Skip to content

Commit b1f5c6c

Browse files
committed
Trim excess whitespace
1 parent 6782e2a commit b1f5c6c

12 files changed

+28
-41
lines changed

.github/ISSUE_TEMPLATE/bug_report.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ A clear and concise description of what you expected to happen.
2525
- Version: ``testssl.sh -b 2>/dev/null | head -4 | tail -2``
2626
- Version if running from git repo: ``git log | head -1``
2727
- OpenSSL: ``testssl.sh -b 2>/dev/null | awk -F':' '/openssl/ { print $2}'``
28-
28+
2929

3030
**Additional context**
3131
Add any other context about the problem here.

.github/workflows/docker-3.1dev.yml

+5-5
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: docker-3.1dev
22

33
on:
44
push:
5-
branches:
5+
branches:
66
- 3.1dev
77
workflow_dispatch:
88
schedule:
@@ -19,12 +19,12 @@ jobs:
1919

2020
steps:
2121
- name: Source checkout
22-
uses: actions/[email protected]
23-
22+
uses: actions/[email protected]
23+
2424
- name: Setup QEMU
2525
id: qemu
2626
uses: docker/[email protected]
27-
27+
2828
- name: Setup Buildx
2929
id: buildx
3030
uses: docker/setup-buildx-action@v1
@@ -38,7 +38,7 @@ jobs:
3838
org.opencontainers.image.version=${{ env.BUILD_VERSION }}
3939
org.opencontainers.image.revision=${{ github.sha }}
4040
org.opencontainers.image.title=${{ github.repository }}
41-
41+
4242
- name: GitHub login
4343
if: ${{ github.event_name != 'pull_request' }}
4444
uses: docker/[email protected]

CHANGELOG.md

-5
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,6 @@
3232
* Added --reqheader to support custom headers in HTTP requests
3333
* Test for support for RFC 8879 certificate compression
3434

35-
3635
### Features implemented / improvements in 3.0
3736

3837
* Full support of TLS 1.3, shows also drafts supported
@@ -115,7 +114,6 @@
115114
* Postgres und MySQL STARTTLS support
116115
* Man page
117116

118-
119117
### New in 2.8
120118

121119
* Trust chain check against certificate stores from Apple (OS), Linux (OS),
@@ -169,7 +167,6 @@
169167

170168
Full log @ https://github.com/drwetter/testssl.sh/commits/2.6/testssl.sh
171169

172-
173170
### New in 2.4
174171
* "only one cmd line option at a time" is completely gone
175172
* several tuning parameters on the cmd line (only available through environment variables b4): --assuming-http, --ssl-native, --sneaky, --warnings, --color, -- debug, --long
@@ -324,7 +321,6 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
324321
- fix for netweaver banner (server is lowercase)
325322
- no server banner is no disadvantage (color code)
326323

327-
328324
1.89
329325
- reordered! : protocols + cipher come first
330326
- colorized preferred server preference (e.g. CBC+RC4 is light red now, TLSv1.2 green)
@@ -471,7 +467,6 @@ Full changelog @ https://github.com/drwetter/testssl.sh/commits/2.2/testssl.sh
471467
default now and there's a comment
472468
* openssl version + path to it in the banner
473469
474-
475470
1.20
476471
* bugfix (ssl in ssl handshake failure is sometimes too much)
477472
* date in output

CONTRIBUTING.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Note please the following
1010
* Document your PR, both in the PR and/or commit message and in the code.
1111
* Please test your changes thoroughly as reliability is important for this project. You may want to check different servers with different settings.
1212
* Travis runs automatically when anything is committed/PR'd. You should check any complains from Travis. Beforehand you can check with `prove -v`.
13-
* If it's a new feature please consider writing a unit test for it. You can use e.g. `t/20_baseline_ipv4_http.t` as a template. The general documentation for [Test::More](https://perldoc.perl.org/Test/More.html) is a good start.
13+
* If it's a new feature please consider writing a unit test for it. You can use e.g. `t/20_baseline_ipv4_http.t` as a template. The general documentation for [Test::More](https://perldoc.perl.org/Test/More.html) is a good start.
1414
* If it's a new feature it would need to be documented in the appropriate section in `help()` and in `~/doc/testssl.1.md`
1515

1616
For questions just open an issue or feel free to send me an e-mail.

Coding_Convention.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Bash is actually quite powerful -- not only with respect to sockets. It's not as
4747
* Watch out for any input especially (but not only) supplied from the server. Input should never be trusted.
4848
* Unless you're really sure where the values come from, variables need to be put in quotes.
4949
* You can use `safe_echo()` when processing input which does some input validation.
50-
* Use ``out()`` or similar output functions when writing something back to the user.
50+
* Use ``out()`` or similar output functions when writing something back to the user.
5151
* Use `$OPENSSL` instead of `openssl`. The latter is highly system depended and also $OPENSSL is a binary which capabilities are checked internally before using it, independent whether the supplied one is being used or another one.
5252

5353
#### Variables
@@ -70,4 +70,3 @@ Bash is actually quite powerful -- not only with respect to sockets. It's not as
7070
* Unit tests are done automatically done with Perl using Travis. The trigger is `~/.travis.yml`. The general documentation for [Test::More](https://perldoc.perl.org/Test/More.html) is a good start. You are encouraged to write own checks. You can use e.g. `t/20_baseline_ipv4_http.t` as an example.
7171
* If it's an OpenSSL feature you want to use and it could be not available for older OpenSSL versions testssl.sh needs to find out whether OpenSSL has that feature. Best do this with OpenSSL itself and not by checking the version as some vendors do backports. See the examples for `HAS_SSL2` or proxy option check of OpenSSL in `check_proxy()`.
7272
* If a feature of OpenSSL is not available you need to tell this the user by using `pr_warning*()`. Or accordingly with `fatal()` if a continuation of the program doesn't make sense anymore.
73-

Dockerfile

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ RUN apk update && \
55
apk add bash procps drill git coreutils libidn curl socat openssl xxd && \
66
rm -rf /var/cache/apk/* && \
77
addgroup testssl && \
8-
adduser -G testssl -g "testssl user" -s /bin/bash -D testssl && \
8+
adduser -G testssl -g "testssl user" -s /bin/bash -D testssl && \
99
ln -s /home/testssl/testssl.sh /usr/local/bin/ && \
1010
mkdir -m 755 -p /home/testssl/etc /home/testssl/bin
1111

@@ -14,7 +14,7 @@ WORKDIR /home/testssl/
1414

1515
COPY --chown=testssl:testssl etc/. /home/testssl/etc/
1616
COPY --chown=testssl:testssl bin/. /home/testssl/bin/
17-
COPY --chown=testssl:testssl testssl.sh /home/testssl/
17+
COPY --chown=testssl:testssl testssl.sh /home/testssl/
1818

1919
ENTRYPOINT ["testssl.sh"]
2020

Dockerfile.git

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ARG URL=https://github.com/drwetter/testssl.sh.git
1111
RUN test -n "${BUILD_VERSION}" \
1212
&& apk update \
1313
&& apk add --no-cache bash procps drill git coreutils libidn curl socat openssl xxd \
14-
&& git clone --depth 1 --branch ${BUILD_VERSION} $URL /home/testssl \
14+
&& git clone --depth 1 --branch ${BUILD_VERSION} $URL /home/testssl \
1515
&& addgroup testssl \
1616
&& adduser -G testssl -g "testssl user" -s /bin/bash -D testssl \
1717
&& ln -s /home/testssl/testssl.sh /usr/local/bin/ \

Readme.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ For more please consult [Dockerfile.md](https://github.com/drwetter/testssl.sh/b
7373

7474
### Status
7575

76-
We're currently in the development phase, version 3.1dev. 3.1dev will eventually become 3.2. Bigger features are developed in a separate branch before merged into 3.1dev to avoid hiccups or inconsistencies. Albeit we try to keep 3.1dev as solid as possible things will certainly change in 3.1dev. Think of the 3.1dev branch like a rolling release. So if you need stability the 3.0 branch is better for you.
76+
We're currently in the development phase, version 3.1dev. 3.1dev will eventually become 3.2. Bigger features are developed in a separate branch before merged into 3.1dev to avoid hiccups or inconsistencies. Albeit we try to keep 3.1dev as solid as possible things will certainly change in 3.1dev. Think of the 3.1dev branch like a rolling release. So if you need stability the 3.0 branch is better for you.
7777

78-
Version 3.0.X receives bugfixes, labeled as 3.0.1, 3.0.2 and so on. This will happen until 3.2 is released.
78+
Version 3.0.X receives bugfixes, labeled as 3.0.1, 3.0.2 and so on. This will happen until 3.2 is released.
7979

8080
Support for 2.9.5 has been dropped. Supported is >= 3.0.x only.
8181

bin/Readme.md

+14-16
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ All the precompiled binaries provided here have extended support for
66
everything which is normally not in OpenSSL or LibreSSL -- 40+56 Bit,
77
export/ANON ciphers, weak DH ciphers, weak EC curves, SSLv2 etc. -- all the dirty
88
features needed for testing. OTOH they also come with extended support
9-
for new / advanced cipher suites and/or features which are not in the
9+
for new / advanced cipher suites and/or features which are not in the
1010
official branch like (old version of the) CHACHA20+POLY1305 and CAMELLIA 256 bit ciphers.
1111
They also have IPv6 support, see below.
1212

@@ -17,17 +17,17 @@ fork (https://github.com/PeterMosmans/openssl). Thx a bunch, Peter!
1717
Compiled Linux and FreeBSD binaries so far come from Dirk, other
1818
contributors see ../CREDITS.md .
1919

20-
**I discontinued to upload the not commonly used binaries at GitHub ** (ARM7l, Darwin.i386 and all except one kerberos compiles) **as it is not very appropriate to use GitHub especially for those. The main site for all
20+
**I discontinued to upload the not commonly used binaries at GitHub ** (ARM7l, Darwin.i386 and all except one kerberos compiles) **as it is not very appropriate to use GitHub especially for those. The main site for all
2121
binaries is https://testssl.sh/openssl-1.0.2i-chacha.pm.ipv6.contributed/, also see the tarball @
2222
https://testssl.sh/openssl-1.0.2i-chacha.pm.ipv6.Linux+FreeBSD.tar.gz**
2323

2424
The binaries here have the naming scheme ``openssl.$(uname).$(uname -m)``
2525
and will be picked up from testssl.sh if you run testssl.sh directly
26-
off the git directory. Otherwise you need ``testssl.sh`` to point to it
26+
off the git directory. Otherwise you need ``testssl.sh`` to point to it
2727
via the argument (``--openssl=<here>``) or as an environment variable
2828
(``OPENSSL=<here> testssl.sh <yourargs>``).
2929

30-
The Linux binaries with the trailing ``-krb5`` come with Kerberos 5 support,
30+
The Linux binaries with the trailing ``-krb5`` come with Kerberos 5 support,
3131
they won't be picked up automatically as you need to make sure first they
3232
run (see libraries below).
3333

@@ -39,15 +39,15 @@ General
3939
-------
4040

4141
Both 64+32 bit Linux binaries were compiled under Ubuntu 12.04 LTS. Likely you
42-
cannot use them for older distributions, younger worked in all my test environments.
42+
cannot use them for older distributions, younger worked in all my test environments.
4343
I provide for each distributions two sets of binaries (no IPv6 here):
4444

4545
* completely statically linked binaries
4646
* dynamically linked binaries, additionally with MIT Kerberos support ("krb5" in the name).
47-
They provide also KRB5-* and EXP-KRB5-* support (in OpenSSL terminology, see krb5-ciphers.txt).
47+
They provide also KRB5-* and EXP-KRB5-* support (in OpenSSL terminology, see krb5-ciphers.txt).
4848

49-
For the latter you need a whopping bunch of kerberos runtime libraries which you maybe need to
50-
install from your distributor (libgssapi_krb5, libkrb5, libcom_err, libk5crypto, libkrb5support,
49+
For the latter you need a whopping bunch of kerberos runtime libraries which you maybe need to
50+
install from your distributor (libgssapi_krb5, libkrb5, libcom_err, libk5crypto, libkrb5support,
5151
libkeyutils). The 'static' binaries do not have MIT kerberos support as there are no
5252
static kerberos libs and I did not bother to compile them from the sources.
5353

@@ -96,16 +96,16 @@ or use my repo:
9696
./config --prefix=/usr/ --openssldir=/etc/ssl enable-zlib enable-ssl2 enable-rc5 enable-rc2 \
9797
enable-GOST enable-cms enable-md2 enable-mdc2 enable-ec enable-ec2m enable-ecdh enable-ecdsa \
9898
enable-seed enable-camellia enable-idea enable-rfc3779 no-ec_nistp_64_gcc_128 \
99-
-static experimental-jpake -DOPENSSL_USE_BUILD_DATE
99+
-static experimental-jpake -DOPENSSL_USE_BUILD_DATE
100100

101101
IPv6 support would need additionally the patch from ``fedora-dirk-ipv6.diff`` (included already
102102
in my branch). This doesn't give you the option of an IPv6 enabled proxy yet.
103103
It is good practice to compile those binaries with ``-DOPENSSL_USE_IPV6`` as
104104
later on you can tell them apart by``openssl version -a``.
105105

106-
Four GOST [1][2] ciphers come via engine support automagically with this setup. Two additional GOST
107-
ciphers can be compiled in (``GOST-GOST94``, ``GOST-MD5``) with ``-DTEMP_GOST_TLS`` but as of now they make
108-
problems under some circumstances, so unless you desperately need those ciphers I would stay away from
106+
Four GOST [1][2] ciphers come via engine support automagically with this setup. Two additional GOST
107+
ciphers can be compiled in (``GOST-GOST94``, ``GOST-MD5``) with ``-DTEMP_GOST_TLS`` but as of now they make
108+
problems under some circumstances, so unless you desperately need those ciphers I would stay away from
109109
``-DTEMP_GOST_TLS``.
110110

111111
If you don't have / don't want Kerberos libraries and devel rpms/debs, just omit "--with-krb5-flavor=MIT"
@@ -118,10 +118,10 @@ If you don't have / don't want Kerberos libraries and devel rpms/debs, just omit
118118
5.) make report (check whether it runs ok!)
119119

120120
6.) ``./apps/openssl ciphers -V 'ALL:COMPLEMENTOFALL' | wc -l`` lists for me
121-
* 193(+4 GOST) ciphers including kerberos
121+
* 193(+4 GOST) ciphers including kerberos
122122
* 179(+4 GOST) ciphers without kerberos
123123

124-
as opposed to ~110 from Ubuntu or Opensuse.
124+
as opposed to ~110 from Ubuntu or Opensuse.
125125

126126
**Never use these binaries for anything other than testing**
127127

@@ -130,5 +130,3 @@ Enjoy, Dirk
130130
[1] https://en.wikipedia.org/wiki/GOST_%29block_cipher%29
131131

132132
[2] http://fossies.org/linux/openssl/engines/ccgost/README.gost
133-
134-

etc/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ The certificate trust stores were retrieved from
1414
--> "Keychain Access" (2 click). In that window --> "Keychains" --> "System"
1515
--> "Category" --> "All Items"
1616
Select all CA certificates except for Developer ID Certification Authority, "File" --> "Export Items"
17-
2. __Internet:__ Pick the latest subdir (=highest number) from https://opensource.apple.com/source/security_certificates/. They are in DER format despite their file extension. Download them with ``wget --level=1 --cut-dirs=5 --mirror --convert-links --adjust-extension --page-requisites --no-parent https://opensource.apple.com/source/security_certificates/security_certificates-*/certificates/roots/``
17+
2. __Internet:__ Pick the latest subdir (=highest number) from https://opensource.apple.com/source/security_certificates/. They are in DER format despite their file extension. Download them with ``wget --level=1 --cut-dirs=5 --mirror --convert-links --adjust-extension --page-requisites --no-parent https://opensource.apple.com/source/security_certificates/security_certificates-*/certificates/roots/``
1818

1919

2020
Google Chromium uses basically the trust stores above, see https://www.chromium.org/Home/chromium-security/root-ca-policy.

etc/client-simulation.wiresharked.md

-4
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,3 @@ The whole process is done manually.
2222
* "ciphersutes" are TLS 1.3 ciphersuites. You can identify them as they currently are like 0x130?. Retrieve them from above see ``~/utils/hexstream2cipher.sh``
2323
* Figure out the services by applying a good piece of human logic
2424
* Before submitting a PR: test it yourself! You can also watch it again via wireshark
25-
26-
27-
28-

t/11_baseline_ipv6_http.t.DISABLED

-1
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,3 @@ sub json($) {
5959
unlink $file;
6060
return from_json($file);
6161
}
62-

0 commit comments

Comments
 (0)