Skip to content

Commit b0d035c

Browse files
committed
went though the log from today back to Nov 22
1 parent e9db257 commit b0d035c

File tree

2 files changed

+24
-12
lines changed

2 files changed

+24
-12
lines changed

CHANGELOG.md

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,44 +3,50 @@
33

44
### Features implemented / improvements in 3.2rcX
55

6+
* Rating (SSL Labs, not complete)
67
* Extend Server (cipher) preference: always now in wide mode instead of running all ciphers in the end (per default)
78
* Improved compatibility with OpenSSL 3.0
9+
* Improved compatibility with Open/LibreSSL versions not suppoting TLS 1.0-1.1 anymore
810
* Renamed PFS/perfect forward secrecy --> FS/forward secrecy
11+
* Cipher list straightening
912
* Improved mass testing
10-
* Align better colors of ciphers with standard cipherlists
11-
* Added several ciphers to colored ciphers
13+
* switched to multi-stage image with opensuse base to avoid musl libc issues
14+
* Btter align colors of ciphers with standard cipherlists
15+
* Several ciphers more colorized
1216
* Percent output char problem fixed
1317
* Several display/output fixes
1418
* BREACH check: list all compression methods and add brotli
1519
* Test for old winshock vulnerability
1620
* Test for STARTTLS injection vulnerabilities (SMTP, POP3, IMAP)
17-
* Security fix: DNS input
18-
* Don't use external pwd anymore
1921
* STARTTLS: XMPP server support
20-
* Code improvements to STARTTLS
21-
* Detect better when no STARTTLS is offered
22-
* Rating (SSL Labs, not complete)
22+
* Several code improvements to STARTTLS, also better detection when no STARTTLS is offered
23+
* STARTTLS on active directory service support
24+
* Security fixes: DNS and other input from servers
2325
* Don't penalize missing trust in rating when CA not in Java store
2426
* Added support for certificates with EdDSA signatures and public keys
27+
* Extract CA list shows supported certification authorities sent by the server
28+
* TLS 1.2 and TLS 1.3 sig algs added
29+
* Check for ffdhe groups
30+
* Show server supported signature algorithms
2531
* --add-ca can also now be a directory with \*.pem files
2632
* Warning of 398 day limit for certificates issued after 2020/9/1
2733
* Added environment variable for amount of attempts for ssl renegotiation check
2834
* Added --user-agent argument to support using a custom User Agent
2935
* Added --overwrite argument to support overwriting output files without warning
3036
* Headerflag X-XSS-Protection is now labeled as INFO
37+
* Strict parser for HSTS
38+
* DNS via proxy improvements
3139
* Client simulation runs in wide mode which is even better readable
3240
* Added --reqheader to support custom headers in HTTP requests
3341
* Test for support for RFC 8879 certificate compression
34-
* Check for ffdhe groups
3542
* New set of OpenSSL-bad binaries with STARTTLS xmpp-server
3643
* Save a few cycles for ROBOT
3744
* Provide a better verdict wrt to server order: Now per protocol and ciphers are
3845
weighted for each protocol
3946
* Remove "negotiated cipher / protocol"
40-
* Extract CA list shows supported certification authorities sent by the server
41-
* Show server supported signature algorithms
47+
* Deprecating --fast and --ssl-native (warning but still av)
4248
* Compatible to GNU grep 3.8
43-
* STARTTLS on active directory service works now
49+
* Don't use external pwd command anymore
4450

4551

4652
### Features implemented / improvements in 3.0

CREDITS.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Full contribution, see git log.
99
* David Cooper (main contributor)
1010
- Major extensions to socket support for all protocols
1111
- extended parsing of TLS ServerHello messages
12-
- TLS 1.3 support (final and pre-final)
12+
- TLS 1.3 support (final and pre-final) with needed encrption/decryptions
1313
- add several TLS extensions
1414
- Detection + output of multiple certificates
1515
- several cleanups of server certificate related stuff
@@ -29,13 +29,16 @@ Full contribution, see git log.
2929
- several protocol preferences improvements
3030
- pwnedkeys.com support
3131
- CT support
32+
- Extract CA list CertificateRequest message is encountered
3233
- RFC 8879, certificate compression
3334
- 128 cipher limit, padding
3435
- compatibility for LibreSSL and different OpenSSL versions
3536
- Check for ffdhe groups
37+
- TLS 1.2 and TLS 1.3 sig algs added
3638
- Show server supported signature algorithms
3739
- Show supported certification authorities sent by the server when client auth is requested
3840
- Provide a better verdict wrt to server order: Now per protocol and ciphers are weighted for each protocol
41+
- Provide compatibility to every LibreSSL/OpenSSL versions
3942
- Lots of fixes and improvements
4043

4144
##### Further credits (in alphabetical order)
@@ -90,6 +93,9 @@ Full contribution, see git log.
9093
* Hubert Kario
9194
- helped with avoiding accidental TCP fragmentation
9295

96+
* Brennan Kinney
97+
- refactor dockerfile: Change base Alpine (3.17) => openSUSE Leap (15.4)
98+
9399
* Magnus Larsen
94100
- SSL Labs Rating
95101

0 commit comments

Comments
 (0)