Skip to content

Commit 24ba9e6

Browse files
authored
Merge pull request #1986 from DimitriPapadopoulos/3.0
Typos found by codespell
2 parents 19760b2 + ca1043b commit 24ba9e6

12 files changed

Lines changed: 79 additions & 66 deletions

.github/workflows/codespell.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
name: Codespell
3+
on: [push, pull_request]
4+
jobs:
5+
codespell:
6+
name: Check for spelling errors
7+
runs-on: ubuntu-latest
8+
steps:
9+
- uses: actions/checkout@v2
10+
- uses: codespell-project/actions-codespell@master
11+
with:
12+
skip: ca_hashes.txt,tls_data.txt,*.pem,OPENSSL-LICENSE.txt
13+
ignore_words_list: borken,gost,ciph,ba,bloc,isnt,chello,fo,alle,nmake

CHANGELOG.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
* Socket timeouts (``--connect-timeout``)
1717
* IDN/IDN2 servername/URI + emoji support, supposed libidn/idn2 is installed and DNS resolver is recent) support
1818
* Initial support for certificate compression
19-
* Better JSON output: renamed IDs and findings shorter/better parsable, also includes certficate
19+
* Better JSON output: renamed IDs and findings shorter/better parsable, also includes certificate
2020
* JSON output now valid also for non-responding servers
2121
* Testing now per default 370 ciphers
2222
* Further improving the robustness of TLS sockets (sending and parsing)
@@ -61,7 +61,7 @@
6161

6262
* Way better coverage of ciphers as most checks are done via bash sockets where ever possible
6363
* Further tests via TLS sockets and improvements (handshake parsing, completeness, robustness)
64-
* Testing 359 default ciphers (``testssl.sh -e/-E``) with a mixture of sockets and openssl. Same speed as with openssl only but addtional ciphers such as post-quantum ciphers, new CHAHA20/POLY1305, CamelliaGCM etc.
64+
* Testing 359 default ciphers (``testssl.sh -e/-E``) with a mixture of sockets and openssl. Same speed as with openssl only but additional ciphers such as post-quantum ciphers, new CHAHA20/POLY1305, CamelliaGCM etc.
6565
* TLS 1.2 protocol check via sockets in production
6666
* Finding more TLS extensions via sockets
6767
* TLS Supported Groups Registry (RFC 7919), key shares extension
@@ -105,7 +105,7 @@
105105
* Even more compatibility improvements for FreeBSD, NetBSD, Gentoo, RH-ish, F5 and Cisco systems
106106
* Considerable speed improvements for each cipher runs (-e/-E)
107107
* More robust SSLv2 + TLS socket interface
108-
* seperate check for curves
108+
* separate check for curves
109109
* OpenSSL 1.1.0 compliant
110110
* check for DROWN
111111
* Whole number of bugs squashed
@@ -124,7 +124,7 @@
124124
* (HTTP) proxy support! Also with sockets -- thx @jnewbigin
125125
* Extended validation certificate detection
126126
* Run in default mode through all ciphers at the end of a default run
127-
* will test multiple IP adresses of one supplied server name in one shot, --ip= restricts it accordingly
127+
* will test multiple IP addresses of one supplied server name in one shot, --ip= restricts it accordingly
128128
* new mass testing file option --file option where testssl.sh commands are being read from, see https://twitter.com/drwetter/status/627619848344989696
129129
* TLS time and HTTP time stamps
130130
* TLS time displayed also for STARTTLS protocols
@@ -193,10 +193,10 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
193193
- IPv6 display fix
194194

195195
1.111
196-
- NEW: tested unter FreeBSD (works with exception of xxd in CCS)
196+
- NEW: tested under FreeBSD (works with exception of xxd in CCS)
197197
- getent now works under Linux and FreeBSD
198198
- sed -i in hsts sacrificed for compatibility
199-
- reomved query for IP for finishing banner, is now called once in parse_hn_port
199+
- removed query for IP for finishing banner, is now called once in parse_hn_port
200200
- GOST warning after banner
201201
- empty build date is not displayed anymore
202202
- long build date strings minimized
@@ -286,7 +286,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
286286
1.91
287287
- replaced most lcyan to brown (=not really bad but somehow)
288288
- empty server string better displayed
289-
- prefered CBC TLS 1.2 cipher is now brown (lucky13)
289+
- preferred CBC TLS 1.2 cipher is now brown (lucky13)
290290

291291
1.90
292292
- fix for netweaver banner (server is lowercase)
@@ -295,7 +295,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
295295

296296
1.89
297297
- reordered! : protocols + cipher come first
298-
- colorized prefered server preference (e.g. CBC+RC4 is light red now, TLSv1.2 green)
298+
- colorized preferred server preference (e.g. CBC+RC4 is light red now, TLSv1.2 green)
299299
- SSLv3 is now light cyan
300300
- NEW: -P|--preference now in help menu
301301
- light cyan is more appropriate than red for HSTS
@@ -330,10 +330,10 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
330330
- headline of -V / PFS+RC4 ciphers unified
331331

332332
1.82
333-
- NEW: output for -V now better (bits seperate, spacing improved)
333+
- NEW: output for -V now better (bits separate, spacing improved)
334334

335335
1.81
336-
- output for RC4+PFS now better (with headline, bits seperate, spacing improved)
336+
- output for RC4+PFS now better (with headline, bits separate, spacing improved)
337337
- both also sorted by encr. strength .. umm ..err bits!
338338

339339
1.80
@@ -358,7 +358,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
358358
- removed legacy code (PROD_REL var)
359359

360360
1.76
361-
- bash was gone!! desaster for Ubuntu, fixed
361+
- bash was gone!! disaster for Ubuntu, fixed
362362
- starttls+rc4 check: bottom line was wrong
363363
- starttls had too much output (certificate) at first a/v check
364364

@@ -454,7 +454,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
454454
* NOPARANOID flag tells whether medium grade ciphers are ok. NOW they are (=<1.17 was paranoid)
455455
456456
1.17
457-
* SSL tests now for renegotiation vulnerabilty!
457+
* SSL tests now for renegotiation vulnerability!
458458
* version detection of testssl.sh
459459
* program has a banner
460460
* fixed bug leading to a file named "1"
@@ -480,7 +480,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
480480
* as a courtesy I am providing 64+32 Linux binaries for testing 56 Bit ciphers
481481
482482
1.11
483-
* Hint for howto enable 56 Bit ciphers fpr testing
483+
* Hint for howto enable 56 Bit ciphers for testing
484484
* possible to specify where openssl is (hardcoded, $ENV, last resort: auto)
485485
* warns if netcat is not there
486486

Readme.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ cryptographic flaws.
1313
* Clear output: you can tell easily whether anything is good or bad.
1414
* Machine readable output.
1515
* No installation needed: Linux, OSX/Darwin, FreeBSD, NetBSD, MSYS2/Cygwin, WSL work out of the box. Only OpenBSD needs bash. No need to install or to configure something. No gems, CPAN, pip or the like.
16-
* A Dockerfile is provided, there's also an offical container @ dockerhub.
16+
* A Dockerfile is provided, there's also an official container @ dockerhub.
1717
* Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only web servers at port 443.
1818
* Toolbox: Several command line options help you to run *your* test and configure *your* output.
1919
* Reliability: features are tested thoroughly.
@@ -49,7 +49,7 @@ You can download testssl.sh by cloning this git repository:
4949

5050
git clone --depth 1 https://github.com/drwetter/testssl.sh.git --branch 3.0
5151

52-
For the stable version help yourself by downloading the [ZIP](https://codeload.github.com/drwetter/testssl.sh/zip/3.0.5) or the lastest testssl-3.0.X.tar.gz from [https://testssl.sh](https://testssl.sh/) archive. Just ``cd`` to the directory created (=INSTALLDIR) and run it off there.
52+
For the stable version help yourself by downloading the [ZIP](https://codeload.github.com/drwetter/testssl.sh/zip/3.0.5) or the latest testssl-3.0.X.tar.gz from [https://testssl.sh](https://testssl.sh/) archive. Just ``cd`` to the directory created (=INSTALLDIR) and run it off there.
5353

5454
#### Docker
5555

doc/testssl.1

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ Please note that \fBfname\fR has to be in Unix format\. DOS carriage returns won
122122
\fB\-\-mode <serial|parallel>\fR\. Mass testing to be done serial (default) or parallel (\fB\-\-parallel\fR is shortcut for the latter, \fB\-\-serial\fR is the opposite option)\. Per default mass testing is being run in serial mode, i\.e\. one line after the other is processed and invoked\. The variable \fBMASS_TESTING_MODE\fR can be defined to be either equal \fBserial\fR or \fBparallel\fR\.
123123
.
124124
.P
125-
\fB\-\-warnings <batch|off>\fR\. The warnings parameter determines how testssl\.sh will deal with situations where user input normally will be necessary\. There are two options\. \fBbatch\fR doesn\'t wait for a confirming keypress when a client\- or server\-side probem is encountered\. As of 3\.0 it just then terminates the particular scan\. This is automatically chosen for mass testing (\fB\-\-file\fR)\. \fBoff\fR just skips the warning, the confirmation but continues the scan, independent whether it makes sense or not\. Please note that there are conflicts where testssl\.sh will still ask for confirmation which are the ones which otherwise would have a drastic impact on the results\. Almost any other decision will be made in the future as a best guess by testssl\.sh\. The same can be achieved by setting the environment variable \fBWARNINGS\fR\.
125+
\fB\-\-warnings <batch|off>\fR\. The warnings parameter determines how testssl\.sh will deal with situations where user input normally will be necessary\. There are two options\. \fBbatch\fR doesn\'t wait for a confirming keypress when a client\- or server\-side problem is encountered\. As of 3\.0 it just then terminates the particular scan\. This is automatically chosen for mass testing (\fB\-\-file\fR)\. \fBoff\fR just skips the warning, the confirmation but continues the scan, independent whether it makes sense or not\. Please note that there are conflicts where testssl\.sh will still ask for confirmation which are the ones which otherwise would have a drastic impact on the results\. Almost any other decision will be made in the future as a best guess by testssl\.sh\. The same can be achieved by setting the environment variable \fBWARNINGS\fR\.
126126
.
127127
.P
128128
\fB\-\-connect\-timeout <seconds>\fR This is useful for socket TCP connections to a node\. If the node does not complete a TCP handshake (e\.g\. because it is down or behind a firewall or there\'s an IDS or a tarpit) testssl\.sh may usually hang for around 2 minutes or even much more\. This parameter instructs testssl\.sh to wait at most \fBseconds\fR for the handshake to complete before giving up\. This option only works if your OS has a timeout binary installed\. CONNECT_TIMEOUT is the corresponding environment variable\.
@@ -335,7 +335,7 @@ Security headers (X\-Frame\-Options, X\-XSS\-Protection, Expect\-CT,\.\.\. , CSP
335335
\fB\-g, \-\-grease\fR checks several server implementation bugs like tolerance to size limitations and GREASE, see https://www\.ietf\.org/archive/id/draft\-ietf\-tls\-grease\-01\.txt \. This checks doesn\'t run per default\.
336336
.
337337
.SS "VULNERABILITIES"
338-
\fB\-U, \-\-vulnerable, \-\-vulnerabilities\fR Just tests all (of the following) vulnerabilities\. The environment variable \fBVULN_THRESHLD\fR determines after which value a separate headline for each vulnerability is being displayed\. Default is \fB1\fR which means if you check for two vulnerabilities, only the general headline for vulnerabilities section is displayed \-\- in addition to the vulnerability and the result\. Otherwise each vulnerability or vulnerability section gets its own headline in addition to the output of the name of the vulnerabilty and test result\. A vulnerability section is comprised of more than one check, e\.g\. the renegotiation vulnerability check has two checks, so has Logjam\.
338+
\fB\-U, \-\-vulnerable, \-\-vulnerabilities\fR Just tests all (of the following) vulnerabilities\. The environment variable \fBVULN_THRESHLD\fR determines after which value a separate headline for each vulnerability is being displayed\. Default is \fB1\fR which means if you check for two vulnerabilities, only the general headline for vulnerabilities section is displayed \-\- in addition to the vulnerability and the result\. Otherwise each vulnerability or vulnerability section gets its own headline in addition to the output of the name of the vulnerability and test result\. A vulnerability section is comprised of more than one check, e\.g\. the renegotiation vulnerability check has two checks, so has Logjam\.
339339
.
340340
.P
341341
\fB\-H, \-\-heartbleed\fR Checks for Heartbleed, a memory leakage in openssl\. Unless the server side doesn\'t support the heartbeat extension it is likely that this check runs into a timeout\. The seconds to wait for a reply can be adjusted with \fBHEARTBLEED_MAX_WAITSOCK\fR\. 8 is the default\.
@@ -622,7 +622,7 @@ MAX_SOCKET_FAIL: A number which tells testssl\.sh how often a TCP socket connect
622622
MAX_OSSL_FAIL: A number which tells testssl\.sh how often an OpenSSL s_client connect may fail before the program gives up and terminates\. The default is 2\. You can increase it to a higher value if you frequently see a message like \fIFatal error: repeated TCP connect problems, giving up\fR\.
623623
.
624624
.IP "\(bu" 4
625-
MAX_HEADER_FAIL: A number which tells testssl\.sh how often a HTTP GET request over OpenSSL may return an empty file before the program gives up and terminates\. The default is 3\. Also here you can incerase the threshold when you spot messages like \fIFatal error: repeated HTTP header connect problems, doesn\'t make sense to continue\fR\.
625+
MAX_HEADER_FAIL: A number which tells testssl\.sh how often a HTTP GET request over OpenSSL may return an empty file before the program gives up and terminates\. The default is 3\. Also here you can increase the threshold when you spot messages like \fIFatal error: repeated HTTP header connect problems, doesn\'t make sense to continue\fR\.
626626
.
627627
.IP "" 0
628628
.

0 commit comments

Comments
 (0)