Skip to content

Commit ca57914

Browse files
committed
Reflect release status in Readme.md
... and amend / rearranged a few sentences
1 parent b4cdc37 commit ca57914

File tree

1 file changed

+15
-16
lines changed

1 file changed

+15
-16
lines changed

Readme.md

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,16 @@ cryptographic flaws.
1414
### Key features
1515

1616
* Clear output: you can tell easily whether anything is good or bad.
17-
* Machine readable output (CSV, two JSON formats)
17+
* Machine readable output (CSV, two JSON formats), also HTML output.
1818
* No need to install or to configure something. No gems, CPAN, pip or the like.
1919
* Works out of the box: Linux, OSX/Darwin, FreeBSD, NetBSD, MSYS2/Cygwin, WSL (bash on Windows). Only OpenBSD needs bash.
20-
* A Dockerfile is provided, there's also an official container build @ dockerhub.
20+
* A Dockerfile is provided, there's also an official container build @ dockerhub and GHCR.
2121
* Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only web servers at port 443.
2222
* Toolbox: Several command line options help you to run *your* test and configure *your* output.
2323
* Reliability: features are tested thoroughly.
2424
* Privacy: It's only you who sees the result, not a third party.
2525
* Freedom: It's 100% open source. You can look at the code, see what's going on.
26-
* The development is open (GitHub) and participation is welcome.
26+
* The development is open @ GitHub and participation is welcome.
2727

2828
### License
2929

@@ -39,22 +39,23 @@ to get bugfixes, other feedback and more contributions.
3939

4040
Testssl.sh is working on every Linux/BSD distribution out of the box. Latest by 2.9dev
4141
most of the limitations of disabled features from the openssl client are gone
42-
due to bash-socket-based checks. As a result you can also use e.g. LibreSSL or OpenSSL >=
43-
1.1.1 . testssl.sh also works on other unixoid systems out of the box, supposed they have
42+
due to bash-socket-based checks. An old OpenSSL-bad version is supplied but
43+
but you can also use any LibreSSL or OpenSSL version.
44+
testssl.sh also works on other unixoid systems out of the box, supposed they have
4445
`/bin/bash` >= version 3.2 and standard tools like sed and awk installed. An implicit
4546
(silent) check for binaries is done when you start testssl.sh . System V needs probably
4647
to have GNU grep installed. MacOS X and Windows (using MSYS2, Cygwin or WSL) work too.
4748

48-
Update notification here or @ [mastodon](https://infosec.exchange/@testssl) or [bluesky](https://bsky.app/profile/testssl.bsky.social). Please note the [twitter](https://twitter.com/drwetter) account is not being used anymore.
49+
Update notification here or @ [mastodon](https://infosec.exchange/@testssl) or [bluesky](https://bsky.app/profile/testssl.bsky.social). [twitter](https://twitter.com/drwetter) is not being used anymore.
4950

5051
### Installation
5152

5253
You can download testssl.sh branch 3.2 just by cloning this git repository:
5354

5455
git clone --depth 1 https://github.com/testssl/testssl.sh.git
5556

56-
3.2 is now the latest branch which evolved from 3.1dev. It's in the release candidate phase and considered as stable.
57-
For the former stable version named oldstable please help yourself by downloading the [ZIP](https://codeload.github.com/testssl/testssl.sh/zip/v3.0.9) or [tar.gz](https://codeload.github.com/testssl/testssl.sh/tar.gz/v3.0.9) archive. Just ``cd`` to the directory created (=INSTALLDIR) and run it off there.
57+
3.2 is now the latest stable branch which evolved from 3.1dev. There will be one last bugfix release for the former stable version named old-stable, which will be 3.0.10.
58+
<!-- please help yourself by downloading the [ZIP](https://codeload.github.com/testssl/testssl.sh/zip/v3.0.9) or [tar.gz](https://codeload.github.com/testssl/testssl.sh/tar.gz/v3.0.9) archive. Just ``cd`` to the directory created (=INSTALLDIR) and run it off there. -->
5859

5960
#### Docker
6061

@@ -64,7 +65,7 @@ Testssl.sh has minimal requirements. As stated you don't have to install or buil
6465
docker run --rm -ti drwetter/testssl.sh <your_cmd_line>
6566
```
6667

67-
or from GHCR (GitHub Container Registry which supports more platforms: linux/amd64,linux/386,linux/arm64,linux/arm/v7,linux/arm/v6,linux/ppc64le):
68+
or from GHCR (GitHub Container Registry which supports more platforms: linux/amd64, linux/386, linux/arm64, linux/arm/v7, linux/arm/v6, linux/ppc64le):
6869

6970
```
7071
docker run --rm -it ghcr.io/testssl/testssl.sh <your_cmd_line>
@@ -86,11 +87,7 @@ Testssl.sh is intended to be used as a standalone CLI tool. While we tried to ap
8687

8788
### Status
8889

89-
We're currently in the release candidate phase for version 3.2. You should use it despite the label "RC". Bigger features will be developed in a separate branch before merged into a 3.3dev to avoid hiccups or inconsistencies.
90-
91-
Version 3.0.X receives bugfixes, labeled as 3.0.1, 3.0.2 and so on. This will happen until 3.2 is finally released.
92-
93-
Support for 2.9.5 has been dropped. Supported is >= 3.0.x only.
90+
This is the stable release version 3.2. Please use it **now**, as 3.0.x will not get any updates after 3.0.10, with the current manpower we only support n-1 versions. There will be soon a separate 3.3.dev branch where further development takes place before 3.4 becomes the stable version and 3.2 becomes old-stable.
9491

9592
### Documentation
9693

@@ -100,9 +97,11 @@ Support for 2.9.5 has been dropped. Supported is >= 3.0.x only.
10097

10198
### Contributing
10299

103-
Contributions are welcome! See [CONTRIBUTING.md](https://github.com/testssl/testssl.sh/blob/3.2/CONTRIBUTING.md) for details. Please also have a look at the [Coding Convention](https://github.com/testssl/testssl.sh/blob/3.2/Coding_Convention.md). A lot of contributors already helped to push the project where it currently is, see [CREDITS.md](https://github.com/testssl/testssl.sh/blob/3.2/CREDITS.md). We still you use your help now. A start would be look for issues which are labeled as [good first issue](https://github.com/testssl/testssl.sh/issues?q=is%3Aissue+is%3Aopen+label%3A%22good+first+issue%22), [for grabs](https://github.com/testssl/testssl.sh/issues?q=is%3Aissue+is%3Aopen+label%3A%22for+grabs%22) or [help wanted](https://github.com/testssl/testssl.sh/issues?q=is%3Aissue+is%3Aopen+label%3A%22help+wanted%22). The latter is more advanced.
100+
A lot of contributors already helped to push the project where it currently is, see [CREDITS.md](https://github.com/testssl/testssl.sh/blob/3.2/CREDITS.md). Your contributions would be also welcome! Theres a [large to-do list](https://github.com/testssl/testssl.sh/issues). To get started look for issues which are labeled as [good first issue](https://github.com/testssl/testssl.sh/issues?q=is%3Aissue+is%3Aopen+label%3A%22good+first+issue%22), [for grabs](https://github.com/testssl/testssl.sh/issues?q=is%3Aissue+is%3Aopen+label%3A%22for+grabs%22) or [help wanted](https://github.com/testssl/testssl.sh/issues?q=is%3Aissue+is%3Aopen+label%3A%22help+wanted%22). The latter is more advanced, you can also lookout for documentation issues.
101+
102+
It is recommended to read [CONTRIBUTING.md](https://github.com/testssl/testssl.sh/blob/3.2/CONTRIBUTING.md) and please also have a look at he [Coding Convention](https://github.com/testssl/testssl.sh/blob/3.2/Coding_Convention.md). Before you start writing patches with hundreds of lines, better create an issue first.
104103

105-
In general there's some maintenance burden, like maintaining handshakes and CA stores, writing unit tests, improving github actions. If you believe you can contribute, speak up.
104+
In general there's also some maintenance burden, like maintaining handshakes and CA stores, writing unit tests, improving github actions. If you believe you can contribute and be responsible to one of those maintenance task, please speak up. That would free ressources that we could use for development.
106105

107106

108107
### Bug reports

0 commit comments

Comments
 (0)