2
0
mirror of https://github.com/mozilla/cipherscan.git synced 2024-11-25 07:23:41 +01:00
Commit Graph

425 Commits

Author SHA1 Message Date
Jan Brasna
de1a292d1c
Update sigalg analyze from guidelines 2024-11-18 00:41:57 +01:00
Jan Brasna
ac02a7d3f1
Fix failure for old protocols, int+modern ordering and kx 2024-11-18 00:09:34 +01:00
Jan Brasna
ecdc24b057
Update sstls version to 5.7 2024-11-17 23:23:47 +01:00
Jan Brasna
7ac858cb33
Update local fallback sstls snapshot from 4.0 to 5.7 2024-11-17 23:20:39 +01:00
Hubert Kario
5866911b62
Merge pull request #190 from genodeftest/patch-1
README: Remove e-mail address
2024-01-29 12:59:05 +01:00
Christian Stadelmann
4a4e47e599
README: Remove e-mail address
I don't want to be mentioned with my e-mail address, please remove it.
2024-01-27 19:13:11 +01:00
Greg Guthe
c67f3ee51b
Merge pull request #177 from Mozilla-GitHub-Standards/master
Add Mozilla Code of Conduct
2021-01-21 11:29:59 -05:00
Julien Vehent
885b345930
Merge pull request #184 from spanglerco/analyze-inter
analyze.py: Fix intermediate configuration detection
2020-03-12 07:51:20 -04:00
Paul Spangler
0c6f41ddc6
analyze.py: Fix intermediate configuration detection
Use the openssl_ciphers key instead of openssl_ciphersuites
since we compare against ciphers being used. Remove hardcoded
assumptions about TLS 1.1 and AES being required. Use the
server_preferred_order key instead of assuming server order
for ciphers.
2019-10-29 10:17:58 -05:00
Hubert Kario
ff8eac48c3
Merge pull request #181 from dchandekstark/issue-180
Fixes #180
2019-07-26 18:27:32 +02:00
David Chandek-Stark
ea341f0aec Fixes #180 2019-07-08 15:32:35 -04:00
Mozilla-GitHub-Standards
3ff37c500a Add Mozilla Code of Conduct file
Fixes #176.

_(Message COC002)_
2019-03-27 21:17:21 -07:00
Julien Vehent [:ulfr]
edfec2c1c6
Merge pull request #170 from tomato42/tweak-phrasing
de-engrishify error message
2018-12-12 10:23:04 -05:00
Hubert Kario
3186212159 de-engrishify error message 2018-12-12 16:08:54 +01:00
Julien Vehent [:ulfr]
dced87353e
Merge pull request #161 from tomato42/phrasing-in-analyze.py
tweak phrasing for analyze.py report
2018-12-12 07:26:27 -05:00
Julien Vehent [:ulfr]
3f8a71b128
Merge pull request #160 from tomato42/badge
add travis badge
2018-12-12 07:25:27 -05:00
Julien Vehent [:ulfr]
c34dc7e17a
Merge pull request #166 from pancho-villa/master
Changes analyze.py to be compatible with python3
2018-12-12 07:25:12 -05:00
Adam Garcia
acfae638a3 Changes analyze.py to be compatible with python3 2018-08-28 14:18:52 -07:00
Hubert Kario
981ac390d6 tweak phrasing for analyze.py report
for intermediate and modern, we expect the server to support exact
set of curves, reflect that in the error message
2018-05-20 14:31:09 +02:00
Hubert Kario
32fb9a63c3 add travis badge
we have a CI* so let's advertise it!

 * - terms and conditions may apply ;)
2018-05-20 14:24:18 +02:00
Julien Vehent [:ulfr]
b0548dff8e
Merge pull request #149 from tomato42/bash-env-fix
make shell scripts respect PATH
2018-05-19 19:56:27 -04:00
Julien Vehent [:ulfr]
a614389861
Merge pull request #156 from tomato42/spaces-in-path
support spaces in openssl path
2018-05-19 19:55:57 -04:00
Julien Vehent [:ulfr]
1df1377f6c
Merge pull request #157 from mozilla/jvehent-patch-1
Create .travis.yml
2018-05-19 19:55:31 -04:00
Julien Vehent [:ulfr]
9681b2f615
Create .travis.yml 2018-05-19 19:54:18 -04:00
Hubert Kario
4890e26910 support spaces in openssl path
fixes #78
2018-05-19 20:25:43 +02:00
Hubert Kario
31761fa7b2 make shell scripts respect PATH
use the bash from PATH, not from /bin

fixes #141
2018-05-13 19:33:05 +02:00
Hubert Kario
528e94d613
Merge pull request #143 from luigiJsonar/patch-1
README.md typo
2017-11-21 01:33:44 +01:00
Luigi Labigalini
fda447a5a8
README.md typo 2017-11-16 12:02:33 -08:00
Hubert Kario
cb6e027327
Merge pull request #142 from ebabani/master
Redirect dependency download output to stderr
2017-11-13 12:12:29 +01:00
Ergin Babani
3ecd5c5895 Redirect dependency download output to stderr
If running `analyze.py` for the first time the dependency downloading
output would be part of the json, and the command would fail due to
invalid json data.
2017-11-07 13:18:10 -05:00
Hubert Kario
17dcd0dc05 Merge pull request #138 from sunshuzhou/patch-1
Update cipherscan
2017-05-03 14:57:32 +02:00
Sun Shuzhou
2204ec21e9 Update cipherscan 2017-05-03 09:03:32 +08:00
Sun Shuzhou
c23d1ba64a Update cipherscan 2017-05-02 21:38:03 +08:00
Hubert Kario
e9f3df4e9f Merge pull request #135 from Jiab77/patch-1
Fixed symbolic link creation error and git output supression
2017-01-23 16:16:27 +01:00
Jonathan Barda
0b1d5331d6 Added requested changes
I may change `${BASH_SOURCE[0]}` by ` `basename $BASH_SOURCE` ` if you prefer
2017-01-23 16:12:34 +01:00
Jonathan Barda
717b9c0a13 Adapted changes as requested
Added some detail when required libraries are not present on the host and needs downloading
2017-01-23 15:27:04 +01:00
Jonathan Barda
5fd2e95c4d Few fixes
Added `&>/dev/null` on git commands to suppress their output
Fixed the symbolic link creation that pointed to non existent path. `ecdsa` folder moved to `src/ecdsa`
2017-01-23 07:36:24 +01:00
Julien Vehent [:ulfr]
757bfefc6d Merge pull request #134 from tycho/fix-benchmark-output
fix -b (benchmark) output
2017-01-13 16:19:56 -05:00
Julien Vehent [:ulfr]
1f2846d54e Merge pull request #131 from castillar/master
Added info about OpenSSL proxy option to cipherscan script.
2017-01-13 16:15:15 -05:00
Julien Vehent [:ulfr]
6d66214fd1 Merge pull request #124 from firesock/master
Allow EC keys to have a smaller bitsize
2017-01-13 16:14:33 -05:00
Julien Vehent [:ulfr]
b1d37bf26d Merge pull request #128 from tomato42/intolerance-tests
TLS version (in)tolerance scanner
2017-01-13 16:07:44 -05:00
Steven Noonan
981cf0744e cipherscan: fix benchmark mode output
The microsecond measurement column wasn't being rendered.

Signed-off-by: Steven Noonan <steven@uplinklabs.net>
2017-01-01 14:15:23 -08:00
Steven Noonan
532ff712aa cipherscan: always define a curves_ordering column value
Signed-off-by: Steven Noonan <steven@uplinklabs.net>
2017-01-01 14:15:23 -08:00
Jos Purvis
c6934569bd Update to fix OpenSSL version in info message 2016-12-02 21:07:24 -05:00
Jos Purvis
3fc28b001c Added info about OpenSSL proxy option to cipherscan script. 2016-12-02 12:29:44 -05:00
Hubert Kario
fb8b4d73bf interpreting the intolerance data 2016-10-11 22:46:02 +02:00
Hubert Kario
45bb7d0c28 TLS version (in)tolerance scanner
Since it is impossible to make openssl command line tool send
TLSv1.3 Client Hello message, add a python based tool to perform
TLS version intolerance scan
2016-10-05 01:00:11 +02:00
Julien Vehent [:ulfr]
e5b747d29b Merge pull request #125 from tomato42/sort-cas-by-usage
sort CA's by count, not name
2016-09-30 15:30:48 -04:00
Julien Vehent [:ulfr]
197881da81 Merge pull request #126 from tomato42/npn
Add support for collecting supported NPN protocols
2016-09-17 08:11:03 -04:00
Hubert Kario
6a906a6267 add support for collecting supported NPN protocols 2016-09-16 23:06:34 +02:00