Skip to content

Commit 251d5ac

Browse files
authored
Merge pull request #2981 from testssl/fix_2973
Remove VULN_THRESHLD relic
2 parents 4e10bd2 + cf77cd2 commit 251d5ac

File tree

1 file changed

+2
-13
lines changed

1 file changed

+2
-13
lines changed

testssl.sh

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,6 @@ HPKP_MIN=${HPKP_MIN:-30} # >=30 days should be ok for HPKP_MIN, p
220220
HPKP_MIN=$((HPKP_MIN * 86400)) # correct to seconds
221221
DAYS2WARN1=${DAYS2WARN1:-60} # days to warn before cert expires, threshold 1
222222
DAYS2WARN2=${DAYS2WARN2:-30} # days to warn before cert expires, threshold 2
223-
VULN_THRESHLD=${VULN_THRESHLD:-1} # if vulnerabilities to check >$VULN_THRESHLD we DON'T show a separate header line in the output each vuln. check
224223
UNBRACKTD_IPV6=${UNBRACKTD_IPV6:-false} # some versions of OpenSSL (like Gentoo) don't support [bracketed] IPv6 addresses
225224
NO_ENGINE=${NO_ENGINE:-false} # if there are problems finding the (external) openssl engine set this to true
226225
declare -r CLIENT_MIN_FS=5 # number of ciphers needed to run a test for FS
@@ -19953,11 +19952,6 @@ run_rc4() {
1995319952
"$FAST" && using_sockets=false
1995419953
[[ $TLS_NR_CIPHERS == 0 ]] && using_sockets=false
1995519954

19956-
if [[ $VULN_COUNT -le $VULN_THRESHLD ]]; then
19957-
outln
19958-
pr_headlineln " Checking for vulnerable RC4 Ciphers "
19959-
outln
19960-
fi
1996119955
pr_bold " RC4"; out " (${cve// /, }) "
1996219956

1996319957
if "$TLS13_ONLY"; then
@@ -20223,11 +20217,6 @@ run_starttls_injection() {
2022320217

2022420218
[[ -z "$STARTTLS" ]] && return 0
2022520219

20226-
if [[ $VULN_COUNT -le $VULN_THRESHLD ]]; then
20227-
outln
20228-
pr_headlineln " Checking for STARTTLS injection "
20229-
outln
20230-
fi
2023120220
pr_bold " STARTTLS injection" ; out " (CVE-2011-0411, exp.) "
2023220221

2023320222
# We'll do a soft fail here, also no warning, as I do not expect everybody to have socat installed
@@ -24441,6 +24430,7 @@ set_scanning_defaults() {
2444124430
do_tls_fallback_scsv=true
2444224431
do_client_simulation=true
2444324432

24433+
# A counter wie use but only for if there are vulnerabilities to check or not
2444424434
if "$OFFENSIVE"; then
2444524435
VULN_COUNT=18
2444624436
else
@@ -24696,6 +24686,7 @@ parse_cmd_line() {
2469624686
do_winshock=true
2469724687
do_rc4=true
2469824688
do_starttls_injection=true
24689+
# A counter which we use but only for if there are vulnerabilities to check or not
2469924690
if "$OFFENSIVE"; then
2470024691
VULN_COUNT=18
2470124692
else
@@ -25165,8 +25156,6 @@ parse_cmd_line() {
2516525156
do_logjam=true
2516625157
do_allciphers=true
2516725158

25168-
# Force vuln. checks to be shown under the same header
25169-
VULN_THRESHLD=-1
2517025159
;;
2517125160
(--) shift
2517225161
break

0 commit comments

Comments
 (0)