Commit Graph

184 Commits

Author SHA1 Message Date
c6062a2254 do not output the whole output
text + html , comp_ok --> ok
2025-07-11 14:42:05 +02:00
d63617c0f6 make it compatible when run locally 2025-07-10 09:14:08 +02:00
815e737bfe Check the correct file 2025-07-09 18:10:30 +02:00
1f589565c7 we changed above the ECDH bit length already 2025-07-09 16:17:28 +02:00
822c6b31d7 fix stnax errors 2025-07-09 15:22:48 +02:00
4f52cbbedf Copy LibreSSL change of naming scheme from t/61_diff_testsslsh.t
... also if NOW only ciphers seem affected.
2025-07-09 13:31:18 +02:00
b8aadef737 For Mac: use homebrew's openssl (3.2)
... so that we have a comparison between OpenSSL and LibreSSL. Otherwise this test would be completely futile for MacOS.
Also change the displayed text.
2025-07-08 23:47:19 +02:00
9511f3b9db Fix 52_ocsp_revoked (OCSP --> CRL) 2025-07-03 16:59:54 +02:00
61947405e0 Fix missing issuer CN
This fixes a problem which was introduced @ 8d8f83ace5.
It caused for some hosts not to parse / display the issuer CN correctly.

Also it adds some code in testssl.sh and in a unit test to detect
this earlier. In general an output string FIXME will now cause a
unit test to fail. This can + should be used at other places too!

Fixes #2789
2025-06-10 22:54:11 +02:00
ba360bae7e remove extra quote sign 2025-05-28 10:21:10 +02:00
7183bb1206 Add changed headers at target ...
... so that runners pass
2025-05-27 22:48:04 +02:00
1fb3a2224f Ensure that stderr is caught / $prg=testssl.sh
As suggested in #2780 this PR redirects all stderr on a perl level
to stdout so that we should see all errors which we miss because
we can't redirect (>/dev/null in check) or we haven't redirected yet.

Also old checks are imporved, so that $prg is used as in newer
checks.
2025-05-27 10:54:25 +02:00
d0143b181b Handle space problem 2025-05-20 10:48:54 +02:00
a685fc252d Take shorter OPenSSL cipher name into account
AEAD-CHACHA20-POLY1305-SHA256    vs.
TLS_CHACHA20_POLY1305_SHA256
2025-05-19 13:52:03 +02:00
c109cafa17 Merge branch '3.2' into mac_runner 2025-05-16 18:16:58 +02:00
4db9cb5afe Unify ECDH bitlength 2025-05-14 14:07:07 +02:00
5e888ff7ee rename TLS 1.3 ciphers when using LibreSSL 2025-05-14 10:28:59 +02:00
18c4428cf4 elSif 2025-05-09 08:53:17 +02:00
42f738572b fix spelling error 2025-05-08 23:10:24 +02:00
5f471c76ee Numbering the checks 2025-05-08 23:08:59 +02:00
042b0c160a Naming checks, exempt two checks for MacOS 2025-05-08 23:06:51 +02:00
ac49e2e12b Remove engine problem line
as it may contain the openssl path
2025-05-08 19:15:56 +02:00
2557d2151b Add line 2025-05-08 18:49:51 +02:00
a9d469d12a renumber tests properly 2025-05-08 14:44:33 +02:00
17acd2a256 Better phrasing 2025-05-08 14:30:13 +02:00
916d607e5b Number each check 2025-05-08 14:18:30 +02:00
f9e9443cac Number each check / make it work under MacOS 2025-05-08 14:17:01 +02:00
05818928a0 Number each check / make it work under MacOS 2025-05-08 14:13:01 +02:00
f09f742ee3 fix gh action
Not sure why this has been triggered though.

 #   Failed test 'Check whether CSV output matches baseline file from testssl.sh'
 #   at t/61_diff_testsslsh.t line 57.
 #
 # %s
 # @@ -1,5 +1,4 @@
 #  "id","fqdn/ip","port","severity","finding","cve","cwe"
 # -"engine_problem","/","443","WARN","No engine or GOST support via engine with your ./bin/openssl.Linux.x86_64","",""
 #  "service","testssl.sh/81.169.166.184","443","INFO","HTTP","",""
 #  "pre_128cipher","testssl.sh/81.169.166.184","443","INFO","No 128 cipher limit bug","",""
 #  "SSLv2","testssl.sh/81.169.166.184","443","OK","not offered","",""
 # Looks like you failed 1 test of 1.
 t/61_diff_testsslsh.t ..............
2025-05-05 20:11:12 +02:00
ebb7cf558e Update handshake 2025-04-16 21:48:30 +02:00
3a8038636d OpenSSL 3.5.0 client simulation
Add OpenSSL 3.5.0 to etc/client-simulation.txt.
2025-04-08 15:26:41 -07:00
c7e095305f Add unit test for certificate revocation
One positive, one negative

This should detect failures in the future like in #2667, #2516
and #1275 .
2025-03-15 17:24:22 +01:00
d93549e327 fix match expr 2025-01-27 20:08:11 +01:00
cdf5cf7b97 remove + @ beginning of line 2025-01-27 17:20:39 +01:00
ef13122f4f fix typo 2025-01-27 16:39:02 +01:00
b984ae5ea2 minor stuff 2025-01-27 16:37:04 +01:00
8e39d161a8 cleaner code 2025-01-27 16:36:42 +01:00
0640eb9004 Several CI fixes
- don't output stdin on terminal
- adapt to different google.com ip addresses
- cleaner code
2025-01-27 16:33:58 +01:00
ce8984706e Finalize unit test
* pattern search + replace for tls_sockets() vs. openssl
* better error handling for invocations with perl functions system + die
2025-01-24 20:36:59 +01:00
cbaa813a40 Merge branch '3.2' into diffing_openssls 2025-01-24 19:47:40 +01:00
0042b6313e s/drwetter/testssl
For the remaining occurences. Except dockerhub which needs to be solved.
2025-01-24 11:15:55 +01:00
d7da22d598 Finalize check
* use system with @args so that we can query the return value
* code style improved for readability
* diff shows the filtered difference
* ok instead of cmp_ok to show not the whole content of vars
2025-01-22 23:33:35 +01:00
12036fb6c8 Update baseline scan + add/deprecate security headers 2025-01-22 19:54:34 +01:00
ba58458909 Restrict tests to those which use openssl 2025-01-22 18:37:48 +01:00
37d987684e remove comment sign from testing 2025-01-22 18:25:54 +01:00
a499233df2 Add unittest for diffrent openssl versions
This adds a unit test to compare a run against google with the supplied openssl
version vs /usr/bin/openssl .

This would fix #2626.

It looks like there are still points to clarify
* NPN output is different (bug)
* Newer openssl version claims it's ECDH 253 instead of ECDH 256.
* Newer openssl version claims for 130x cipher it's ECDH 253, via sockets it´s ECDH/MLKEM. This seems a bug (@dcooper)

A todo is also restricing the unit test to the one where openssl is being used. E.g. the ROBOT check and more aren't done with openssl. So there's no value checking this here.
2025-01-22 18:12:53 +01:00
e0e742379c see previous commit 2024-10-14 17:15:43 +02:00
ae77349f3a see previous commit 2024-10-14 17:11:55 +02:00
dbb8fc8013 Fix CI 2024-09-03 18:28:56 +02:00
2067ac8123 Fall back to heise.de
.. to scan.

It worked in a few examples locally. Other hosts I tried so far weren't
available anymore (like scanme.nmap.org). In order to reduce the burden
we scan now only during PRs.
2023-07-31 16:34:56 +02:00