Dirk Wetter
6023acd58c
Merge branch '3.1dev' into update_clients1
2022-05-31 12:09:23 +02:00
Dirk Wetter
acc063e078
Merge pull request #2181 from dcooper16/continue_server_pref_on_error
...
Continue run_server_preference() on error
2022-05-31 11:37:08 +02:00
Dirk Wetter
e6f6bcaaa7
Merge pull request #2191 from drwetter/pr2189
...
Fix CRIME test
2022-05-30 14:58:48 +02:00
Dirk Wetter
dfbb9f8122
Fix Actions
...
this one works locally...
2022-05-30 13:37:07 +02:00
Dirk Wetter
8d817e1dcf
PR to merge #2189
...
added: changes in CI so that it goes through
2022-05-25 18:46:08 +02:00
Dirk Wetter
f3fe2ac401
Merge branch 'EliteTK-fix-crime-tls1.3' into pr2189
2022-05-25 18:45:13 +02:00
Tomasz Kramkowski
fc0cc67d47
Make run_crime use $jsonID instead of repeating
...
This also seems more consistent across the code.
2022-05-23 13:57:31 +01:00
Tomasz Kramkowski
326a65e7ad
Fix CRIME test on servers only supporting TLS 1.3
...
As jsonID is not set by run_crime, make the fileout invocation for
servers supporting only TLS 1.3 use the literal "CRIME_TLS" instead.
Previously running testssl with CSV or JSON output would produce an item
with the wrong ID.
2022-05-23 13:53:38 +01:00
David Cooper
706262095b
Continue run_server_preference() on error
...
Currently run_server_preference() will stop if it cannot determine whether the server enforces a cipher preference order.
This commit changes run_server_preference() so it will continue running even if this case, so that the list of ciphers supported with each TLS protocol is provided. Since it is not known whether the server enforces a cipher order, the list of supported ciphers is ordered by strength.
2022-05-16 09:28:02 -04:00
Dirk Wetter
d931eb470c
Merge pull request #2186 from drwetter/censys_fix_2127
...
Fix censys link in DROWN section
2022-05-14 13:57:46 +02:00
Dirk
04463784a8
Fix censys link in DROWN section
...
See #2127 . the line seems very long though.
Note: this was previously commited as #2184 but as there were two mistakes
and one other thing which could be improved I decided to make a hard reset.
Apologize if it caused inconvenience.
2022-05-14 12:06:09 +02:00
Dirk
1eb8347174
Update comparion/diff file for CI
...
... for the time being
2022-05-10 13:08:44 +02:00
Dirk Wetter
b89574e5c7
Merge pull request #2180 from dcooper16/ossl_ffdhe
...
Check for OpenSSL support for ffdhe groups
2022-05-10 07:47:56 +02:00
Dirk Wetter
86158f0bdf
Firefox 100, Chrom and Edge 101 (Win10)
...
- disabled Opera (too old)
- disabled ATS 9 / iOS 9
- reenabled Android 8.1
2022-05-09 17:49:16 +02:00
David Cooper
66c3e35dba
Check for OpenSSL support for ffdhe groups
...
OpenSSL 3.0.0 and later supports specifying the FFDHE groups from RFC 7919 in the "-groups" (or "-curves") option of s_client.
This commit modifies find_openssl_binary() to check whether $OPENSSL supports this. This information is then used by run_client_simulation(), if client simulation testing is being performed using $OPENSSL. If the "curves" for a client include FFDHE groups, then they will be included in the simulated ClientHello.
2022-05-09 09:46:40 -04:00
Dirk Wetter
6bd80b3baa
Merge branch '3.1dev' into update_clients1
2022-05-06 10:32:01 +02:00
Dirk Wetter
22d8cd3adf
Go client (1.17)
2022-05-06 10:06:03 +02:00
Dirk Wetter
ff23a2ba22
Merge pull request #2177 from drwetter/dependabot/github_actions/docker/setup-buildx-action-2
...
Bump docker/setup-buildx-action from 1 to 2
2022-05-06 08:17:49 +02:00
Dirk Wetter
4935679f50
Merge pull request #2176 from drwetter/dependabot/github_actions/docker/metadata-action-4
...
Bump docker/metadata-action from 3 to 4
2022-05-06 08:17:33 +02:00
Dirk Wetter
f1ce1a21bb
Merge pull request #2175 from drwetter/dependabot/github_actions/docker/setup-qemu-action-2.0.0
...
Bump docker/setup-qemu-action from 1.2.0 to 2.0.0
2022-05-06 08:17:09 +02:00
Dirk Wetter
acfbaf8408
Merge pull request #2174 from drwetter/dependabot/github_actions/docker/login-action-2.0.0
...
Bump docker/login-action from 1.14.1 to 2.0.0
2022-05-06 08:16:42 +02:00
Dirk Wetter
c332d03323
Merge pull request #2173 from drwetter/dependabot/github_actions/docker/build-push-action-3.0.0
...
Bump docker/build-push-action from 2.10.0 to 3.0.0
2022-05-06 08:15:59 +02:00
dependabot[bot]
f434dd963d
Bump docker/setup-buildx-action from 1 to 2
...
Bumps [docker/setup-buildx-action](https://github.com/docker/setup-buildx-action ) from 1 to 2.
- [Release notes](https://github.com/docker/setup-buildx-action/releases )
- [Commits](https://github.com/docker/setup-buildx-action/compare/v1...v2 )
---
updated-dependencies:
- dependency-name: docker/setup-buildx-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
2022-05-06 00:31:01 +00:00
dependabot[bot]
d40591bf00
Bump docker/metadata-action from 3 to 4
...
Bumps [docker/metadata-action](https://github.com/docker/metadata-action ) from 3 to 4.
- [Release notes](https://github.com/docker/metadata-action/releases )
- [Upgrade guide](https://github.com/docker/metadata-action/blob/master/UPGRADE.md )
- [Commits](https://github.com/docker/metadata-action/compare/v3...v4 )
---
updated-dependencies:
- dependency-name: docker/metadata-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
2022-05-06 00:30:56 +00:00
dependabot[bot]
44ae7c1604
Bump docker/setup-qemu-action from 1.2.0 to 2.0.0
...
Bumps [docker/setup-qemu-action](https://github.com/docker/setup-qemu-action ) from 1.2.0 to 2.0.0.
- [Release notes](https://github.com/docker/setup-qemu-action/releases )
- [Commits](https://github.com/docker/setup-qemu-action/compare/v1.2.0...v2.0.0 )
---
updated-dependencies:
- dependency-name: docker/setup-qemu-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
2022-05-06 00:30:52 +00:00
dependabot[bot]
172115501a
Bump docker/login-action from 1.14.1 to 2.0.0
...
Bumps [docker/login-action](https://github.com/docker/login-action ) from 1.14.1 to 2.0.0.
- [Release notes](https://github.com/docker/login-action/releases )
- [Commits](https://github.com/docker/login-action/compare/v1.14.1...v2.0.0 )
---
updated-dependencies:
- dependency-name: docker/login-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
2022-05-06 00:30:49 +00:00
dependabot[bot]
7fb9039f83
Bump docker/build-push-action from 2.10.0 to 3.0.0
...
Bumps [docker/build-push-action](https://github.com/docker/build-push-action ) from 2.10.0 to 3.0.0.
- [Release notes](https://github.com/docker/build-push-action/releases )
- [Commits](https://github.com/docker/build-push-action/compare/v2.10.0...v3.0.0 )
---
updated-dependencies:
- dependency-name: docker/build-push-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
2022-05-06 00:30:45 +00:00
Dirk Wetter
cf79a19598
Add Android 11+12
2022-05-04 19:12:03 +02:00
Dirk Wetter
28e9ddeebd
Teating of FFDHE groups
...
* readded to the markdown
* readded to the clientsimulations for Java 12
2022-05-04 18:29:29 +02:00
Dirk Wetter
ac6f99fe1c
correct FFDHE groups
...
... so that they a recognized by ~/utils/hexstream2curves.sh
2022-05-04 17:44:33 +02:00
Dirk Wetter
c6491a3834
Correct spell checking error
...
and hint to missing ALPN
2022-05-04 15:56:25 +02:00
Dirk Wetter
415043865a
Add Java 17 LTS
...
plus
* amend documentation
* remove TLS 1.3 ciphers in ch_ciphers for consistency reasons
2022-05-04 15:46:36 +02:00
Dirk Wetter
52ed4181f9
Add SSLSocketClient in Java
...
Note this doesn't add alpn (same as openssl). See here https://docs.oracle.com/javase/8/docs/api/javax/net/ssl/SSLSocket.html
if you want to add that.
This code is NOT GPLv2! It was taken from the Oracle web site which didn't list any license
(https://docs.oracle.com/javase/10/security/sample-code-illustrating-secure-socket-connection-client-and-server.htm ).
2022-05-04 15:39:32 +02:00
Dirk Wetter
d84492a75e
Update openssl 3.0.3
2022-05-04 14:32:04 +02:00
Dirk Wetter
cc7a88386d
Update documention how to add a client simulation
2022-05-04 12:38:12 +02:00
Dirk Wetter
859da96ad0
Merge pull request #2167 from drwetter/fix_banner
...
Minor changes to banner
2022-05-04 10:48:18 +02:00
Dirk Wetter
03803cf0c9
Add Safari for macOS
2022-05-03 22:11:31 +02:00
Dirk Wetter
34cc20b0df
Minor changes to banner
...
On macOS indark mode the git tag in grey wasn't visible. It was
changed now to light grey but it has to be tested how it looks
on a white terminal background.
Also CVS variables were removed which had no meaning.
2022-05-03 21:02:56 +02:00
Dirk Wetter
0329eba688
Merge pull request #2164 from drwetter/ftp_starttls_auth_only
...
Relax STARTTLS FTP requirement
2022-04-27 14:49:02 +02:00
Dirk
6c69fdbf4b
Relax STARTTLS FTP requirement
...
In rare? occassions where the STARTTLS FEAT request only displays AUTH instead
of AUTH TLS, testssl.sh fails as it cannot upgrade to TLS.
Required by RFC 4217 is only AUTH ("MUST"), AUTH TLS is optional ("should"), see section 6.
This commit relaxes the presence of TLS after AUTH and it fixes #2132 .
2022-04-27 13:34:03 +02:00
Dirk Wetter
ab33f6c0b6
Merge pull request #2163 from drwetter/fix-permissions-githubdockeraction
...
Hotfix reenabling write permissions
2022-04-25 10:18:49 +02:00
Dirk
e5efdd6cb4
Hotfix reenabling write permissions
...
see #2158
2022-04-25 10:17:05 +02:00
Dirk Wetter
db80ef14f0
Merge pull request #2156 from dcooper16/fix_run_server_defaults
...
Fix run_server_defaults()
2022-04-25 08:54:52 +02:00
Dirk Wetter
5053105d3f
Merge pull request #2154 from dcooper16/server_pref_no_default_cipher
...
Fix run_server_preference() with no default protocol
2022-04-24 19:30:18 +02:00
Dirk Wetter
cc8c02d653
Merge pull request #2139 from dcooper16/fix2131
...
Fix #2131
2022-04-24 18:17:17 +02:00
Dirk Wetter
4d7357a64e
Merge pull request #2158 from turrisxyz/setup-permissions
...
Set permissions for GitHub actions
2022-04-24 18:03:10 +02:00
Dirk Wetter
61eb164875
Merge pull request #2157 from dcooper16/update_protos_offered
...
Update PROTOS_OFFERED
2022-04-22 15:45:49 +02:00
Dirk Wetter
ca71b2e374
Merge pull request #2162 from dcooper16/ossl_ciphers
...
Fix calls to $OPENSSL ciphers
2022-04-22 15:38:30 +02:00
Dirk Wetter
3a460b40e1
Merge pull request #2160 from dcooper16/try_more_ciphers
...
Try more ciphers
2022-04-22 15:26:07 +02:00
David Cooper
1e0c1a8134
Fix calls to $OPENSSL ciphers
...
This commit fixes testssl.sh's calls to the "$OPENSSL ciphers" command.
The main issue it fixes is when actually_supported_osslciphers() is called to get a list of non-SSLv2 ciphers supported by $OPENSSL. With OpenSSL 1.0.2, the "-tls1" option needs to be used to exclude SSLv2 ciphers. With LibreSSL, the "-tls1" option may be provided, but it has no effect. With OpenSSL 1.1.1 and newer, the "-tls1" option causes TLSv1.2-only ciphers (e.g., AES256-SHA256) to be excluded (when the "-s" option is also used).
This commit fixes the problem by allowing "-no_ssl2" to be provided as an option to actually_supported_osslciphers(). For versions of $OPENSSL that support SSLv2, "-no_ssl2" is replaced by "-tls1". For versions of $OPENSSL that do not support SSLv2, "-no_ssl2" is simply removed.
This commit also changes openssl2hexcode() to include the "-tls1" option when $OPENSSL supports SSLv2, since openssl2hexcode() should only return a non-SSLv2 cipher.
2022-04-19 14:35:02 -04:00