testssl.sh/etc
David Cooper 555ce31ab8 Fix incorrect client simulation data
In the data provided by https://api.dev.ssllabs.com/api/v3/getClients, Chrome 57 Win 7 and Firefox 53 Win 7 send ClientHellos that indicate support for TLSv1.3 draft 18, but the highest_protocol for each of these is specified as 0x0303. The result is that if the server being tested supports TLSV1.3 draft 18, `run_client_simulation()` will incorrectly report "No connection" for these servers since the DETECTED_TLS_VERSION (0x0304) will be higher than the specified highest_protocol.

This PR fixes the problem by changing the highest_protocol to 0x0304. Note that another solution to this problem would be to change the ClientHello messages for these two browsers. It is my understanding that TLSv1.3 is disabled by default for these browsers, so presumably the ClientHello messages would not specify TLSv1.3 support if they were configured with TLSv1.3 support disabled.
2017-10-03 16:34:56 -04:00
..
Apple.pem update of certificate stores, except MS 2017-09-18 14:18:00 +02:00
ca_hashes.txt added MS CA store, see #825 2017-09-19 15:15:54 +02:00
cipher-mapping.txt Add OpenSSL names for ARIA ciphers 2017-08-30 11:12:11 -04:00
client_simulation.txt Reorder client simulation data (see #776) and update README 2017-08-30 20:35:15 +02:00
client-simulation.txt Fix incorrect client simulation data 2017-10-03 16:34:56 -04:00
common-primes.txt - add crypotsense prefined DH groups 2017-01-20 18:14:48 +01:00
curves.txt - added values to curve448 + 25519 2016-06-09 13:18:55 +02:00
Linux.pem update of certificate stores, except MS 2017-09-18 14:18:00 +02:00
Microsoft.pem added MS CA store, see #825 2017-09-19 15:15:54 +02:00
Mozilla.pem update of certificate stores, except MS 2017-09-18 14:18:00 +02:00
README.md Update README.md 2017-09-19 14:50:08 +02:00
tls_data.txt adding comments for David's PR #807 and pointing to the cipher list in #806 2017-07-31 12:59:36 +02:00

Certificate stores

The certificate stores were retrieved by

In this directory you can also save e.g. your company Root CA(s) in PEM format, extension pem. This has two catches momentarily: You will still get a warning for the other certificate stores while scanning internal net- works. Second catch: If you scan other hosts in the internet the check against your Root CA will fail, too. This will be fixed in the future, see #230.

Further needed files

  • tls_data.txt contains lists of cipher suites and private keys for sockets-based tests

  • cipher-mapping.txt contains information about all of the cipher suites defined for SSL/TLS

  • ca_hashes.txt is used for HPKP test in order to have a fast comparison with known CAs. Use ~/utils/create_ca_hashes.sh for an update

  • common-primes.txt is used for LOGJAM

  • client-simulation.txt as the name indicates it's the data for the client simulation. Use ~/utils/update_client_sim_data.pl for an update. Note: This list has been manually edited to sort it and weed it out.