1
0
mirror of https://github.com/drwetter/testssl.sh.git synced 2025-07-18 11:41:56 +02:00
Commit Graph

152 Commits

Author SHA1 Message Date
d93549e327 fix match expr 2025-01-27 20:08:11 +01:00
cdf5cf7b97 remove + @ beginning of line 2025-01-27 17:20:39 +01:00
ef13122f4f fix typo 2025-01-27 16:39:02 +01:00
b984ae5ea2 minor stuff 2025-01-27 16:37:04 +01:00
8e39d161a8 cleaner code 2025-01-27 16:36:42 +01:00
0640eb9004 Several CI fixes
- don't output stdin on terminal
- adapt to different google.com ip addresses
- cleaner code
2025-01-27 16:33:58 +01:00
ce8984706e Finalize unit test
* pattern search + replace for tls_sockets() vs. openssl
* better error handling for invocations with perl functions system + die
2025-01-24 20:36:59 +01:00
cbaa813a40 Merge branch '3.2' into diffing_openssls 2025-01-24 19:47:40 +01:00
0042b6313e s/drwetter/testssl
For the remaining occurences. Except dockerhub which needs to be solved.
2025-01-24 11:15:55 +01:00
d7da22d598 Finalize check
* use system with @args so that we can query the return value
* code style improved for readability
* diff shows the filtered difference
* ok instead of cmp_ok to show not the whole content of vars
2025-01-22 23:33:35 +01:00
12036fb6c8 Update baseline scan + add/deprecate security headers 2025-01-22 19:54:34 +01:00
ba58458909 Restrict tests to those which use openssl 2025-01-22 18:37:48 +01:00
37d987684e remove comment sign from testing 2025-01-22 18:25:54 +01:00
a499233df2 Add unittest for diffrent openssl versions
This adds a unit test to compare a run against google with the supplied openssl
version vs /usr/bin/openssl .

This would fix .

It looks like there are still points to clarify
* NPN output is different (bug)
* Newer openssl version claims it's ECDH 253 instead of ECDH 256.
* Newer openssl version claims for 130x cipher it's ECDH 253, via sockets it´s ECDH/MLKEM. This seems a bug (@dcooper)

A todo is also restricing the unit test to the one where openssl is being used. E.g. the ROBOT check and more aren't done with openssl. So there's no value checking this here.
2025-01-22 18:12:53 +01:00
e0e742379c see previous commit 2024-10-14 17:15:43 +02:00
ae77349f3a see previous commit 2024-10-14 17:11:55 +02:00
dbb8fc8013 Fix CI 2024-09-03 18:28:56 +02:00
2067ac8123 Fall back to heise.de
.. to scan.

It worked in a few examples locally. Other hosts I tried so far weren't
available anymore (like scanme.nmap.org). In order to reduce the burden
we scan now only during PRs.
2023-07-31 16:34:56 +02:00
fc14a02035 Changed heise.de to example.com as sometimes we're blocked 2023-07-31 13:44:35 +02:00
035996cc44 updated default_testssl.csvfile with new RSA-PSS 2023-03-23 00:14:15 +01:00
b84e182ca2 Merge pull request from drwetter/sanitize_fileout
Make sure control chars from HTTP header don't end up in html,csv,json
2023-03-12 16:18:20 +01:00
cacd8c57b1 Add variable htmlfile + filter GOST message
... which is needed for newer LibreSSL/OpenSSL versions
2023-03-12 15:09:24 +01:00
66ebfb2f58 Add changes to CSV baseline 2023-02-06 21:56:54 +01:00
2e0898c9ef Remove NNTP from CI tests
Maybe for the future we should check whether host is available and
if so then run the test
2023-01-31 09:34:18 +01:00
6088eddab6 Show server supported signature algorithms
This commit modifies run_fs() to show the signature algorithms the server supports in the ServerKeyExchange message for TLS 1.2 and in the CertificateVerify message for TLS 1.3.

Signature algorithms are not shown for TLS 1.1 and earlier, since for those protocol versions the signature algorithm to use is specified by the protocol. While the signature algorithm used in TLS 1.1 and earlier is weak, testssl.sh already warns if these protocol versions are supported.
2022-11-18 06:23:24 -08:00
e918a2c31f remove negotiated cipher / protocol also in baseline file 2022-11-14 20:25:56 +01:00
5c889bde0f Include cipher order information in file output on a per protocol basis
This commit fileout() calls to ciphers_by_strength() and cipher_pref_check() to indicate whether or not the server enforces a cipher order for a protocol version.
2022-10-20 12:49:22 -07:00
c92a648391 Add LibreSSL from MacOS 2022-05-31 16:17:47 +02:00
854028166d Including AppleMail 2022-05-31 15:12:16 +02:00
6536eaddb6 remove Java 12 and OSX 10 in baseline file 2022-05-31 14:09:19 +02:00
6023acd58c Merge branch '3.1dev' into update_clients1 2022-05-31 12:09:23 +02:00
dfbb9f8122 Fix Actions
this one works locally...
2022-05-30 13:37:07 +02:00
8d817e1dcf PR to merge
added: changes in CI so that it goes through
2022-05-25 18:46:08 +02:00
04463784a8 Fix censys link in DROWN section
See . the line seems very long though.

Note: this was previously commited as  but as there were two mistakes
and one other thing which could be improved I decided to make a hard reset.

Apologize if it caused inconvenience.
2022-05-14 12:06:09 +02:00
1eb8347174 Update comparion/diff file for CI
... for the time being
2022-05-10 13:08:44 +02:00
fa5d13eb06 Reorder output of run_server_preference()
This commit reorders the output of run_server_preference() as discussed in .
2022-03-22 15:40:49 -04:00
1814da4e53 Working NNTP server
Switch NNTP server testing to a currently working server from http://vivil.free.fr/nntpeng.htm.
2022-03-16 07:57:40 -04:00
ce746cd8b7 Add CI check
* for STARTTLS + LDAP
* for STARTTLS + POP3 reenable check with openssl as GH has not the time limits which Travis had
2022-02-01 10:02:35 +01:00
4c2a1296a7 Add unit testing (manage)sieve protocol while using STARTTLS 2021-12-20 17:18:07 +01:00
fc06fcee56 fix travis 2021-12-10 18:26:03 +01:00
18f3ad7c31 fix travis 2021-12-10 15:58:10 +01:00
64d110f19d Check file permissions on ./testssl.sh
This commit adds a check that ./testssl.sh has both read and execute permission. If ./testssl.sh is lacking execute permission, it will pass the tests in 00_testssl_help.t and 01_testssl_banner.t that run the program as `bash ./testssl.sh`, but will fail the subsequent tests that run the program as `./testssl.sh`, but the reason for the failure will not be clear.
2021-11-15 07:25:08 -05:00
3d9f109780 Fix 2030
Fix CI issue created by  and by new certificate fingerprint.
2021-10-28 08:13:34 -04:00
0012adf47e Add a test to verify that expired.badssl.com's chain of trust is expired. 2021-10-05 13:53:58 -04:00
529e9da823 Fix GHA (starttls nntp)
using another IP
2021-09-09 23:17:09 +02:00
b1f5c6c9af Trim excess whitespace 2021-09-04 13:28:30 +00:00
6782e2a3b9 Fix spelling 2021-09-04 12:39:03 +00:00
cbae32e5a4 Add missing vim modeline config in sh & perl files, cc 2021-06-01 14:40:24 +08:00
9e61b8ba13 Make vim modeline config consistent, cc 2021-06-01 14:31:31 +08:00
a6f8aa61de Fix travis
Respect changed HSTS epoch time of 180 days.

(DROWN output is changed too as the certificated changed but doesn't matter
as the travis check filters that)
2021-05-10 11:28:25 +02:00