You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: CHANGELOG.md
-5
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,6 @@
32
32
* Added --reqheader to support custom headers in HTTP requests
33
33
* Test for support for RFC 8879 certificate compression
34
34
35
-
36
35
### Features implemented / improvements in 3.0
37
36
38
37
* Full support of TLS 1.3, shows also drafts supported
@@ -115,7 +114,6 @@
115
114
* Postgres und MySQL STARTTLS support
116
115
* Man page
117
116
118
-
119
117
### New in 2.8
120
118
121
119
* Trust chain check against certificate stores from Apple (OS), Linux (OS),
@@ -169,7 +167,6 @@
169
167
170
168
Full log @ https://github.com/drwetter/testssl.sh/commits/2.6/testssl.sh
171
169
172
-
173
170
### New in 2.4
174
171
* "only one cmd line option at a time" is completely gone
175
172
* several tuning parameters on the cmd line (only available through environment variables b4): --assuming-http, --ssl-native, --sneaky, --warnings, --color, -- debug, --long
@@ -324,7 +321,6 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
324
321
- fix for netweaver banner (server is lowercase)
325
322
- no server banner is no disadvantage (color code)
326
323
327
-
328
324
1.89
329
325
- reordered! : protocols + cipher come first
330
326
- colorized preferred server preference (e.g. CBC+RC4 is light red now, TLSv1.2 green)
@@ -471,7 +467,6 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
471
467
default now and there's a comment
472
468
* openssl version + path to it in the banner
473
469
474
-
475
470
1.20
476
471
* bugfix (ssl in ssl handshake failure is sometimes too much)
Copy file name to clipboardexpand all lines: CONTRIBUTING.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ Note please the following
10
10
* Document your PR, both in the PR and/or commit message and in the code.
11
11
* Please test your changes thoroughly as reliability is important for this project. You may want to check different servers with different settings.
12
12
* Travis runs automatically when anything is committed/PR'd. You should check any complains from Travis. Beforehand you can check with `prove -v`.
13
-
* If it's a new feature please consider writing a unit test for it. You can use e.g. `t/20_baseline_ipv4_http.t` as a template. The general documentation for [Test::More](https://perldoc.perl.org/Test/More.html) is a good start.
13
+
* If it's a new feature please consider writing a unit test for it. You can use e.g. `t/20_baseline_ipv4_http.t` as a template. The general documentation for [Test::More](https://perldoc.perl.org/Test/More.html) is a good start.
14
14
* If it's a new feature it would need to be documented in the appropriate section in `help()` and in `~/doc/testssl.1.md`
15
15
16
16
For questions just open an issue or feel free to send me an e-mail.
Copy file name to clipboardexpand all lines: Coding_Convention.md
+1-2
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ Bash is actually quite powerful -- not only with respect to sockets. It's not as
47
47
* Watch out for any input especially (but not only) supplied from the server. Input should never be trusted.
48
48
* Unless you're really sure where the values come from, variables need to be put in quotes.
49
49
* You can use `safe_echo()` when processing input which does some input validation.
50
-
*Use ``out()`` or similar output functions when writing something back to the user.
50
+
* Use ``out()`` or similar output functions when writing something back to the user.
51
51
* Use `$OPENSSL` instead of `openssl`. The latter is highly system depended and also $OPENSSL is a binary which capabilities are checked internally before using it, independent whether the supplied one is being used or another one.
52
52
53
53
#### Variables
@@ -70,4 +70,3 @@ Bash is actually quite powerful -- not only with respect to sockets. It's not as
70
70
* Unit tests are done automatically done with Perl using Travis. The trigger is `~/.travis.yml`. The general documentation for [Test::More](https://perldoc.perl.org/Test/More.html) is a good start. You are encouraged to write own checks. You can use e.g. `t/20_baseline_ipv4_http.t` as an example.
71
71
* If it's an OpenSSL feature you want to use and it could be not available for older OpenSSL versions testssl.sh needs to find out whether OpenSSL has that feature. Best do this with OpenSSL itself and not by checking the version as some vendors do backports. See the examples for `HAS_SSL2` or proxy option check of OpenSSL in `check_proxy()`.
72
72
* If a feature of OpenSSL is not available you need to tell this the user by using `pr_warning*()`. Or accordingly with `fatal()` if a continuation of the program doesn't make sense anymore.
Copy file name to clipboardexpand all lines: Readme.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -73,9 +73,9 @@ For more please consult [Dockerfile.md](https://github.com/drwetter/testssl.sh/b
73
73
74
74
### Status
75
75
76
-
We're currently in the development phase, version 3.1dev. 3.1dev will eventually become 3.2. Bigger features are developed in a separate branch before merged into 3.1dev to avoid hiccups or inconsistencies. Albeit we try to keep 3.1dev as solid as possible things will certainly change in 3.1dev. Think of the 3.1dev branch like a rolling release. So if you need stability the 3.0 branch is better for you.
76
+
We're currently in the development phase, version 3.1dev. 3.1dev will eventually become 3.2. Bigger features are developed in a separate branch before merged into 3.1dev to avoid hiccups or inconsistencies. Albeit we try to keep 3.1dev as solid as possible things will certainly change in 3.1dev. Think of the 3.1dev branch like a rolling release. So if you need stability the 3.0 branch is better for you.
77
77
78
-
Version 3.0.X receives bugfixes, labeled as 3.0.1, 3.0.2 and so on. This will happen until 3.2 is released.
78
+
Version 3.0.X receives bugfixes, labeled as 3.0.1, 3.0.2 and so on. This will happen until 3.2 is released.
79
79
80
80
Support for 2.9.5 has been dropped. Supported is >= 3.0.x only.
Copy file name to clipboardexpand all lines: bin/Readme.md
+14-16
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ All the precompiled binaries provided here have extended support for
6
6
everything which is normally not in OpenSSL or LibreSSL -- 40+56 Bit,
7
7
export/ANON ciphers, weak DH ciphers, weak EC curves, SSLv2 etc. -- all the dirty
8
8
features needed for testing. OTOH they also come with extended support
9
-
for new / advanced cipher suites and/or features which are not in the
9
+
for new / advanced cipher suites and/or features which are not in the
10
10
official branch like (old version of the) CHACHA20+POLY1305 and CAMELLIA 256 bit ciphers.
11
11
They also have IPv6 support, see below.
12
12
@@ -17,17 +17,17 @@ fork (https://github.com/PeterMosmans/openssl). Thx a bunch, Peter!
17
17
Compiled Linux and FreeBSD binaries so far come from Dirk, other
18
18
contributors see ../CREDITS.md .
19
19
20
-
**I discontinued to upload the not commonly used binaries at GitHub ** (ARM7l, Darwin.i386 and all except one kerberos compiles) **as it is not very appropriate to use GitHub especially for those. The main site for all
20
+
**I discontinued to upload the not commonly used binaries at GitHub ** (ARM7l, Darwin.i386 and all except one kerberos compiles) **as it is not very appropriate to use GitHub especially for those. The main site for all
21
21
binaries is https://testssl.sh/openssl-1.0.2i-chacha.pm.ipv6.contributed/, also see the tarball @
Copy file name to clipboardexpand all lines: etc/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ The certificate trust stores were retrieved from
14
14
--> "Keychain Access" (2 click). In that window --> "Keychains" --> "System"
15
15
--> "Category" --> "All Items"
16
16
Select all CA certificates except for Developer ID Certification Authority, "File" --> "Export Items"
17
-
2.__Internet:__ Pick the latest subdir (=highest number) from https://opensource.apple.com/source/security_certificates/. They are in DER format despite their file extension. Download them with ``wget --level=1 --cut-dirs=5 --mirror --convert-links --adjust-extension --page-requisites --no-parent https://opensource.apple.com/source/security_certificates/security_certificates-*/certificates/roots/``
17
+
2.__Internet:__ Pick the latest subdir (=highest number) from https://opensource.apple.com/source/security_certificates/. They are in DER format despite their file extension. Download them with ``wget --level=1 --cut-dirs=5 --mirror --convert-links --adjust-extension --page-requisites --no-parent https://opensource.apple.com/source/security_certificates/security_certificates-*/certificates/roots/``
18
18
19
19
20
20
Google Chromium uses basically the trust stores above, see https://www.chromium.org/Home/chromium-security/root-ca-policy.
Copy file name to clipboardexpand all lines: etc/client-simulation.wiresharked.md
-4
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,3 @@ The whole process is done manually.
22
22
* "ciphersutes" are TLS 1.3 ciphersuites. You can identify them as they currently are like 0x130?. Retrieve them from above see ``~/utils/hexstream2cipher.sh``
23
23
* Figure out the services by applying a good piece of human logic
24
24
* Before submitting a PR: test it yourself! You can also watch it again via wireshark
0 commit comments