1
0
mirror of https://github.com/drwetter/testssl.sh.git synced 2025-07-22 21:51:45 +02:00
Commit Graph

3695 Commits

Author SHA1 Message Date
6ac9c59135 correct ch_{ciphers,sni}
That was due to a copy error from 3.1dev.
2022-05-31 20:08:37 +02:00
445d20c360 Update client simulation for 3.0
see , 

Added:
* Safari for macOS
* Java 17 LTS
* OpenSSL 3.0.3
* Android 11 and 12
* Go client (1.17)
* Firefox 100, Chrome and Edge 101 using Win10
* Thunderbird 91.9
* AppleMail
* LibreSSL from MacOS

* disabled Java 12 and Safari on OS X 10.12
* disabled Android < 6.0

* documention update how to add a client simulation
* add curves-mapping.txt file
2022-05-31 17:08:40 +02:00
2ca53116ca Merge pull request from EliteTK/3.0-fix-crime-tls1.3
Fix CRIME test on servers only supporting TLS 1.3
2022-05-25 08:39:09 +02:00
5793bc26ae Make run_crime use $jsonID instead of repeating
This also seems more consistent across the code.
2022-05-24 22:21:57 +01:00
130b5b2aac Fix CRIME test on servers only supporting TLS 1.3
As jsonID is not set by run_crime, make the fileout invocation for
servers supporting only TLS 1.3 use the literal "CRIME_TLS" instead.

Previously running testssl with CSV or JSON output would produce an item
with the wrong ID.
2022-05-24 22:21:57 +01:00
897443f035 Merge pull request from drwetter/censys_fix_2127.3.0
Fix censys link (3.0)
2022-05-14 13:50:25 +02:00
78e67d8fff Shorten censys link
Remove sort order and fix the argument separator
2022-05-14 11:52:45 +02:00
d38a8b283d Backport , Censys link
See . The line is very long though: 152 chars
2022-05-14 11:42:43 +02:00
41deaf908d Merge pull request from drwetter/fix_banner_3.0
Fix banner and remove STARTTLS NNTP CI check
2022-05-04 12:12:39 +02:00
a773f00fce Fix banner and remove STARTTLS NNTP CI check
On macOS in dark mode the git tag in grey wasn't visible. It was
changed now to light grey. It also works at least on Linux
using a light terminal background.

The NNTP server which we used for STARTTLS checks seems ofen
not to work. Thus this PR removes that for the 3.0 branch.
2022-05-04 10:56:16 +02:00
980ec6ba33 Merge pull request from dcooper16/backport_2157_2160_2162
Backport , , 
2022-05-03 21:11:30 +02:00
aaf7bf8505 Backport , ,
This commit backports PR , , and  from the 3.1dev branch to the 3.0 branch.
2022-05-02 10:33:07 -04:00
793eaa3f84 Merge pull request from drwetter/ftp_starttls_auth_only_3.0
Relax STARTTLS FTP requirement (3.0)
2022-04-28 07:30:51 +02:00
405f431612 Relax STARTTLS FTP requirement (3.0)
In rare? occassions where the STARTTLS FEAT request only displays AUTH instead
of AUTH TLS, testssl.sh fails as it cannot upgrade to TLS.

Required by RFC 4217 is only AUTH ("MUST"), AUTH TLS is optional ("should"), see section 6.
This PR relaxes the presence of TLS after AUTH and fixes  for the 3.0 branch.
2022-04-27 14:52:46 +02:00
2eac75d5b5 Merge pull request from dcooper16/server_pref_no_default_protocol_30
Fix run_server_preference() with no default protocol
2022-04-24 18:12:19 +02:00
93711f3d30 Fix run_server_preference() with no default protocol
run_server_preference() calls "default_proto=$(get_protocol $TMPFILE)" even if all attempts to connect to the server failed. This will result in default_proto incorrectly being set to TLS 1.2. This commit fixes the issue by only calling get_protocol() if an attempt to connect to the server was successful.
2022-04-14 12:29:21 -04:00
0047e1f153 Merge pull request from dcooper16/no_session_id_30
Fix setting NO_SESSION_ID
2022-04-14 18:08:53 +02:00
55785afb5e Merge pull request from dcooper16/fix2147_30
Fix getting CRL
2022-04-14 18:07:29 +02:00
0d596e208b Fix setting NO_SESSION_ID
With a TLS 1.3 connection, a session ID will only appears as part of a post-handshake session ticket. However, with OpenSSL 1.1.1 or newer when using $OPENSSL s_client as it is called in determine_optimal_proto() (i.e., with "< /dev/null"), a post-handshake session ticket will usually not be received, even if the server supports it. With versions of LibreSSL that support TLS 1.3, a post-handshake session ticket is never displayed (even without "< /dev/null"). This can result in NO_SESSION_ID incorrectly being set to true.

This commit fixes the issue by setting NO_SESSION_ID to true by default, and then setting it to false if a session ID is returned by any connection to the server.
2022-04-14 09:40:41 -04:00
6e6b8731c9 Fix getting CRL
OpenSSL 3.X pretty prints certificates in a slightly different way than previous versions, and this breaks the code for getting the URIs from the CRLDP extension.
This commit fixes the issue by having awk search for additional possible strings to start the CRL Distribution Points output. Unless the CRLDP extension is malformed, it will begin with "Full Name", "Relative Name", "Reasons", or "CRL Issuer".
2022-04-14 08:31:57 -04:00
a47bc2097e Merge pull request from dcooper16/ossl3_fix_30
More OpenSSL compatibility fixes
2022-04-12 18:51:06 +02:00
6b5ce68d1a More OpenSSL compatibility fixes
This commit fixes yet another issue with using OpenSSL 3.X with the 3.0 branch. When $OPENSSL is used to obtain a fingerprint, OpenSSL 3.X prepends the fingerprint with "sha1" or "sha256" rather than "SHA1" or "SHA256".
2022-04-11 13:36:56 -04:00
395907a79f Merge pull request from dcooper16/ossl3_compat_30
OpenSSL compatibility fix
2022-04-07 21:34:30 +02:00
4a5d93dad6 Merge pull request from dcooper16/fix2138_30
Fix  in 3.0 branch
2022-04-07 21:27:32 +02:00
cd89134338 OpenSSL compatibility fix
OpenSSL 3.0.X uses different names for some elliptic cures in the "Server Temp Key" line than previous previous versions. This commit addresses this issue by checking for both names.
2022-04-07 14:31:40 -04:00
5b26b9931b Fix in 3.0 branch
This commit fixes  in the 3.0 branch.
2022-04-07 14:09:16 -04:00
bc2c8d6eaa Remove trailing spaces to get rid of failing status of CI 2022-04-01 18:07:19 +02:00
25ef6dc2ca Merge pull request from drwetter/drwetter-patch-1
fix markup of roff in doc/
2022-04-01 14:38:17 +02:00
68a35b7610 fix markup of roff in doc/ 2022-04-01 14:37:30 +02:00
1f846f73d8 Merge pull request from drwetter/drwetter-patch-1
docs --> doc
2022-04-01 14:13:20 +02:00
084990a890 docs --> doc
fix wrong dir for CI
2022-04-01 14:12:56 +02:00
2078ca52a8 Merge pull request from drwetter/2074_md_fixes.3.0
Implement fixes in documentation from  (3.0)
2022-04-01 14:08:45 +02:00
61c4aa2cb7 Implement fixes in documentation from (3.0)
kudos @k0lter

  * numbering
  * some ticks / backticks
2022-04-01 14:03:06 +02:00
7733140e6e Merge pull request from drwetter/drwetter-patch-1
Remove reference to fixed 3.0.x version
2022-03-16 17:00:17 +01:00
9e14cbf255 Remove reference to fixed 3.0.x version 2022-03-16 16:59:50 +01:00
21fdf5f2de Merge pull request from dcooper16/ffdhe_supported_groups
Add FFDHE groups to supported_groups
2022-03-09 22:08:44 +01:00
61bbfb4489 Add FFDHE groups to supported_groups
There is at least one server that will not negotiate TLS_DHE_* cipher suites with TLS 1.2 and below if the supported_groups extension is present but does not include any DH groups. This commit adds the DH groups that are currently in the TLS 1.3 ClientHello to the TLS 1.2 and earlier ClientHello.
2022-03-09 15:19:33 -05:00
5e9ee13780 Merge pull request from dcooper16/rsapss
Include RSA-PSS in ClientHello
2022-03-09 14:14:44 +01:00
f5e75054d3 Include RSA-PSS in ClientHello
This commit changes prepare_tls_clienthello() so that the RSA-PSS algorithms are offered in the signature algorithms extension of TLS 1.2 and below ClientHello messages.
2022-03-09 07:45:52 -05:00
5bd2952108 Merge pull request from drwetter/bump_version_3.0
Bump version in 3.0 branch
v3.0.7
2022-02-19 14:38:16 +01:00
06821e31ff Codespell 2022-02-19 14:37:14 +01:00
7729fd1267 Add a few items 2022-02-19 14:28:24 +01:00
c6dce9d8b3 Bump patch version number 2022-02-17 09:10:41 +01:00
f96df1138b Merge pull request from drwetter/fix_2096.3.0
Fix "ID resumption test failed" under Darwin (3.0)
2022-02-17 09:04:57 +01:00
93b9a37c0c Fix "ID resumption test failed" under Darwin (3.0)
Under Darwin using LibreSSL it was not possible to test for session
resumption by session ID.

This fixes the issue  for 3.0 by checking not only the return value of the
s_client hello but also whether a probable certificate is being returned.
2022-02-16 23:18:04 +01:00
de0f4f7a7e Merge pull request from drwetter/fix_2103
Fix JSON output bc of missing locale in alpine (3.0)
2022-02-16 12:18:26 +01:00
c511319683 Fix JSON output bc of missing locale in alpine (3.0)
It is now being tested whether the binary locale exists and
there's a global introduced for that.

Also there's no fileout warning at this early stage anymore
as it leads to non-valid JSON
2022-02-16 10:45:12 +01:00
a385339b10 Merge pull request from drwetter/fix_2100_3.0
Fix locale error message when en_US.UTF-8 isn't available (3.0)
2022-02-15 11:10:53 +01:00
f872bd5e3e fix typo 2022-02-14 19:54:08 +01:00
f149c7450a Fix locale error message when en_US.UTF-8 isn't available (3.0)
Therefore a new global function was declared checking whether any of
the known locales work on the client without seeting them.
C / POSIX should work as well for LC_COLLATE.

This fixes  for 3.0 .
2022-02-14 19:52:14 +01:00