Commit Graph

5105 Commits

Author SHA1 Message Date
c23cb6435a Update Readme.md 2025-07-25 10:17:42 +02:00
30134b223c Merge pull request #2860 from testssl/fix_2854_ipv6
Fix also IPv6 addresses for --nodns etc....
2025-07-22 22:33:34 +02:00
57689611bf Fix also IPv6 addresses for --nodns etc....
Seems the patch in #2856 wasn't complete. So that it was forgotten to add also manually specified IPv6 addresses to the IP addresses to show and to scan.
This makes sure it does, so this fixes #2854 finally.

Also statements were added to reset do_ipv4_only and do_ipv6_only correctly so that later the output "Testing all IP** addresses" is correct.
2025-07-22 14:38:42 +02:00
d638843cc1 Merge pull request #2858 from testssl/code2network_socksend_x
Slightly improved strings @ pre-socket handling
2025-07-21 17:32:09 +02:00
6c045e05ab Merge pull request #2855 from testssl/fix_2847+
Doing a better guess for Opossum when tcp/80 is not a/v
2025-07-21 16:24:37 +02:00
eb75ac23b6 Slightly improved strings @ pre-socket handling
* `code2network()` was improved to just use internal bash functions, except sed
* `socksend()` was renamed to `socksend_x()` to clarify that the string passed contains already a leading x

We might want to try using in `code2network()` only bash internal functions like in `socksend_x()`.
And maybe decide for onee format of hexbytes in the code -- with x or without.
2025-07-21 16:15:13 +02:00
ba6891e64a Merge pull request #2856 from testssl/fix_2854
Fix bug when --nodns none --ip <IP> is supplied
2025-07-21 11:39:34 +02:00
727f6c9fa6 Fix bug when --nodns none --ip <IP> is supplied
Due to rebasing determine_ip_addresses() in #2852 it was
forgotten to add any manually specified IP address to
the IP addresses to show and to scan.

This fixes #2854 .
2025-07-21 10:27:23 +02:00
cb971b5336 Doing a better guess for Opossum when tcp/80 is not a/v
This labels the result of a failed test for reaching
port 80 when no direct connection is possible as likely not
vulnerable.

This seems safe to say, as there's another check whether
a proxy is configured, like for corporate environments where
a connection is only allowed though the proxy.
2025-07-21 10:08:25 +02:00
a549acd86d Merge pull request #2852 from testssl/full_ipv6
Enable IPv6 automagically
2025-07-20 20:56:34 +02:00
1fff5226af Scan policy explained wrt IPv4/v6 addresses 2025-07-20 18:24:17 +02:00
274a9ca5d6 Merge pull request #2853 from testssl/quic_httpfix
only exec QUIC when SERVICE= HTTP
2025-07-20 18:06:14 +02:00
e62949d39d Merge pull request #2851 from testssl/fix_2847
Fix port and block problem for Opossum
2025-07-20 18:05:19 +02:00
e09d79aad9 Fix error message on UI when testing Opossum
As `wait_kill()` returns with 0 when a TCP reset is encountered
and the process is not killed, we need to open the socket again
in a sub shell. Which is safe in the foreground.

If then the subshell returns with 0 we can safely connect to
port 80.
2025-07-20 15:40:35 +02:00
7a6c652de0 only exec QUIC when SERVICE= HTTP
... and document wait_kill better
2025-07-20 15:28:12 +02:00
a05e697fd1 UI improvements IPv6
* IPv6 addresses which won't be scanned will be put in round brackets to feedback th UI
* logic bug fixed which always said "Testing all IPv4 addresses (port $PORT):". Simplyfied the MULTIPLE_CHECKS output
2025-07-20 14:46:48 +02:00
d0505e5006 Reflect IPv6 changes 2025-07-20 13:06:23 +02:00
bfb84a9320 Add Ipv6 automagic 2025-07-19 16:26:21 +02:00
433ab5118b fix typo 2025-07-19 16:19:42 +02:00
4d1350ebf9 Enable IPv6 automagically
This PR will enable IPv6 fully if available.

It was not enabled before as users were confronted with an error message when
testssl.sh wanted (also) to scan IPv6 before but routing/configuration or
whatsoever issues prevented that. This has been solved by introducing the function
`shouldwedo_ipv6()` which checks whether we can reach the target via IPv6 --
tracked be the global IPv6_OK.

The change is in line with tools like wget or curl in a sense that if IPv6 works
it is just being used. Formally testssl.sh had to be instructed via -6 cmdline
option, like nmap.

* \-6 is now the switch to do IPv6 scans only
* \-4 is now the switch to do IPv4 scans only

The latter is a *breaking change*, as the cmdline option meant before to check
for RC4 ciphers.

Also HAS_IPv6, synonymous to -6 before, does not exist anymore.

As the command line option `--connect-timeout` seemed rather unspecific,
it has been replaced by `--socket-timeout, also all internal variables.

Todo:
* man pages
* dashed lines appear too long
2025-07-19 15:57:52 +02:00
ea3cc3789f handle UI output better when conn to port 80 failed 2025-07-19 13:40:03 +02:00
0d63a56c80 Fix logic error and mind the sub shell (fd) 2025-07-18 20:17:12 +02:00
35cb521ef2 Merge pull request #2848 from wfaulk/3.3dev
add support for MacOS's dscacheutil
2025-07-18 19:30:03 +02:00
9e29b35e9e open socket error message, not stdout 2025-07-18 19:06:42 +02:00
9743a96462 fix indentation 2025-07-18 18:30:08 +02:00
cd7a887878 Fix port problem for Opossum
This fixes #2847 .

It was falsely assumed that the http head command blocks when port 80 is not available but
actucally the exec for the socket is the culprit.

This PR changes that so that the exec is put in the background.

Another change is that $node is still used but the port is stripped of which
lead to the problem raised in #2847. We use $node instead of $NODE has we
can recycle the `http_head[er]_printf()` later.

`http_header_printf()`was renamed to `http_head_printf()` as there's also an `http_head()`
and an `http_get()`
2025-07-18 18:18:30 +02:00
2d1a5930ca add support for MacOS's dscacheutil 2025-07-17 16:48:22 -04:00
a719c46bcb Merge pull request #2846 from testssl/find_autohomebrewssl
Try harder to find OPENSSL2
2025-07-16 09:52:50 +02:00
88b7af8ad1 Try harder to find OPENSSL2
This commit adds an improvement so that e.g. under MacOS
/opt/homebrew/bin/openssl is automatically taken as
$OPENSSL so that also QUIC works out of the box for MacOS.

Formally for at least MacOS with silicon CPUs OPENSSL was
equal to OPENSSL2 and LibreSSL in /usr/bin/openssl doesn't
have QUIC support (up to version 15.5 of MacoOS at least).
2025-07-15 23:28:44 +02:00
10af37029c Merge pull request #2844 from testssl/fix_misleading_ipv4_msg
Fix message when IPv6 needs to be tested too
2025-07-15 20:46:48 +02:00
f4ab559dbf Fix message when IPv6 needs to be tested too
"Testing all IPv4 addresses"
2025-07-15 17:29:28 +02:00
e2f08a019a Merge pull request #2842 from testssl/opossum
Redo PR for Opossum , see #2838
2025-07-12 22:41:20 +02:00
a4953d6e22 Redo PR for Opossum
Fixes #2833

This does a check for the opossum vulnerability, see https://opossum-attack.com/ .

It uses a separate function to send the payload and retrieve the result via `http_header_printf()`.  It doesn't use curl or wget. The latter wouldn't work anyway as according to the manpage as the HTTP header which needs to be sent must not contain LFs.  This function was introduced because `http_get_header()` -- which was renamed to `http_head()` -- could use wget if curl is not available. On the way to this PR `http_head()` was improved, so that timeouts were used for curl and wget for better maturity.

`http_header_printf()` now uses bach sockets , strips the URI so that a plaintext request is made. This will be done in the background because not every host will answer.

Done also:
- handling when PROXY is requested (try anyway directly as the payload is not "proxyable")
- print a message when no HTTP service is present
- try hard to use plaintext HTTP when auth is required for HTTPS and service HTTP would not be defined otherwise
- manpages
- help

Also when pwnedkeys are checked a not pwned certificate is labled not neutral but OK=green.
2025-07-12 20:59:50 +02:00
c467398a37 Merge pull request #2837 from testssl/12_diff_homebrew
For Mac: use homebrew's openssl
2025-07-10 15:41:44 +02:00
1f9aa8008d For Mac: use homebrew's openssl
... so that we have a comparison between OpenSSL and LibreSSL. Otherwise this test would be completely futile for MacOS.
Also change the displayed text.

See #2832 (which was for 3.2)
2025-07-10 13:19:46 +02:00
84bfb306a2 Merge pull request #2835 from testssl/drwetter-patch-1
Update CHANGELOG.md
2025-07-10 09:38:29 +02:00
bdb07d9cbe Update CHANGELOG.md
SSLlabs rating bump
2025-07-10 09:37:57 +02:00
fc3e7eca84 Merge pull request #2830 from magnuslarsen/3.1dev
feat: bump ssllabs rating guide to 2009r
2025-07-09 23:21:33 +02:00
198a5f0c30 fix(rating): HSTS not offered does not give a warning 2025-07-09 09:41:11 +02:00
2fd80e7454 Merge pull request #2828 from digininja/3.3dev
Removed rogue space on QUIC output
2025-07-08 23:21:24 +02:00
f5fd7cb2c7 One more space 2025-07-08 21:16:26 +01:00
3e465bafe2 feat: bump ssllabs rating guide to 2009r 2025-07-08 14:20:46 +02:00
ec5443438f Removed rogue space on QUIC output
Before:

```
 TLS 1.2    offered (OK)
 TLS 1.3    offered (OK): final
 QUIC        not offered or timed out
 NPN/SPDY   not offered                                                                                      
 ALPN/HTTP2 h2, http/1.1 (offered)                                                                           
```

After:

```
 TLS 1.2    offered (OK)
 TLS 1.3    offered (OK): final
 QUIC       not offered or timed out
 NPN/SPDY   not offered
 ALPN/HTTP2 h2, http/1.1 (offered)
```
2025-07-08 08:32:47 +01:00
cc5ab00548 Merge pull request #2827 from testssl/fix_2825_dev
Fix not working --disable-rating switch (3.3dev)
2025-07-07 14:02:06 +02:00
85805ba8db Fix not working --disable-rating switch (3.3dev)
The logic was wrong when calling set_rating_state() in parse_cmd_line() as do_rating was set before to true through set_scanning_defaults().

This PR fixes #2825 by querying ${SKIP_TESTS[@]} instead and then calling set_rating_state() when no --disable-rating was supplied .
2025-07-07 12:07:53 +02:00
a4d6f9ad55 Merge pull request #2822 from testssl/quic
First try for QUIC (OpenSSL only and only checking the protocol)
2025-07-05 13:24:25 +02:00
89bd3c753d Add QUIC protocol check in help() 2025-07-04 14:55:48 +02:00
4c65d678fb except man page n roff format for codespell 2025-07-04 14:50:49 +02:00
3e0a1605b9 Update protocol section for QUIC to be included 2025-07-04 14:48:23 +02:00
6e2bd0123c Build instruction for n00bs 2025-07-04 14:24:41 +02:00