Commit Graph

4847 Commits

Author SHA1 Message Date
8b1339b29d Merge pull request #2734 from PeterDaveHello/FixDockerHubReadmeBadge
Fix Docker Hub badge in Readme.md
2025-04-09 18:51:08 +02:00
bc0c9f9c4b Merge pull request #2733 from dcooper16/ossl35_client_sim
OpenSSL 3.5.0 client simulation
2025-04-09 10:46:20 +02:00
3a8038636d OpenSSL 3.5.0 client simulation
Add OpenSSL 3.5.0 to etc/client-simulation.txt.
2025-04-08 15:26:41 -07:00
be4aa6ec6c Fix Docker Hub badge in Readme.md 2025-04-07 05:08:59 +08:00
06682990ba GHCR clearer 2025-04-06 20:29:18 +02:00
f7f35fe4c6 Merge pull request #2729 from testssl/ghcr.io-doc
Add minimal doc for GHCR
2025-04-06 18:29:07 +02:00
ac0419eaad Add minimal doc for GHCR 2025-04-06 18:27:37 +02:00
b20add1d12 Merge pull request #2684 from testssl/new_binaries
Start working on a set of new binaries
2025-04-04 14:15:00 +02:00
b7f9ff1bf2 Merge pull request #2727 from dcooper16/chacha20
ChaCha20 decryption
2025-04-04 11:54:05 +02:00
be9a85c1f7 Merge pull request #2726 from dcooper16/fix_has_uds_checks
Fix checks with HAS_UDS and HAS_UDS2
2025-04-02 21:47:41 +02:00
f6ff390799 Fix checks with HAS_UDS and HAS_UDS2
This commit fixes a check where the Boolean variables $HAS_UDS and $HAS_UDS2 are checked for whether they are empty rather than for whether they are true.
2025-04-02 08:03:58 -07:00
e2accb6442 ChaCha20 decryption
Decryption is TLS 1.3 handshakes is very slow if the response is encrypted using ChaCha20 and the $OPENSSL enc command does not support ChaCha20. This commit mitigates that problem by using $OPENSSL2 for ChaCha20 decryption if such decryption is needed and $OPENSSL does not support it.

This commit also changes testssl.sh to make use of $OPENSSL2 for AES-GCM decryption, when $OPENSSL2 supports it, but $OPENSSL does not. However, this change is not as important. Implementing AES-GCM in Bash using $OPENSSL for AES ECB operations isn't nearly as slow as fully implementing ChaCha20 in Bash.
2025-04-02 07:55:31 -07:00
672d253981 Fix typo 2025-04-01 18:58:12 +02:00
b149fc4da4 Reorder, rephrase, timing
Also provide a runtime table, from a little research.
2025-04-01 15:24:40 +02:00
45a264e4e4 Fix typo 2025-03-31 18:08:27 +02:00
f55abf56af Add new 64 Bit binaries (Linux, FreeBSD)
... from https://github.com/testssl/openssl-1.0.2.bad .
2025-03-31 17:54:40 +02:00
093e8ddd10 Remove redundant statements 2025-03-31 17:54:01 +02:00
2dfd192f27 Typos / when needed 2025-03-30 19:59:23 +02:00
3a414d60bf Comment the removal of binaries 2025-03-30 18:14:41 +02:00
f208c09803 Rename file 2025-03-30 18:11:21 +02:00
0e765986dc Remove output from openssl Kerberos binary
... as we don't supply the kerberos binary anymore
2025-03-30 18:08:58 +02:00
1852ef6a1d Remove 32 Bit Linux binary
... as it is a niche thing. It might be available @ the contibuted
build directory @ https://testssl.sh
2025-03-30 18:06:58 +02:00
5a1d90f310 Fix link 2025-03-28 18:33:14 +01:00
a348839f60 Merge pull request #2720 from testssl/add_comment_get_server_cert
Comment the first lines get_server_certificate()
2025-03-25 21:56:32 +01:00
040ef1e0c9 Comment the first lines get_server_certificate()
See https://github.com/testssl/testssl.sh/issues/2707#issuecomment-2741053487
2025-03-25 17:22:10 +01:00
5359befc60 Merge pull request #2716 from testssl/sanitze_http_header_better
Sanitze HTTP header early and better
2025-03-20 15:44:28 +01:00
a17bb42a37 Sanitze HTTP header early and better
On MacOS `run_http_header()` hiccuped when in any place of the web site unprintable chars were returned, see https://github.com/testssl/testssl.sh/issues/2708#issuecomment-2738347784 .

This PR fixes that by moving the sanitization to a separate function and run it earlier before any processing of the returned content (header plus body) takes place.

Output was:

```
'HTTP Status Code           awk: towc: multibyte conversion failure on: '� disabilitato");

 input record number 36, file /tmp/testssl.FHu8E0/AAA.BBB.CCC.DDD.http_header.txt
 source line number 1
'wk: towc: multibyte conversion failure on: '� disabilitato");

 input record number 36, file /tmp/testssl.FHu8E0/AAA.BBB.CCC.DDD.http_header.txt
 source line number 1
  200 OK
```
2025-03-20 13:34:46 +01:00
692b9c9260 Merge pull request #2710 from testssl/fix_2708_TLS_FALLBACK_SCSV
Set POODLE var when exiting run_ssl_poodle()
2025-03-20 10:45:57 +01:00
70dacdf9fa Merge pull request #2709 from testssl/nameopt_utf8_2705
Fix LibreSSL parsing (-nameopt utf8)
2025-03-19 23:41:47 +01:00
e4bbd6b517 Set POODLE var when exiting run_ssl_poodle()
... so that run_tls_fallback_scsv() doesn't exit with a warning.

This fixes #2708 .
2025-03-19 23:30:06 +01:00
8d8f83ace5 Fix LibreSSL parsing (-nameopt utf8)
When parsing the intermediate cerificates there was a parser problem when using
LibreSSL and not OpenSSL.

This PR fixes the issue #2705 and addresses the problem by using the -nameopt multiline command
of LibreSSL/OpenSSL .
2025-03-19 22:36:37 +01:00
a43261fc6f Merge pull request #2703 from dcooper16/ocsp_check_rev_ossl_ver
OpenSSL version check in check_revocation_ocsp()
2025-03-18 13:04:23 +01:00
ebeb3e7b9d OpenSSL version check in check_revocation_ocsp()
The current code for setting $host_header in check_revocation_ocsp() will not work for LibreSSL 3.* or for upcoming versions of OpenSSL (version 4 or greater). The check will also not work correctly if $OPENSSL2 is used and $OPENSSL2 is not /usr/bin/openssl. This commit fixes these issues.
2025-03-17 08:53:19 -07:00
0c64e09203 Merge pull request #2702 from testssl/dependabot/github_actions/docker/login-action-3.4.0
Bump docker/login-action from 3.3.0 to 3.4.0
2025-03-17 10:26:57 +01:00
997646570e Bump docker/login-action from 3.3.0 to 3.4.0
Bumps [docker/login-action](https://github.com/docker/login-action) from 3.3.0 to 3.4.0.
- [Release notes](https://github.com/docker/login-action/releases)
- [Commits](https://github.com/docker/login-action/compare/v3.3.0...v3.4.0)

---
updated-dependencies:
- dependency-name: docker/login-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-03-17 01:00:40 +00:00
87d57bbf2f Merge pull request #2700 from testssl/unitttest_revocation
Unit test revocation
2025-03-15 21:38:57 +01:00
52476b8a46 Fix finger confusion ;-) 2025-03-15 17:27:28 +01:00
c7e095305f Add unit test for certificate revocation
One positive, one negative

This should detect failures in the future like in #2667, #2516
and #1275 .
2025-03-15 17:24:22 +01:00
2090bdc849 Merge pull request #2698 from testssl/fixDockerOcspCall
Fix --phone-out + ocsp, also in docker container
2025-03-15 17:11:52 +01:00
633503cd17 Fix complaint wrt Lowercase "as" 2025-03-15 16:02:32 +01:00
430c5c8d09 Fix --phone-out + ocsp, also in docker container
Previously in 4f1a91f92e there was a
double header sent to the server to check whether the certificate
was revoked.

This PR addresses that and fixes #2667 .
2025-03-15 15:58:28 +01:00
098aa4ad8b Merge pull request #2697 from dcooper16/fix_ossl_version_check
Fix OpenSSL version check
2025-03-15 09:22:26 +01:00
ad8684d324 Fix OpenSSL version check
Before version 3.0.0, OpenSSL versions includes letters (e.g., 1.1.1w). Such version numbers confuse [[ ${OSSL_VER//./} -ge 210 ]]. Since this check is only needed for LibreSSL, this commit adds a conditional so that the check is only performed for LibreSSL.
2025-03-14 14:06:17 -07:00
73be4f7381 Merge pull request #2695 from testssl/fix_segfault_error4
Fix segfault with error 4 in check_revocation_ocsp() when using --phone-out
2025-03-14 19:19:38 +01:00
4f1a91f92e Fix segfault with error 4 in check_revocation_ocsp() when using --phone-out
As `--phone-out` sometimes doesn't work with our binary we switch transparently/automagically
to the vendor support openssl binary -- if available.

This fixes at least #2516 where the issue has been explained/debugged in detail.
See also #2667 and #1275.
2025-03-14 17:06:42 +01:00
c53f4a3e44 Merge pull request #2682 from testssl/speedup_curvetests
Speed up startup checks for supported curves and more
2025-03-13 10:59:42 +01:00
31a09ec593 Merge pull request #2692 from testssl/more_extension_numbers
Add a few extension numbers in the server hello
2025-03-12 10:29:15 +01:00
cab5bd7b13 Merge pull request #2694 from dcooper16/changes_update
Update CHANGELOG.md and CREDITS.md
2025-03-12 10:27:31 +01:00
ec1d28ea24 Update CHANGELOG.md and CREDITS.md
This commit adds information about #2687, #2688, and #2690 to the change log.
2025-03-11 12:48:48 -07:00
1e63bd296d Merge pull request #2693 from testssl/drwetter-patch-1
Update pull_request_template.md
2025-03-11 16:25:19 +01:00