Commit Graph

4693 Commits

Author SHA1 Message Date
Dirk Wetter
5eeab6484f
Merge pull request #2632 from testssl/Tazmaniac-client-renego-refactoring
Tazmaniac client renego refactoring
2025-01-24 14:24:43 +01:00
Dirk
002b91192c fix spelling 2025-01-24 13:50:35 +01:00
Dirk
49db77e63a Conflicts resolved 2025-01-24 13:44:19 +01:00
Dirk Wetter
0539688c06
Merge pull request #2631 from testssl/corydalis10-3.2
Improve CONTRIBUTING.md
2025-01-23 17:42:29 +01:00
Dirk
b185b1bea9 Fix typo 2025-01-23 17:41:36 +01:00
Dirk
90f1e59e9f Merge #2618 and doing some overdue amendments 2025-01-23 17:37:32 +01:00
Dirk
8f054c6f12 Merge branch '3.2' of https://github.com/corydalis10/testssl.sh into corydalis10-3.2 2025-01-23 16:49:12 +01:00
Dirk Wetter
9e9334f3c8
Merge pull request #2619 from testssl/co_header
Add more security headers
2025-01-23 11:47:34 +01:00
Dirk Wetter
4efe324ef7 Fix round bracket and remove obsolete comment 2025-01-23 10:45:15 +01:00
Hyeonho Kang
fb3921cd1b Edit CONTRIBUTING.md 2025-01-23 13:10:12 +09:00
Dirk Wetter
7d919d494c
Merge pull request #2629 from testssl/misc
Remove --nsa in help() and add --forward-secrecy instead
2025-01-22 23:37:28 +01:00
Dirk
d7da22d598 Finalize check
* use system with @args so that we can query the return value
* code style improved for readability
* diff shows the filtered difference
* ok instead of cmp_ok to show not the whole content of vars
2025-01-22 23:33:35 +01:00
Dirk
4df0d9e4c3 Re-added the ) to make the action word (why??) 2025-01-22 23:32:39 +01:00
Dirk
207b902109 Merge branch '3.2' into co_header 2025-01-22 22:50:00 +01:00
Dirk
ad912ea332 Fix typo + tags 2025-01-22 20:05:19 +01:00
Dirk
12036fb6c8 Update baseline scan + add/deprecate security headers 2025-01-22 19:54:34 +01:00
Dirk
a1c2dc7c72 Remove --nsa in help() and add --forward-secrecy instead
Both are possible to use
2025-01-22 19:19:16 +01:00
Dirk Wetter
17f2a5d5b9
Merge pull request #2622 from dcooper16/draft-kwiatkowski-tls-ecdhe-mlkem
Support draft-kwiatkowski-tls-ecdhe-mlkem
2025-01-22 11:03:11 +01:00
Dirk Wetter
023fd0278a
Merge pull request #2625 from dcooper16/fix_x5519_and_x448_check
Fix checks for whether X25519 and X448 are supported
2025-01-22 11:01:25 +01:00
David Cooper
a85073bf0d
Fix checks for whether X25519 and X448 are supported
In some cases OpenSSL returns an "unsupported" message rather than a "not found" message if X25519 and X448 are not supported. This commit changes the check for whether X5519 and X448 are supported for checking for either response.
2025-01-21 09:10:33 -08:00
David Cooper
11d7979f41 Support draft-kwiatkowski-tls-ecdhe-mlkem and draft-tls-westerbaan-xyber768d00
This commit adds support for the three code points in draft-kwiatkowski-tls-ecdhe-mlkem and the code point 0x6399 from draft-tls-westerbaan-xyber768d00. The group 0x6399 uses a pre-standard version of Kyber and is considered obsolete.
2025-01-21 09:00:21 -08:00
Dirk Wetter
0c71658457
Merge pull request #2621 from dcooper16/fix2614
Fix #2614
2025-01-17 16:47:27 +01:00
David Cooper
95b6258f82 Fix #2614
Currently `compare_server_name_to_cert()` only indicates whether the server's host name matches a wildcard name in the certificate. So, it does not indicate if the certificate includes a wildcard name that does not match the server's host name. As a result, if a certificate includes the names "api.sub.example.tld" and "*.api.sub.example.tld," then a wildcard certificate warning will be issued for host names such as www.api.sub.example.tld, but not for api.sub.example.tld.

This commit changes `compare_server_name_to_cert()` to indicate whether the certificate is a wildcard certificate in addition to providing information about how the certificate matches the server's host name. Functions that use this function's response are then changed to extract the information they need (matching or wildcard) from the return value.
2025-01-17 05:43:39 -08:00
Dirk Wetter
8000885371 Add more security headers
... and deprecate "X-Content-Security-Policy" and "X-WebKit-CSP"
2025-01-16 21:18:47 +01:00
Dirk Wetter
daf0671878
Merge pull request #2617 from dcooper16/fix2615
Fix #2615
2025-01-16 16:51:47 +01:00
Hyeonho Kang
2e8d4a1128 Edit CONTRIBUTING.md 2025-01-17 00:36:37 +09:00
David Cooper
8e184b886e Fix #2615
The server mentioned in #2615 has a bug, which results in it sending a handshake_failure alert rather than a successful connection if the signature_algorithms extension lists RSA+MD5 before one of the signature algorithms that it supports.

This commit works around this issue by reversing the order in which it lists the signature algorithms in the signature_algorithms extension, thus (generally) listing stronger options first.

This change should not affect the testing, except that it will result in the order of the supported signature algorithms being reversed in the output, if the server respects the client's preferences.
2025-01-16 06:55:54 -08:00
Dirk Wetter
ef92cc70c9
Merge pull request #2616 from testssl/dependabot/github_actions/docker/build-push-action-6.12.0
Bump docker/build-push-action from 6.11.0 to 6.12.0
2025-01-16 12:20:07 +01:00
dependabot[bot]
582d4658ae
Bump docker/build-push-action from 6.11.0 to 6.12.0
Bumps [docker/build-push-action](https://github.com/docker/build-push-action) from 6.11.0 to 6.12.0.
- [Release notes](https://github.com/docker/build-push-action/releases)
- [Commits](https://github.com/docker/build-push-action/compare/v6.11.0...v6.12.0)

---
updated-dependencies:
- dependency-name: docker/build-push-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-16 00:29:43 +00:00
Dirk Wetter
90a51e7975
Merge pull request #2612 from testssl/dependabot/github_actions/docker/setup-qemu-action-3.3.0
Bump docker/setup-qemu-action from 3.2.0 to 3.3.0
2025-01-09 09:53:54 +01:00
Dirk Wetter
723b1c17ee
Merge pull request #2613 from testssl/dependabot/github_actions/docker/build-push-action-6.11.0
Bump docker/build-push-action from 6.10.0 to 6.11.0
2025-01-09 09:52:52 +01:00
dependabot[bot]
9c74fe8f31
Bump docker/build-push-action from 6.10.0 to 6.11.0
Bumps [docker/build-push-action](https://github.com/docker/build-push-action) from 6.10.0 to 6.11.0.
- [Release notes](https://github.com/docker/build-push-action/releases)
- [Commits](https://github.com/docker/build-push-action/compare/v6.10.0...v6.11.0)

---
updated-dependencies:
- dependency-name: docker/build-push-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-09 00:23:31 +00:00
dependabot[bot]
b6aa4c3214
Bump docker/setup-qemu-action from 3.2.0 to 3.3.0
Bumps [docker/setup-qemu-action](https://github.com/docker/setup-qemu-action) from 3.2.0 to 3.3.0.
- [Release notes](https://github.com/docker/setup-qemu-action/releases)
- [Commits](https://github.com/docker/setup-qemu-action/compare/v3.2.0...v3.3.0)

---
updated-dependencies:
- dependency-name: docker/setup-qemu-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-09 00:23:29 +00:00
Dirk Wetter
6d77c93109
Merge pull request #2610 from testssl/links
Change orga from drwetter --> testssl
2025-01-06 16:20:53 +01:00
Dirk Wetter
5f4ca15e57
Merge branch '3.2' into links 2025-01-06 15:41:16 +01:00
Dirk
b708026151 Change orga from drwetter --> testssl
... to avoid redirects on the client side and to make repo migration better visible.

Also amend 'Status' and 'Contributing' in Readme.md. bluesky added, albeit mastodon
seems more interactive. Clarify twitter account is not in use anymore.
2025-01-06 15:34:45 +01:00
Emmanuel Fusté
6c17b66418 CI fix : Cleanup
testssl.sh worked as expected.
Under the hood, broken pipes are expected as part of the fast loop exit
strategy that relies as little as possible on timeout detection.
But under the CI, testssl.sh output is garbled by the subshells stderr
outputs, catched for some reason by 'prove -v'.
Simply redirecting the stderr output of the offending command to
/dev/null fixes the problem.
2024-12-09 14:19:56 +01:00
Emmanuel Fusté
88856ecad5 2nd try 2024-12-09 12:00:16 +01:00
Emmanuel Fusté
f39408086b Merge branch '3.2' into client-renego-refactoring 2024-12-09 11:03:42 +01:00
Emmanuel Fusté
e4e3afbbe8 Tentative to fix CI tests 2024-12-09 10:46:45 +01:00
Dirk Wetter
b5ad5bd859
Merge pull request #2604 from drwetter/dependabot/github_actions/docker/build-push-action-6.10.0
Bump docker/build-push-action from 6.9.0 to 6.10.0
2024-12-06 15:03:47 +01:00
dependabot[bot]
3e7efb7dd6
Bump docker/build-push-action from 6.9.0 to 6.10.0
Bumps [docker/build-push-action](https://github.com/docker/build-push-action) from 6.9.0 to 6.10.0.
- [Release notes](https://github.com/docker/build-push-action/releases)
- [Commits](https://github.com/docker/build-push-action/compare/v6.9.0...v6.10.0)

---
updated-dependencies:
- dependency-name: docker/build-push-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-11-28 00:10:10 +00:00
Dirk Wetter
701c606eac
Merge pull request #2597 from Tazmaniac/quick-fix-2590
Quick fix for #2590
2024-11-27 11:39:25 +01:00
Dirk Wetter
662a99fdce
Merge pull request #2602 from dcooper16/fix2599
Fix #2599
2024-11-27 11:35:41 +01:00
David Cooper
26a3a8fd51
Fix #2599
This commit fixes #2599 by not wrapping fileout() messages in a "clientProblem" wrapper if TLS13_ONLY is set. The TLS13_ONLY flag being set is an indicator that fileout_banner() has already been called.
2024-11-26 09:13:11 -08:00
Dirk Wetter
65c463fcbf
Merge pull request #2600 from janbrasna/fix/ci-badge
Fix CI badge
2024-11-19 20:49:27 +01:00
Jan Brasna
d4fa5df475
Fix CI badge 2024-11-19 20:42:08 +01:00
Emmanuel Fusté
991c1fefb2 One tab fix 2024-11-07 12:25:50 +01:00
Emmanuel Fusté
1aaab67e81 Multiple IP fix and simple not vulnerable printing case recover
- Recover the "not vulnerable" case (no mitigation) printing, cosmetic
  fix.
- With the removing of all s_client invocation other than the main loop
  one, fix the init of the ERRFILE and TMPFILE: no need to append, no
  need to remove, inconditionally zap the content before the loop.
2024-11-05 12:59:01 +01:00
Emmanuel Fusté
7625422976 Spell fix 2024-11-04 21:02:03 +01:00