You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@
16
16
* Socket timeouts (``--connect-timeout``)
17
17
* IDN/IDN2 servername/URI + emoji support, supposed libidn/idn2 is installed and DNS resolver is recent) support
18
18
* Initial support for certificate compression
19
-
* Better JSON output: renamed IDs and findings shorter/better parsable, also includes certficate
19
+
* Better JSON output: renamed IDs and findings shorter/better parsable, also includes certificate
20
20
* JSON output now valid also for non-responding servers
21
21
* Testing now per default 370 ciphers
22
22
* Further improving the robustness of TLS sockets (sending and parsing)
@@ -61,7 +61,7 @@
61
61
62
62
* Way better coverage of ciphers as most checks are done via bash sockets where ever possible
63
63
* Further tests via TLS sockets and improvements (handshake parsing, completeness, robustness)
64
-
* Testing 359 default ciphers (``testssl.sh -e/-E``) with a mixture of sockets and openssl. Same speed as with openssl only but addtional ciphers such as post-quantum ciphers, new CHAHA20/POLY1305, CamelliaGCM etc.
64
+
* Testing 359 default ciphers (``testssl.sh -e/-E``) with a mixture of sockets and openssl. Same speed as with openssl only but additional ciphers such as post-quantum ciphers, new CHAHA20/POLY1305, CamelliaGCM etc.
65
65
* TLS 1.2 protocol check via sockets in production
66
66
* Finding more TLS extensions via sockets
67
67
* TLS Supported Groups Registry (RFC 7919), key shares extension
@@ -105,7 +105,7 @@
105
105
* Even more compatibility improvements for FreeBSD, NetBSD, Gentoo, RH-ish, F5 and Cisco systems
106
106
* Considerable speed improvements for each cipher runs (-e/-E)
107
107
* More robust SSLv2 + TLS socket interface
108
-
*seperate check for curves
108
+
*separate check for curves
109
109
* OpenSSL 1.1.0 compliant
110
110
* check for DROWN
111
111
* Whole number of bugs squashed
@@ -124,7 +124,7 @@
124
124
* (HTTP) proxy support! Also with sockets -- thx @jnewbigin
125
125
* Extended validation certificate detection
126
126
* Run in default mode through all ciphers at the end of a default run
127
-
* will test multiple IP adresses of one supplied server name in one shot, --ip= restricts it accordingly
127
+
* will test multiple IP addresses of one supplied server name in one shot, --ip= restricts it accordingly
128
128
* new mass testing file option --file option where testssl.sh commands are being read from, see https://twitter.com/drwetter/status/627619848344989696
129
129
* TLS time and HTTP time stamps
130
130
* TLS time displayed also for STARTTLS protocols
@@ -193,10 +193,10 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
193
193
- IPv6 display fix
194
194
195
195
1.111
196
-
- NEW: tested unter FreeBSD (works with exception of xxd in CCS)
196
+
- NEW: tested under FreeBSD (works with exception of xxd in CCS)
197
197
- getent now works under Linux and FreeBSD
198
198
- sed -i in hsts sacrificed for compatibility
199
-
-reomved query for IP for finishing banner, is now called once in parse_hn_port
199
+
-removed query for IP for finishing banner, is now called once in parse_hn_port
200
200
- GOST warning after banner
201
201
- empty build date is not displayed anymore
202
202
- long build date strings minimized
@@ -286,7 +286,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
286
286
1.91
287
287
- replaced most lcyan to brown (=not really bad but somehow)
288
288
- empty server string better displayed
289
-
-prefered CBC TLS 1.2 cipher is now brown (lucky13)
289
+
-preferred CBC TLS 1.2 cipher is now brown (lucky13)
290
290
291
291
1.90
292
292
- fix for netweaver banner (server is lowercase)
@@ -295,7 +295,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
295
295
296
296
1.89
297
297
- reordered! : protocols + cipher come first
298
-
- colorized prefered server preference (e.g. CBC+RC4 is light red now, TLSv1.2 green)
298
+
- colorized preferred server preference (e.g. CBC+RC4 is light red now, TLSv1.2 green)
299
299
- SSLv3 is now light cyan
300
300
- NEW: -P|--preference now in help menu
301
301
- light cyan is more appropriate than red for HSTS
@@ -330,10 +330,10 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
330
330
- headline of -V / PFS+RC4 ciphers unified
331
331
332
332
1.82
333
-
- NEW: output for -V now better (bits seperate, spacing improved)
333
+
- NEW: output for -V now better (bits separate, spacing improved)
334
334
335
335
1.81
336
-
- output for RC4+PFS now better (with headline, bits seperate, spacing improved)
336
+
- output for RC4+PFS now better (with headline, bits separate, spacing improved)
337
337
- both also sorted by encr. strength .. umm ..err bits!
338
338
339
339
1.80
@@ -358,7 +358,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
358
358
- removed legacy code (PROD_REL var)
359
359
360
360
1.76
361
-
- bash was gone!! desaster for Ubuntu, fixed
361
+
- bash was gone!! disaster for Ubuntu, fixed
362
362
- starttls+rc4 check: bottom line was wrong
363
363
- starttls had too much output (certificate) at first a/v check
364
364
@@ -454,7 +454,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
454
454
* NOPARANOID flag tells whether medium grade ciphers are ok. NOW they are (=<1.17 was paranoid)
455
455
456
456
1.17
457
-
* SSL tests now for renegotiation vulnerabilty!
457
+
* SSL tests now for renegotiation vulnerability!
458
458
* version detection of testssl.sh
459
459
* program has a banner
460
460
* fixed bug leading to a file named "1"
@@ -480,7 +480,7 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
480
480
* as a courtesy I am providing 64+32 Linux binaries for testing 56 Bit ciphers
481
481
482
482
1.11
483
-
* Hint for howto enable 56 Bit ciphers fpr testing
483
+
* Hint for howto enable 56 Bit ciphers for testing
484
484
* possible to specify where openssl is (hardcoded, $ENV, last resort: auto)
Copy file name to clipboardExpand all lines: Readme.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ cryptographic flaws.
13
13
* Clear output: you can tell easily whether anything is good or bad.
14
14
* Machine readable output.
15
15
* No installation needed: Linux, OSX/Darwin, FreeBSD, NetBSD, MSYS2/Cygwin, WSL work out of the box. Only OpenBSD needs bash. No need to install or to configure something. No gems, CPAN, pip or the like.
16
-
* A Dockerfile is provided, there's also an offical container @ dockerhub.
16
+
* A Dockerfile is provided, there's also an official container @ dockerhub.
17
17
* Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only web servers at port 443.
18
18
* Toolbox: Several command line options help you to run *your* test and configure *your* output.
19
19
* Reliability: features are tested thoroughly.
@@ -49,7 +49,7 @@ You can download testssl.sh by cloning this git repository:
For the stable version help yourself by downloading the [ZIP](https://codeload.github.com/drwetter/testssl.sh/zip/3.0.5) or the lastest testssl-3.0.X.tar.gz from [https://testssl.sh](https://testssl.sh/) archive. Just ``cd`` to the directory created (=INSTALLDIR) and run it off there.
52
+
For the stable version help yourself by downloading the [ZIP](https://codeload.github.com/drwetter/testssl.sh/zip/3.0.5) or the latest testssl-3.0.X.tar.gz from [https://testssl.sh](https://testssl.sh/) archive. Just ``cd`` to the directory created (=INSTALLDIR) and run it off there.
Copy file name to clipboardExpand all lines: doc/testssl.1
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -122,7 +122,7 @@ Please note that \fBfname\fR has to be in Unix format\. DOS carriage returns won
122
122
\fB\-\-mode<serial|parallel>\fR\. Mass testing to be done serial (default) or parallel (\fB\-\-parallel\fR is shortcut for the latter, \fB\-\-serial\fR is the opposite option)\. Per default mass testing is being run in serial mode, i\.e\. one line after the other is processed and invoked\. The variable \fBMASS_TESTING_MODE\fR can be defined to be either equal \fBserial\fR or \fBparallel\fR\.
123
123
.
124
124
.P
125
-
\fB\-\-warnings<batch|off>\fR\. The warnings parameter determines how testssl\.sh will deal with situations where user input normally will be necessary\. There are two options\.\fBbatch\fR doesn\'t wait for a confirming keypress when a client\- or server\-side probem is encountered\. As of 3\.0 it just then terminates the particular scan\. This is automatically chosen for mass testing (\fB\-\-file\fR)\.\fBoff\fR just skips the warning, the confirmation but continues the scan, independent whether it makes sense or not\. Please note that there are conflicts where testssl\.sh will still ask for confirmation which are the ones which otherwise would have a drastic impact on the results\. Almost any other decision will be made in the future as a best guess by testssl\.sh\. The same can be achieved by setting the environment variable \fBWARNINGS\fR\.
125
+
\fB\-\-warnings<batch|off>\fR\. The warnings parameter determines how testssl\.sh will deal with situations where user input normally will be necessary\. There are two options\.\fBbatch\fR doesn\'t wait for a confirming keypress when a client\- or server\-side problem is encountered\. As of 3\.0 it just then terminates the particular scan\. This is automatically chosen for mass testing (\fB\-\-file\fR)\.\fBoff\fR just skips the warning, the confirmation but continues the scan, independent whether it makes sense or not\. Please note that there are conflicts where testssl\.sh will still ask for confirmation which are the ones which otherwise would have a drastic impact on the results\. Almost any other decision will be made in the future as a best guess by testssl\.sh\. The same can be achieved by setting the environment variable \fBWARNINGS\fR\.
126
126
.
127
127
.P
128
128
\fB\-\-connect\-timeout<seconds>\fR This is useful for socket TCP connections to a node\. If the node does not complete a TCP handshake (e\.g\. because it is down or behind a firewall or there\'s an IDS or a tarpit) testssl\.sh may usually hang for around 2 minutes or even much more\. This parameter instructs testssl\.sh to wait at most \fBseconds\fR for the handshake to complete before giving up\. This option only works if your OS has a timeout binary installed\. CONNECT_TIMEOUT is the corresponding environment variable\.
\fB\-g,\-\-grease\fR checks several server implementation bugs like tolerance to size limitations and GREASE, see https://www\.ietf\.org/archive/id/draft\-ietf\-tls\-grease\-01\.txt \. This checks doesn\'t run per default\.
336
336
.
337
337
.SS "VULNERABILITIES"
338
-
\fB\-U,\-\-vulnerable,\-\-vulnerabilities\fR Just tests all (of the following) vulnerabilities\. The environment variable \fBVULN_THRESHLD\fR determines after which value a separate headline for each vulnerability is being displayed\. Default is \fB1\fR which means if you check for two vulnerabilities, only the general headline for vulnerabilities section is displayed \-\- in addition to the vulnerability and the result\. Otherwise each vulnerability or vulnerability section gets its own headline in addition to the output of the name of the vulnerabilty and test result\. A vulnerability section is comprised of more than one check, e\.g\. the renegotiation vulnerability check has two checks, so has Logjam\.
338
+
\fB\-U,\-\-vulnerable,\-\-vulnerabilities\fR Just tests all (of the following) vulnerabilities\. The environment variable \fBVULN_THRESHLD\fR determines after which value a separate headline for each vulnerability is being displayed\. Default is \fB1\fR which means if you check for two vulnerabilities, only the general headline for vulnerabilities section is displayed \-\- in addition to the vulnerability and the result\. Otherwise each vulnerability or vulnerability section gets its own headline in addition to the output of the name of the vulnerability and test result\. A vulnerability section is comprised of more than one check, e\.g\. the renegotiation vulnerability check has two checks, so has Logjam\.
339
339
.
340
340
.P
341
341
\fB\-H,\-\-heartbleed\fR Checks for Heartbleed, a memory leakage in openssl\. Unless the server side doesn\'t support the heartbeat extension it is likely that this check runs into a timeout\. The seconds to wait for a reply can be adjusted with \fBHEARTBLEED_MAX_WAITSOCK\fR\. 8 is the default\.
@@ -622,7 +622,7 @@ MAX_SOCKET_FAIL: A number which tells testssl\.sh how often a TCP socket connect
622
622
MAX_OSSL_FAIL: A number which tells testssl\.sh how often an OpenSSL s_client connect may fail before the program gives up and terminates\. The default is 2\. You can increase it to a higher value if you frequently see a message like \fIFatalerror:repeatedTCPconnectproblems,givingup\fR\.
623
623
.
624
624
.IP"\(bu"4
625
-
MAX_HEADER_FAIL: A number which tells testssl\.sh how often a HTTP GET request over OpenSSL may return an empty file before the program gives up and terminates\. The default is 3\. Also here you can incerase the threshold when you spot messages like \fIFatalerror:repeatedHTTPheaderconnectproblems,doesn\'tmakesensetocontinue\fR\.
625
+
MAX_HEADER_FAIL: A number which tells testssl\.sh how often a HTTP GET request over OpenSSL may return an empty file before the program gives up and terminates\. The default is 3\. Also here you can increase the threshold when you spot messages like \fIFatalerror:repeatedHTTPheaderconnectproblems,doesn\'tmakesensetocontinue\fR\.
0 commit comments