Commit Graph

2146 Commits

Author SHA1 Message Date
c636a82b0a Fix HPKP regression where it stated that only one SPKI was used 2018-03-01 15:34:25 +01:00
ac5aca0dcf address #876 (empty addcmd2 variable) 2018-02-27 13:08:42 +01:00
a2d59abf87 Rollup: OpenBSD compatbility, SLES 10 incompatibility
bash 3.2 is now a minium requirement and it is being tested.
It refuses to run if anything lower is detected/

Rollback of d5c86a8df2, see #999

Backport (f812403292) for OpenBSD date.
Also adding LibreSSL not to warn bceause of trust reliability
v2.9.5-2
2018-02-19 11:16:04 +01:00
d5c86a8df2 Fix #999, for bash 3.1, regex matchg failed 2018-02-16 19:11:58 +01:00
f7288fd4bf Backport of Alpine Linux Dockerfile from 2.9dev 2018-02-09 14:11:27 +01:00
c004469e0f backport of #982
fixes #981
2018-02-08 14:16:36 +01:00
af6ca18933 change certificate enddate not to contain the TZ offset 2018-01-31 16:37:22 +01:00
56aa009491 backport #968 2018-01-23 10:13:46 +01:00
e40e4007b1 backport of #961 (client auth and broken json-pretty) 2018-01-19 14:18:10 +01:00
4d7aa5df8b Fix for POP3, robustness for STARTTLS
POP3 STARTTLS handshakes were often unsuccessful as
a regex wasn't properly escaped.

Furthermore if a STARTTLS handshake doesn't succeed, there's
a warning now.
2017-12-06 12:48:55 +01:00
8ebba5593d Fixes in headers
- double word match: Content-Security-Policy matched also X-Content-Security-Policy
- X-UA-Compatible always appeared twice
2017-12-01 13:37:23 +01:00
a53cb4b971 Recognise TLS alerts as a sign that SSLv2 is not supported
See #908 and f61b701f5a

In order to have better debugging info the TLS alert message is printed
in clear. Messages code and text assignements was moveed to a separate
function.
2017-11-29 12:00:53 +01:00
59b4f6364b Increase STARTTLS_SLEEP for lame servers 2017-11-24 23:09:03 +01:00
bf0fde27e6 backport dockerfile from 2.9dev 2017-11-19 16:14:30 +01:00
a802792db5 update links, reorder features 2017-09-27 09:02:29 +02:00
ed88add923 regression fix: output for CVE-2015-3197 was missing in DROWN v2.9.5-1 2017-09-20 17:24:37 +02:00
c5ac8c9227 workaround due to problem with blanks in $SWURL
SWURL contained for historical reasons trailing blanks
for released versions.
This caused an error in pr_boldurl --> html_out which
didn't write the trailing style info and didn't close
the href tag (travis complained.)

This patch removes the trailing blank but it doesn't
fix the error
2017-09-20 10:47:18 +02:00
11b4f67d7e version number 2017-09-20 07:11:11 +02:00
f9c72ea85e Update Readme.md 2017-09-19 16:22:09 +02:00
11d7645754 changed for 2.9.5 v2.9.5 2017-09-19 16:13:38 +02:00
b9b09f586e added MS CA store, see #825
Finally complete, thx @naumanshah03
2017-09-19 15:15:54 +02:00
f48deaaa9d Update README.md 2017-09-19 14:50:08 +02:00
4972cda2af FIX #762 (replace which by 'type -p') 2017-09-19 00:08:33 +02:00
1c10ad0124 remove echoing ~ /usr/bin/timeout 2017-09-18 23:38:06 +02:00
b222fe8f53 Merge branch '2.9dev' of github.com:drwetter/testssl.sh into 2.9dev 2017-09-18 23:34:12 +02:00
95af735862 Update README.md 2017-09-18 23:33:25 +02:00
3caa73c1b8 Update README.md 2017-09-18 23:32:35 +02:00
bd55830a7e FIX #823, for jabber try PTR record first or fail 2017-09-18 23:25:07 +02:00
f014a1853b missing update from 985c845486 2017-09-18 23:01:37 +02:00
7294df927f Merge pull request #677 from dcooper16/no_sni
Just get non-SNI certificate once
2017-09-18 21:14:34 +02:00
34fa8fc98e Just get non-SNI certificate once
Currently the call to `$OPENSSL s_client` to obtain the certificate returned by the server when SNI is not provided is in `certificate_info()`, which means that it is called once for each certificate found the various called to `get_server_certificates()`.

This PR moves the call to `$OPENSSL s_client` to `run_server_defaults()` so that the call is made only once, even if more than one server certificate was found.

In addition, in most cases the certificate returned by the server when SNI is not provided will already have been retrieved by `run_server_defaults()` (in rounds 8-14), in which case `$HOSTCERT.nosni` can just be copied from there rather than making an additional call to `$OPENSSL s_client`.
2017-09-18 13:31:38 -04:00
a395f91f0e Merge pull request #777 from dcooper16/fix772
Fix #772
2017-09-18 18:36:53 +02:00
6b1d81d28d imor housekeeping for `fileout() in run_http_header()` 2017-09-18 18:18:05 +02:00
200440a28f Merge pull request #820 from seccubus/insecure_redirect
Fixed file output error in case of insecure redirect
2017-09-18 18:01:43 +02:00
f372b4b775 FIX #622
If the host negotiated SSLv3 reading of the ServerKeyExchange message failed
and as a consequence determination of the DH key
2017-09-18 17:50:06 +02:00
a264898f77 Initial fix for #772
This commit provides a partial fix for #772.
2017-09-18 09:52:30 -04:00
8b076e9841 relect what to do for updtaing ca_hashes.txt 2017-09-18 14:20:56 +02:00
985c845486 update of certificate stores, except MS 2017-09-18 14:18:00 +02:00
26c77cc3c2 any openssl will do 2017-09-18 14:02:12 +02:00
c4e5533ab0 FIX #822 2017-09-15 21:20:42 +02:00
837a6fb31c fix travis build in fad8c63 2017-09-15 15:38:11 +02:00
fad8c631ef consistently open the file with echo here as well
see CSVFILE (and request #822)
2017-09-15 15:09:13 +02:00
90cd8cd3e2 Merge pull request #796 from sdann/mysql_standard_cipher
Catch MySQL (yaSSL) server bug when testing standard cipher categories
2017-09-15 14:02:26 +02:00
49ed49f505 Fixed file output error in case of insecure redirect 2017-09-11 16:59:34 +02:00
50287ef2c4 fix for empty/malformed socket replies
During protocol check if a sever answered unexpected with
closing the conenction or another malformed reply the
output was not ok as DETECTED_TLS_VERSION was empty.

This fixes it by filling the variable with a string in ``parse_tls_serverhello()``
and then check in higher level (``run_protocols()``) the content.

Also it seems that I forgot in the commit from yesterday one ``&&`` to
commit in ``run_breach()``
2017-09-01 16:13:32 +02:00
ee8c5e51a1 fix vulnerability output for breach and x509 based client auth
and polish output in ``run_renego()``
2017-08-31 17:22:10 +02:00
9345b55865 added ALL_CLIENTS for client siumulation 2017-08-30 23:40:47 +02:00
25f1293756 client simulation update
file renamed (dash is more consistent)

env var "ALL_CLIENTS" now shows every browser (or client) during
client simulation
2017-08-30 23:04:52 +02:00
4379174970 rename generated file, comment it better + take care of one GREASE cipher 2017-08-30 23:02:21 +02:00
54539e9da3 rename client simulation file (das is more consistent)
update client simulation: now has every client from SSLlabs and
it is properly ordered
2017-08-30 23:00:32 +02:00