Commit Graph

3515 Commits

Author SHA1 Message Date
Dirk Wetter
a180ec4f80 update Linux.pem + Mozilla.pem 2020-11-11 18:37:56 +01:00
Dirk Wetter
f3abf77ed8
Merge pull request #1761 from keisentraut/fix-1757-3.0
fix #1757: manpage: --c has one dash to much (backport 3.0)
2020-10-29 20:28:23 +01:00
Klaus Eisentraut
44fd73bfcd fix #1757: manpage: --c has one dash to much (backport 3.0) 2020-10-29 20:21:05 +01:00
Dirk Wetter
0cf5a49762
Merge pull request #1759 from drwetter/fix_1754_3.0
Fix run_freak() when sslv2 server hello is empty (3.0 branch)
2020-10-28 15:05:51 +01:00
Dirk Wetter
3c97412a61 Address complaint by Travis + RC4 SSLv2 ciphers shortcut
Despite the fact google doesn't support RC4 ciphers, testssl.sh called
sslv2_sockets(). Google answered with a >= TLS alert. Building a sum then
failed then in sslv2_sockets().

This fixes sslv2_sockets() and introduces count_chars() as a helper function
(tested also under old FreeBSD to make sure it works under MacOSX).

Also it adds a shortcut: if we are sure we don't have sslv2 we don't need
to test any RC4 SSLv2 ciphers
2020-10-28 11:45:41 +01:00
Dirk
4ddc90d98d Fix run_freak() when sslv2 server hello is empty (3.0 branch)
This fixes #1754 by avoiding further string operations if the SSLv2 socket reply is empty as bash 5.1 seems to have a problem with that. The fix is done in sslv2_sockets() .

Also sslv2 is not being used in run_freak() if known not to be supported.
2020-10-27 22:48:50 +01:00
Dirk Wetter
cd9b98ca70
Merge pull request #1727 from drwetter/fix_1725_SCIR_3.0
Fix Secure Client-Initiated Renegotiation false positive (3.0 branch)
2020-09-16 20:13:33 +02:00
Dirk
08feaf4a0c Fix Secure Client-Initiated Renegotiation false positive (3.0 branch)
Server side closed the connection but openssl retrieved
a zero exit code. In addition now we look for "closed"
and if that was returned from the server we label it
as not vulnerable.

This fixes #1725.

Same fix as for 3.1dev, see #1726
2020-09-16 18:13:47 +02:00
Dirk Wetter
c0581afeeb
Merge pull request #1712 from dcooper16/fix1699_3.0
Fix #1699 in 3.0 branch
2020-08-31 17:07:46 +02:00
David Cooper
b7dab55b6c Fix #1699 in 3.0 branch
This commit makes the same change as #1711, but in the 3.0 branch.
2020-08-31 10:42:11 -04:00
Dirk
d9866d875a Revised risk for BREACH --> medium 2020-07-10 19:56:18 +02:00
Dirk Wetter
e1b0f2d55f
Merge pull request #1673 from dcooper16/fix_unrecognized_option_3.0
Fix printing of unrecognized option in 3.0 branch
2020-07-07 15:54:11 +02:00
David Cooper
cb5305e42d Fix printing of unrecognized option in 3.0 branch
When testssl.sh is called with an unknown option it prints something like:

     0: unrecognized option "--option"

It should be printing the name of the program rather than "0". This commit fixes that.
2020-07-07 07:39:28 -04:00
Dirk Wetter
2949b95937
Merge pull request #1667 from dcooper16/fix1665_3.0
Fix #1665 in 3.0 branch
2020-06-25 20:45:42 +02:00
David Cooper
e2dce19559
Fix #1665 in 3.0 branch
This commit fixes #1665 by adding the certificate number to the JSON identifier for cert_eTLS.
2020-06-25 13:24:10 -04:00
Dirk Wetter
916d942b00
Merge pull request #1664 from dcooper16/fix1662_3.0
Fix #1662 in 3.0 branch
2020-06-25 13:40:41 +02:00
David Cooper
f7ef50b968
Fix #1662 in 3.0 branch
This commit fixes #1662 in the 3.0 branch by changing the fileout to use the value of $cert_ext_keyusage rather than the string "cert_ext_keyusage".
2020-06-25 07:37:37 -04:00
Dirk Wetter
2cdcf1564b
Merge pull request #1661 from csett86/wireshark-android-7-0-backport
Add wiresharked Android 7.0 (native) (backport of #1659)
2020-06-25 08:31:17 +02:00
Christoph Settgast
e2a1f9f329 Add wiresharked Android 7.0 (native)
After being bitten by https://stackoverflow.com/questions/39133437/sslhandshakeexception-handshake-failed-on-android-n-7-0
I add a wiresharked Android 7.0 to reflect that bug in Android 7.0.

Backport of 82e939f2bd
2020-06-24 21:10:22 +02:00
Dirk Wetter
594f09e858
Merge pull request #1647 from drwetter/fix_mxs_in_get_mx_record
Fix wrong variable declaraton in get_mx_record()
2020-05-26 09:35:54 +02:00
Dirk
11c03790bf Fix wrong variable declaraton in get_mx_record()
mx was declared, mxs used instead. This fixes
it by correcting the declaration.
2020-05-25 21:28:44 +02:00
Dirk Wetter
c6ca746954
Merge pull request #1634 from drwetter/dockerfile+
Better Dockerfile: doesn't require "git clone"
2020-05-09 12:54:02 +02:00
Dirk
e5bb789dd3 Better Dockerfile: doesn't require "git clone"
.. see also #1559.

It "mkdirs" the needed etc and bin directories first, then copies
stuff over. It also reduces a few layers.

Also it corrects a mistake in the Readme.md (docker exec --> run)
2020-05-09 12:48:11 +02:00
Dirk Wetter
747b1e20ac
Merge pull request #1633 from unit193/3.0
Fix a couple typos.
2020-05-09 12:20:03 +02:00
Unit 193
f1a53a5b3a Fix a couple typos.
enviroment → environment
ususally → usually
2020-05-09 05:42:41 -04:00
Dirk Wetter
4e887e3ee4
Merge pull request #1628 from drwetter/bump_version302
Bump version to 3.0.2
2020-05-08 11:44:48 +02:00
Dirk Wetter
eb1398c04c
Merge pull request #1627 from drwetter/dockerhub_workaround
Provide the correct branch to Dockerhub builds
2020-05-08 11:36:36 +02:00
Dirk
f16ed46e76 Provide the correct branch to Dockerhub builds
... and at the same time allow correct local builds --
the default branch is 3.1dev at the moment.

It still clones the repo from github which isn't
needed. A pure copy command would be the best. However
it might cause other problems.

See also #1559
2020-05-08 11:32:39 +02:00
Dirk Wetter
e628c16155
Merge pull request #1626 from drwetter/revert-1625-dockerfile_fixtest
Revert "Try to fix builds by Dockerhub"
2020-05-08 10:30:42 +02:00
Dirk Wetter
1edb6159be
Revert "Try to fix builds by Dockerhub" 2020-05-08 10:21:24 +02:00
Dirk Wetter
003f35d273
Merge pull request #1625 from drwetter/dockerfile_fixtest
Try to fix builds by Dockerhub
2020-05-07 20:44:31 +02:00
Dirk
3eba7ab0f2 Try to fix builds by Dockerhub
see also #1559
2020-05-07 20:42:43 +02:00
Dirk Wetter
0ba2b6e862
Merge pull request #1622 from drwetter/drwetter-patch-2
Labelling, look @ 3.0.2
2020-05-07 19:57:04 +02:00
Dirk Wetter
b1eda9b2bf Just bump version 2020-05-07 19:55:04 +02:00
Dirk Wetter
fb80e1cc44
Merge pull request #1624 from dcooper16/fix_cp_error_30
Fix copy and paste error
2020-05-07 19:44:16 +02:00
David Cooper
d4bb2dd906 Fix copy and paste error
This commit fixes a bug in the 3.0 branch that was introduced by an accidental copy and paste.
2020-05-07 12:31:55 -04:00
Dirk Wetter
0393cb42f9
Labelling, look @ 3.0.2
* outlook to 3.0.2 (~tomorrow), remove ref. to rc
* fix docker cmd line (albeit there's still a problem w dockerhub) 
* label 3.1dev it as a ~rolling release
2020-05-07 11:16:59 +02:00
Dirk Wetter
f49d73498a
Merge pull request #1617 from dcooper16/backport_1609_and_1616
Backport #1609 and #1616
2020-05-06 16:34:57 +02:00
David Cooper
3d48e6c7cb
Backport #1609 and #1616
This commit back ports #1609 and #1616 to the 3.0 branch.
2020-05-06 08:39:22 -04:00
Dirk Wetter
005abad35c
Merge pull request #1614 from drwetter/license_patch3.0
Amendment to "Relax the possible GPL license contradiction"
2020-05-06 09:19:04 +02:00
Dirk
1325178f8d Amendment to "Relax the possible GPL license contradiction"
fix it also in the man pages. See #1590 / #1592
2020-05-06 09:12:38 +02:00
Dirk Wetter
870b78034d
Merge pull request #1611 from drwetter/xmpp_improvements_3.0
Fix STARTTLS pretests, improve XMPP handshakes (backport)
2020-05-05 08:47:30 +02:00
Dirk Wetter
6df3f2bd4e Remove not needed if clause in starttls_io()
.. amends 35833c1979
2020-05-04 23:05:53 +02:00
Dirk Wetter
35833c1979 Fix STARTTLS pretests, improve XMPP handshakes (backport)
There was a empty variable in determine_optimal_proto() which prevented to save STARTTLS_OPTIMAL_PROTO. This is fixed.

The buffers and return codes for XMPP in starttls_io() were under not every
circumstances correct. This fixes those cases and making that in general more
robust (hopefully).
2020-05-04 23:03:01 +02:00
Dirk Wetter
47e16b08c5
Merge pull request #1607 from drwetter/1590_2
Address further potential license restriction
2020-05-04 20:27:52 +02:00
Dirk
c5cee3ddb6 Address further potential license restriction
.. see https://github.com/drwetter/testssl.sh/issues/1590#issuecomment-623526604

Added some formatting and verbal improvements in the intruductory comment section.
2020-05-04 20:24:24 +02:00
Dirk Wetter
85faf9d096
Merge pull request #1606 from drwetter/add_brotli_3.0
Add brotli compression detection for BREACH (backport)
2020-05-04 17:50:32 +02:00
Dirk Wetter
85a529ee00 Add brotli compression detection for BREACH (backport)
As noted in #1605 the brotli compression check was missing. So hosts
which didn't offer gzip deflate or compress but brotli seemed to
be fine but they shoould have been labled as potentially VULNERABLE.

This also fixes a bug: The HTTP header returned was only checking
for case-sensitive "Content-Encoding". RFC 2616 states in 4.2
(Message Headers): "Field names are case-insensitive"
2020-05-04 13:23:05 +02:00
Dirk Wetter
dbff0f9673
Merge pull request #1604 from drwetter/aes_cgm_doc_3.0
Fix typo in docs: Strong grade Ciphers / AEAD
2020-05-02 20:01:27 +02:00
Dirk
e3ecd72deb Fix typo in docs: Strong grade Ciphers / AEAD 2020-05-02 19:57:02 +02:00