You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
prln_warning "not having provided client certificate and private key file, the client x509-based authentication prevents this from being tested"
17066
+
fileout "$jsonID" "WARN" "not having provided client certificate and private key file, the client x509-based authentication prevents this from being tested"
prln_warning "client x509-based authentication prevents this from being tested"
17318
-
fileout "$jsonID" "WARN" "client x509-based authentication prevents this from being tested" "$cve" "$cwe"
17345
+
if [[ "$CLIENT_AUTH" == required ]] && [[ -z "$MTLS" ]]; then
17346
+
prln_warning "not having provided client certificate and private key file, the client x509-based authentication prevents this from being tested"
17347
+
fileout "$jsonID" "WARN" "not having provided client certificate and private key file, the client x509-based authentication prevents this from being tested" "$cve" "$cwe"
17319
17348
return 7
17320
17349
fi
17321
17350
@@ -20500,6 +20529,7 @@ tuning / connect options (most also can be preset via environment variables):
20500
20529
--ids-friendly skips a few vulnerability checks which may cause IDSs to block the scanning IP
20501
20530
--phone-out allow to contact external servers for CRL download and querying OCSP responder
20502
20531
--add-ca <CA files|CA dir> path to <CAdir> with *.pem or a comma separated list of CA files to include in trust check
20532
+
--mtls <CLIENT CERT file> path to <CLIENT CERT> file, it must be in PEM format and contain client certificate with certificate key (not encrypted)
20503
20533
--basicauth <user:pass> provide HTTP basic auth information.
grep -q 'BEGIN CERTIFICATE' "$fname" || fatal_cmd_line "\"$fname\" is not CA file in PEM format" $ERR_RESOURCE
23886
23920
done
23887
23921
23922
+
# Check if mTLS has been selected, and if the correct client auth PEM file has been provided by user
23923
+
if [[ ! -z "$MTLS" ]]; then
23924
+
if [[ -f $MTLS ]]; then
23925
+
grep -q 'BEGIN CERTIFICATE' "$MTLS" || fatal_cmd_line "\"$MTLS\" is not a client certificate file in PEM format" $ERR_RESOURCE
23926
+
grep -q 'BEGIN PRIVATE KEY\|BEGIN RSA PRIVATE KEY' "$MTLS" || fatal_cmd_line "\"$MTLS\" the not encrypted private key is missing in the specified PEM file" $ERR_RESOURCE
23927
+
MTLS=$MTLS
23928
+
else
23929
+
[[ -s "$MTLS" ]] || fatal_cmd_line "the specified client certificate file \"$MTLS\" does not exist" $ERR_RESOURCE
23930
+
fi
23931
+
fi
23932
+
23888
23933
"$FAST" && pr_warning "\n'--fast' can have some undesired side effects thus it is not recommended to use anymore\n"
23889
23934
"$SSL_NATIVE" && pr_warning "\nusage of '--ssl-native' is not recommended as it will return incomplete and may even return incorrect results\n"
0 commit comments