Dirk
20cee1e788
- fix: relative redirect led to fp (https)
2016-02-22 10:44:43 +01:00
Dirk
c70a13d014
- fix #296 (no recent regression as assumed)
2016-02-20 21:46:17 +01:00
Dirk
583584e095
- FIX #297
...
- FIX #243
- reformmated BEAST a bit (was screwed up in ! WIDE mode if too many ciphers
2016-02-20 14:10:04 +01:00
Dirk
71b4c03202
- fix key problem hpkp
2016-02-20 11:07:47 +01:00
John Carver
4be1539a4d
lowercase ok when used with NOT in (NOT ok)
2016-02-18 11:49:47 -06:00
John Carver
291edce0c3
uppercase server sets a cipher order (OK)
2016-02-18 11:41:17 -06:00
John Carver
6858026412
uppercase INFO when outputting status_code
2016-02-18 11:15:31 -06:00
b1gb1t
2ee021d337
Correction of line 3607: new line (\n) corrupted the json format
2016-02-16 09:54:01 +01:00
Dirk Wetter
61c1669687
Merge pull request #292 from dcooper16/multiple_certificates
...
Detect multiple certificates cleanup
2016-02-14 00:08:52 +01:00
Sietse van der Molen
394f186000
also remove carriage returns, fix for csv
2016-02-12 12:40:31 +01:00
Sietse van der Molen
b2e4df60ca
fix json output
...
use double quotes instead of single quotes
delete newlines from strings
2016-02-12 11:05:36 +01:00
David Cooper
02239be295
Detect multiple certificates cleanup
...
This corrects the indentation within determine_trust() when there are multiple certificates and the output for "Chain of trust (experim.)" takes up more than one lines.
In addition, it fixes the ID field of the JSON output for entries related to the certificate. At the moment, each ID string begins with a blank space. This changes it to remove the space if there is one certificate and to add "Server Certificate #X" at the beginning of each ID if there is more than one certificate.
Perhaps there's a better way than just using, for example, "Server Certificate #1 key_size" as a way to distinguish multiple "key_size" entries in the JSON file. This is just one idea, and it can certainly be changed if those who intend to use the JSON output prefer something else.
2016-02-09 13:35:46 -05:00
AndreiD
8842aeb2b9
Fix #289 - the grep that decides whether a domain is a local address doesn't consider the case when the full domain name is in the hosts file, but followed by .some.other.stuff. This PR addresses this case.
2016-02-08 12:51:54 +01:00
Dirk Wetter
70cd658447
- FIX #283 (regression from 1a8ed3d70a)
...
- minor output fixes for BEAST
- >4096 bit RSA keys labled in litemangenta now as it could have compatibility probs
- -V 0x.. or -V 0X.. gives at least a warning
2016-02-07 19:13:59 +01:00
Thomas Jensen
c48b27a9a9
fix typo in b93fc824
2016-02-07 03:07:30 +01:00
Dirk
b93fc82489
slightly better output for OCSP stapling
2016-02-06 22:31:32 +01:00
Dirk
a676742256
Remaining issues solved for OpenSSL 1.1.0 compliance, output corrections, CN/SNI improvements
2016-02-03 17:55:53 +01:00
Dirk
9cf3e21c3d
- swapped sig_algo and server key size
...
- output improvements for unknown sig algos like GOST
2016-02-03 09:55:47 +01:00
Dirk
ea18d2f02c
- fix: discovering the CN for the default host (without SNI)
...
- CN parsing of certificate improved
- CN / subject can be also cyrillic now -- supposed the terminal supports the charset
2016-02-03 00:05:57 +01:00
Dirk
dd65050ee1
- "secret" env switch shows during -e/-E the signature algorithm (see also #276 )
...
- exp. date check corrected esp. for openssl 1.1.0
- warning relaxed for chain of trust
2016-02-01 22:06:27 +01:00
dcooper16
9f998d8c53
Number of trusted certificate files in $INSTALL_DIR/etc/*.pem
...
The number of .pem files in $INSTALL_DIR/etc is currently hard-coded into determine_trust. This modifies the code so that the number of files can be changed without having to change the code.
2016-02-01 14:11:50 -05:00
Dirk Wetter
f7853f36a0
- added SSL_CERT_FILE=/dev/null
...
- output cleanups in determine_trust()
2016-02-01 17:33:59 +01:00
dcooper16
abffd1b81e
Fix chain of trust problem
...
This should fix issue #278 . I'm not sure whether openssl verify will ever print out more than one error, so to be safe, I wrote the code to handle the possibility that it might; if there is more than one error, it just takes the first and ignores the rest.
2016-02-01 11:17:13 -05:00
Dirk Wetter
8f9b38f7d4
- LF and other corrections for HPKP
...
- output corrections for 2 x HPKP (e.g. scotthelme)
2016-02-01 13:23:28 +01:00
Dirk
0bfe12742e
correct signature keysizes, FIX #249
2016-02-01 10:19:23 +01:00
Dirk
c62abaf215
fix colored output in wide mode ( FIX #277 )
2016-01-31 23:53:13 +01:00
Dirk
5ae9bb8c13
- typo in IPv4 header
...
- fixed recognition of XML,HTML to separate header
- fixed -V <pattern
2016-01-31 21:02:18 +01:00
Dirk
1726d3b41c
minor change of color
2016-01-31 11:04:59 +01:00
Dirk
f7baa560c2
- typos, etc
2016-01-31 10:54:45 +01:00
Dirk
c564e305a7
- FIX #273
2016-01-31 01:55:23 +01:00
Dirk
fc346a35fe
- indentation reverted to old value if in only one certificate
...
- minor cleanups in the output
2016-01-30 23:59:29 +01:00
dcooper16
2bf9c5d81e
Detect multiple certificates
...
Modifies --server-defaults to handle cases in which the server has more than one certificate (e.g., one with an RSA key and one with an ECC key).
2016-01-28 17:06:34 -05:00
Dirk
495b9cda9b
- several fixes/improvements for new JSON/CSV file feature #268
...
* no color code in files
* rc4 ciphers were missing
* NODE was missing
* calling of NODEIP/PORT was not neccessary
* default naming of files similar to $LOGFILE
2016-01-23 23:33:17 +01:00
Dirk
8a2fe5915a
- /usr/bin/printf --> printf
2016-01-23 20:33:46 +01:00
Dirk
1a8ed3d70a
- JSON/CSV from #268 , labeled it experimental
...
- fixes partly #31
- several fixes to it (backticks, single sq brackets, renaming funcs, removed lf in JSON, ...)
2016-01-23 19:18:33 +01:00
Thomas Martens
b16ab6a021
added colorblind option
...
if colorblind option is set swap green and blue in the output
2016-01-22 20:40:08 +01:00
Thomas Martens
8bae1bc1ed
added --mapping=no-rfc
...
don't display the RFC ciphername in the cipher checks.
2016-01-19 21:55:06 +01:00
Dirk
b97788ba73
typo fixed
2016-01-15 17:30:47 +01:00
Dirk
5257c2f38a
- inline license clarifications
...
(separate file needed later)
2016-01-15 17:04:16 +01:00
Dirk
a9643b6d1e
- hooks for rfc/non-rfc
...
- FIX for beast: no CBC cipher at all is now displayed
- minor cosmetic stuff
2016-01-15 16:37:47 +01:00
Dirk
2871aaaee3
- optical cleanups for #265
...
- don't do browser tests for non-HTTP services
2016-01-15 15:53:03 +01:00
Frank Breedijk
55c0b24278
Don't forget to add help message
2016-01-13 10:26:12 +01:00
Frank Breedijk
ab47f8ada9
Added client simulations based on @ivanr s list on ssllabs
2016-01-13 10:21:01 +01:00
Dirk
dc4f90ac48
missing linefeed
2015-12-29 17:07:03 +01:00
Dirk
b962ccde53
FIX #262
2015-12-29 10:05:20 +01:00
Dirk
3b17c9e321
cosmetic corrections to help
2015-12-27 14:51:18 +01:00
Dirk
914e364d1e
- fix headline for non-socket support
2015-12-27 13:33:53 +01:00
Dirk
e10da3a78a
- minor adjustmentents to program style
2015-12-24 23:00:23 +01:00
Dirk
5c19bf5892
- fix for web sites having leading spaces b4 html/xml content starts
2015-12-22 21:08:52 +01:00
Dirk
c3269f1927
- Fixes for #260
2015-12-22 20:31:52 +01:00