safari 18.4 @ MacOS 15.4 2025-04-09 15:53:11 +02:00
Dirk
d601f33a37 Merge branch '3.2' into new_Handshakes 2025-04-09 10:59:40 +02:00
Dirk Wetter
bc0c9f9c4b
Merge pull request #2733 from dcooper16/ossl35_client_sim
OpenSSL 3.5.0 client simulation
2025-04-09 10:46:20 +02:00
David Cooper
3a8038636d OpenSSL 3.5.0 client simulation
Add OpenSSL 3.5.0 to etc/client-simulation.txt.
2025-04-08 15:26:41 -07:00
Dirk
0d7c33ab7f deprecate more
- Safari 12.1 (iOS 12.2)
- Firefox 66 (Win 8.1/10)
2025-04-08 16:14:37 +02:00
Dirk
887653a033 Deprecate a few entries ...
- Android 5+6
- Chrome 79 Win 10
- IE 6 XP
- IE 8 XP
- Safari 13.0 (macOS 10.14.6)
- OpenSSL 1.1.0l (Debian)

... before new ones are added
2025-04-08 16:06:55 +02:00
Dirk
7939144af1 Swap Android 6 for Android 5
... as it seems to habe more market share
2025-04-08 15:49:44 +02:00
Dirk
58ddfd8a24 Add hint for JA3/4
+ minor corrections
2025-04-07 19:38:05 +02:00
Dirk
45be26db7c Add Java 8u442 handshake
Also the ja3 and ja4 values were added as retrieved from wireshark.

See also #2430 .
2025-04-07 19:36:34 +02:00
Dirk Wetter
06682990ba
GHCR clearer 2025-04-06 20:29:18 +02:00
Dirk Wetter
f7f35fe4c6
Merge pull request #2729 from testssl/ghcr.io-doc
Add minimal doc for GHCR
2025-04-06 18:29:07 +02:00
Dirk Wetter
ac0419eaad Add minimal doc for GHCR 2025-04-06 18:27:37 +02:00
Dirk Wetter
b20add1d12
Merge pull request #2684 from testssl/new_binaries
Start working on a set of new binaries
2025-04-04 14:15:00 +02:00
Dirk Wetter
b7f9ff1bf2
Merge pull request #2727 from dcooper16/chacha20
ChaCha20 decryption
2025-04-04 11:54:05 +02:00
Dirk Wetter
be9a85c1f7
Merge pull request #2726 from dcooper16/fix_has_uds_checks
Fix checks with HAS_UDS and HAS_UDS2
2025-04-02 21:47:41 +02:00
David Cooper
f6ff390799
Fix checks with HAS_UDS and HAS_UDS2
This commit fixes a check where the Boolean variables $HAS_UDS and $HAS_UDS2 are checked for whether they are empty rather than for whether they are true.
2025-04-02 08:03:58 -07:00
David Cooper
e2accb6442 ChaCha20 decryption
Decryption is TLS 1.3 handshakes is very slow if the response is encrypted using ChaCha20 and the $OPENSSL enc command does not support ChaCha20. This commit mitigates that problem by using $OPENSSL2 for ChaCha20 decryption if such decryption is needed and $OPENSSL does not support it.

This commit also changes testssl.sh to make use of $OPENSSL2 for AES-GCM decryption, when $OPENSSL2 supports it, but $OPENSSL does not. However, this change is not as important. Implementing AES-GCM in Bash using $OPENSSL for AES ECB operations isn't nearly as slow as fully implementing ChaCha20 in Bash.
2025-04-02 07:55:31 -07:00
Dirk
672d253981 Fix typo 2025-04-01 18:58:12 +02:00
Dirk
b149fc4da4 Reorder, rephrase, timing
Also provide a runtime table, from a little research.
2025-04-01 15:24:40 +02:00
Dirk
45a264e4e4 Fix typo 2025-03-31 18:08:27 +02:00
Dirk
f55abf56af Add new 64 Bit binaries (Linux, FreeBSD)
... from https://github.com/testssl/openssl-1.0.2.bad .
2025-03-31 17:54:40 +02:00
Dirk
093e8ddd10 Remove redundant statements 2025-03-31 17:54:01 +02:00
Dirk Wetter
2dfd192f27
Typos / when needed 2025-03-30 19:59:23 +02:00
Dirk
3a414d60bf Comment the removal of binaries 2025-03-30 18:14:41 +02:00
Dirk
f208c09803 Rename file 2025-03-30 18:11:21 +02:00
Dirk
0e765986dc Remove output from openssl Kerberos binary
... as we don't supply the kerberos binary anymore
2025-03-30 18:08:58 +02:00
Dirk
1852ef6a1d Remove 32 Bit Linux binary
... as it is a niche thing. It might be available @ the contibuted
build directory @ https://testssl.sh
2025-03-30 18:06:58 +02:00
Dirk
5a1d90f310 Fix link 2025-03-28 18:33:14 +01:00
Dirk Wetter
a348839f60
Merge pull request #2720 from testssl/add_comment_get_server_cert
Comment the first lines get_server_certificate()
2025-03-25 21:56:32 +01:00
Dirk Wetter
040ef1e0c9 Comment the first lines get_server_certificate()
See https://github.com/testssl/testssl.sh/issues/2707#issuecomment-2741053487
2025-03-25 17:22:10 +01:00
Dirk Wetter
5359befc60
Merge pull request #2716 from testssl/sanitze_http_header_better
Sanitze HTTP header early and better
2025-03-20 15:44:28 +01:00
Dirk Wetter
a17bb42a37 Sanitze HTTP header early and better
On MacOS `run_http_header()` hiccuped when in any place of the web site unprintable chars were returned, see https://github.com/testssl/testssl.sh/issues/2708#issuecomment-2738347784 .

This PR fixes that by moving the sanitization to a separate function and run it earlier before any processing of the returned content (header plus body) takes place.

Output was:

```
'HTTP Status Code           awk: towc: multibyte conversion failure on: '� disabilitato");

 input record number 36, file /tmp/testssl.FHu8E0/AAA.BBB.CCC.DDD.http_header.txt
 source line number 1
'wk: towc: multibyte conversion failure on: '� disabilitato");

 input record number 36, file /tmp/testssl.FHu8E0/AAA.BBB.CCC.DDD.http_header.txt
 source line number 1
  200 OK
```
2025-03-20 13:34:46 +01:00
Dirk Wetter
692b9c9260
Merge pull request #2710 from testssl/fix_2708_TLS_FALLBACK_SCSV
Set POODLE var when exiting run_ssl_poodle()
2025-03-20 10:45:57 +01:00
Dirk Wetter
70dacdf9fa
Merge pull request #2709 from testssl/nameopt_utf8_2705
Fix LibreSSL parsing (-nameopt utf8)
2025-03-19 23:41:47 +01:00
Dirk Wetter
e4bbd6b517 Set POODLE var when exiting run_ssl_poodle()
... so that run_tls_fallback_scsv() doesn't exit with a warning.

This fixes #2708 .
2025-03-19 23:30:06 +01:00
Dirk Wetter
8d8f83ace5 Fix LibreSSL parsing (-nameopt utf8)
When parsing the intermediate cerificates there was a parser problem when using
LibreSSL and not OpenSSL.

This PR fixes the issue #2705 and addresses the problem by using the -nameopt multiline command
of LibreSSL/OpenSSL .
2025-03-19 22:36:37 +01:00
Dirk Wetter
a43261fc6f
Merge pull request #2703 from dcooper16/ocsp_check_rev_ossl_ver
OpenSSL version check in check_revocation_ocsp()
2025-03-18 13:04:23 +01:00