Commit Graph

3465 Commits

Author SHA1 Message Date
a180ec4f80 update Linux.pem + Mozilla.pem 2020-11-11 18:37:56 +01:00
f3abf77ed8 Merge pull request #1761 from keisentraut/fix-1757-3.0
fix #1757: manpage: --c has one dash to much (backport 3.0)
2020-10-29 20:28:23 +01:00
44fd73bfcd fix #1757: manpage: --c has one dash to much (backport 3.0) 2020-10-29 20:21:05 +01:00
0cf5a49762 Merge pull request #1759 from drwetter/fix_1754_3.0
Fix run_freak() when sslv2 server hello is empty (3.0 branch)
2020-10-28 15:05:51 +01:00
3c97412a61 Address complaint by Travis + RC4 SSLv2 ciphers shortcut
Despite the fact google doesn't support RC4 ciphers, testssl.sh called
sslv2_sockets(). Google answered with a >= TLS alert. Building a sum then
failed then in sslv2_sockets().

This fixes sslv2_sockets() and introduces count_chars() as a helper function
(tested also under old FreeBSD to make sure it works under MacOSX).

Also it adds a shortcut: if we are sure we don't have sslv2 we don't need
to test any RC4 SSLv2 ciphers
2020-10-28 11:45:41 +01:00
4ddc90d98d Fix run_freak() when sslv2 server hello is empty (3.0 branch)
This fixes #1754 by avoiding further string operations if the SSLv2 socket reply is empty as bash 5.1 seems to have a problem with that. The fix is done in sslv2_sockets() .

Also sslv2 is not being used in run_freak() if known not to be supported.
2020-10-27 22:48:50 +01:00
cd9b98ca70 Merge pull request #1727 from drwetter/fix_1725_SCIR_3.0
Fix Secure Client-Initiated Renegotiation false positive (3.0 branch)
2020-09-16 20:13:33 +02:00
08feaf4a0c Fix Secure Client-Initiated Renegotiation false positive (3.0 branch)
Server side closed the connection but openssl retrieved
a zero exit code. In addition now we look for "closed"
and if that was returned from the server we label it
as not vulnerable.

This fixes #1725.

Same fix as for 3.1dev, see #1726
2020-09-16 18:13:47 +02:00
c0581afeeb Merge pull request #1712 from dcooper16/fix1699_3.0
Fix #1699 in 3.0 branch
2020-08-31 17:07:46 +02:00
b7dab55b6c Fix #1699 in 3.0 branch
This commit makes the same change as #1711, but in the 3.0 branch.
2020-08-31 10:42:11 -04:00
d9866d875a Revised risk for BREACH --> medium 2020-07-10 19:56:18 +02:00
e1b0f2d55f Merge pull request #1673 from dcooper16/fix_unrecognized_option_3.0
Fix printing of unrecognized option in 3.0 branch
2020-07-07 15:54:11 +02:00
cb5305e42d Fix printing of unrecognized option in 3.0 branch
When testssl.sh is called with an unknown option it prints something like:

     0: unrecognized option "--option"

It should be printing the name of the program rather than "0". This commit fixes that.
2020-07-07 07:39:28 -04:00
2949b95937 Merge pull request #1667 from dcooper16/fix1665_3.0
Fix #1665 in 3.0 branch
2020-06-25 20:45:42 +02:00
e2dce19559 Fix #1665 in 3.0 branch
This commit fixes #1665 by adding the certificate number to the JSON identifier for cert_eTLS.
2020-06-25 13:24:10 -04:00
916d942b00 Merge pull request #1664 from dcooper16/fix1662_3.0
Fix #1662 in 3.0 branch
2020-06-25 13:40:41 +02:00
f7ef50b968 Fix #1662 in 3.0 branch
This commit fixes #1662 in the 3.0 branch by changing the fileout to use the value of $cert_ext_keyusage rather than the string "cert_ext_keyusage".
2020-06-25 07:37:37 -04:00
2cdcf1564b Merge pull request #1661 from csett86/wireshark-android-7-0-backport
Add wiresharked Android 7.0 (native) (backport of #1659)
2020-06-25 08:31:17 +02:00
e2a1f9f329 Add wiresharked Android 7.0 (native)
After being bitten by https://stackoverflow.com/questions/39133437/sslhandshakeexception-handshake-failed-on-android-n-7-0
I add a wiresharked Android 7.0 to reflect that bug in Android 7.0.

Backport of 82e939f2bd
2020-06-24 21:10:22 +02:00
594f09e858 Merge pull request #1647 from drwetter/fix_mxs_in_get_mx_record
Fix wrong variable declaraton in get_mx_record()
2020-05-26 09:35:54 +02:00
11c03790bf Fix wrong variable declaraton in get_mx_record()
mx was declared, mxs used instead. This fixes
it by correcting the declaration.
2020-05-25 21:28:44 +02:00
c6ca746954 Merge pull request #1634 from drwetter/dockerfile+
Better Dockerfile: doesn't require "git clone"
2020-05-09 12:54:02 +02:00
e5bb789dd3 Better Dockerfile: doesn't require "git clone"
.. see also #1559.

It "mkdirs" the needed etc and bin directories first, then copies
stuff over. It also reduces a few layers.

Also it corrects a mistake in the Readme.md (docker exec --> run)
2020-05-09 12:48:11 +02:00
747b1e20ac Merge pull request #1633 from unit193/3.0
Fix a couple typos.
2020-05-09 12:20:03 +02:00
f1a53a5b3a Fix a couple typos.
enviroment → environment
ususally → usually
2020-05-09 05:42:41 -04:00
4e887e3ee4 Merge pull request #1628 from drwetter/bump_version302
Bump version to 3.0.2
3.0.2
2020-05-08 11:44:48 +02:00
eb1398c04c Merge pull request #1627 from drwetter/dockerhub_workaround
Provide the correct branch to Dockerhub builds
2020-05-08 11:36:36 +02:00
f16ed46e76 Provide the correct branch to Dockerhub builds
... and at the same time allow correct local builds --
the default branch is 3.1dev at the moment.

It still clones the repo from github which isn't
needed. A pure copy command would be the best. However
it might cause other problems.

See also #1559
2020-05-08 11:32:39 +02:00
e628c16155 Merge pull request #1626 from drwetter/revert-1625-dockerfile_fixtest
Revert "Try to fix builds by Dockerhub"
2020-05-08 10:30:42 +02:00
1edb6159be Revert "Try to fix builds by Dockerhub" 2020-05-08 10:21:24 +02:00
003f35d273 Merge pull request #1625 from drwetter/dockerfile_fixtest
Try to fix builds by Dockerhub
2020-05-07 20:44:31 +02:00
3eba7ab0f2 Try to fix builds by Dockerhub
see also #1559
2020-05-07 20:42:43 +02:00
0ba2b6e862 Merge pull request #1622 from drwetter/drwetter-patch-2
Labelling, look @ 3.0.2
2020-05-07 19:57:04 +02:00
b1eda9b2bf Just bump version 2020-05-07 19:55:04 +02:00
fb80e1cc44 Merge pull request #1624 from dcooper16/fix_cp_error_30
Fix copy and paste error
2020-05-07 19:44:16 +02:00
d4bb2dd906 Fix copy and paste error
This commit fixes a bug in the 3.0 branch that was introduced by an accidental copy and paste.
2020-05-07 12:31:55 -04:00
0393cb42f9 Labelling, look @ 3.0.2
* outlook to 3.0.2 (~tomorrow), remove ref. to rc
* fix docker cmd line (albeit there's still a problem w dockerhub) 
* label 3.1dev it as a ~rolling release
2020-05-07 11:16:59 +02:00
f49d73498a Merge pull request #1617 from dcooper16/backport_1609_and_1616
Backport #1609 and #1616
2020-05-06 16:34:57 +02:00
3d48e6c7cb Backport #1609 and #1616
This commit back ports #1609 and #1616 to the 3.0 branch.
2020-05-06 08:39:22 -04:00
005abad35c Merge pull request #1614 from drwetter/license_patch3.0
Amendment to "Relax the possible GPL license contradiction"
2020-05-06 09:19:04 +02:00
1325178f8d Amendment to "Relax the possible GPL license contradiction"
fix it also in the man pages. See #1590 / #1592
2020-05-06 09:12:38 +02:00
870b78034d Merge pull request #1611 from drwetter/xmpp_improvements_3.0
Fix STARTTLS pretests, improve XMPP handshakes (backport)
2020-05-05 08:47:30 +02:00
6df3f2bd4e Remove not needed if clause in starttls_io()
.. amends 35833c1979
2020-05-04 23:05:53 +02:00
35833c1979 Fix STARTTLS pretests, improve XMPP handshakes (backport)
There was a empty variable in determine_optimal_proto() which prevented to save STARTTLS_OPTIMAL_PROTO. This is fixed.

The buffers and return codes for XMPP in starttls_io() were under not every
circumstances correct. This fixes those cases and making that in general more
robust (hopefully).
2020-05-04 23:03:01 +02:00
47e16b08c5 Merge pull request #1607 from drwetter/1590_2
Address further potential license restriction
2020-05-04 20:27:52 +02:00
c5cee3ddb6 Address further potential license restriction
.. see https://github.com/drwetter/testssl.sh/issues/1590#issuecomment-623526604

Added some formatting and verbal improvements in the intruductory comment section.
2020-05-04 20:24:24 +02:00
85faf9d096 Merge pull request #1606 from drwetter/add_brotli_3.0
Add brotli compression detection for BREACH (backport)
2020-05-04 17:50:32 +02:00
85a529ee00 Add brotli compression detection for BREACH (backport)
As noted in #1605 the brotli compression check was missing. So hosts
which didn't offer gzip deflate or compress but brotli seemed to
be fine but they shoould have been labled as potentially VULNERABLE.

This also fixes a bug: The HTTP header returned was only checking
for case-sensitive "Content-Encoding". RFC 2616 states in 4.2
(Message Headers): "Field names are case-insensitive"
2020-05-04 13:23:05 +02:00
dbff0f9673 Merge pull request #1604 from drwetter/aes_cgm_doc_3.0
Fix typo in docs: Strong grade Ciphers / AEAD
2020-05-02 20:01:27 +02:00
e3ecd72deb Fix typo in docs: Strong grade Ciphers / AEAD 2020-05-02 19:57:02 +02:00