Giter Club home page Giter Club logo

p5-ssl-tools's People

Contributors

lbehm avatar noxxi avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

p5-ssl-tools's Issues

Send a fully qualified domain name as EHLO

The following execution reports no starttls supported:

$ current/bin/check-ssl-heartbleed.pl --starttls smtp mx00.emig.gmx.net:25
...reply to starttls: 503
no starttls supported

Ideed the server supports STARTTLS:

$ echo QUIT | openssl s_client -starttls smtp -connect mx00.emig.gmx.net:25
CONNECTED(00000003)
depth=2 C = DE, O = Deutsche Telekom AG, OU = T-TeleSec Trust Center, CN = Deutsche Telekom Root CA 2
verify error:num=19:self signed certificate in certificate chain
verify return:0
...
250 STARTTLS
DONE

Improper handling of TLS 1.3 ciphers causes endless loop in analyze.pl

Hi. I am running the analyze-ssl.pl script with the --all-ciphers option and it's taking ages. I can see it's doing something in Wireshark but otherwise I would just have been staring at an unresponsive prompt for hours. Even knowing it's doing something doesn't tell me how far there is to go. Some kind of "testing cipher number x out of y" indicator would be most appreicated.

Cipher names don't match standard names

When I run the script on a endpoint im trying to connect to I get:

supported ciphers with SSLv23 handshake
   * TLSv1_2 AES128-GCM-SHA256
   * TLSv1_2 AES256-GCM-SHA384
   * TLSv1_2 AES128-SHA256
   * TLSv1_2 AES256-SHA256
   * TLSv1_2 ECDHE-RSA-AES128-GCM-SHA256
   * TLSv1_2 ECDHE-RSA-AES256-GCM-SHA384
   * TLSv1_2 ECDHE-RSA-AES128-SHA256
   * TLSv1_2 ECDHE-RSA-AES256-SHA384

These cipher suite names don't match the standard exactly. I don't know enough to say which of the cipher suites supports my client. How am I suppose to know which ones I can use?

These are the ciphers my client (Websphere 8.5) supports:
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
SSL_RSA_WITH_AES_128_CBC_SHA
SSL_DHE_RSA_WITH_AES_128_CBC_SHA
SSL_DHE_DSS_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
SSL_DHE_DSS_WITH_RC4_128_SHA
SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256
SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256
SSL_RSA_WITH_AES_128_GCM_SHA256
SSL_RSA_WITH_AES_128_CBC_SHA256
SSL_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
SSL_ECDH_RSA_WITH_AES_128_GCM_SHA256
SSL_ECDH_RSA_WITH_AES_128_CBC_SHA256
SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
SSL_DHE_DSS_WITH_AES_128_GCM_SHA256
SSL_DHE_DSS_WITH_AES_128_CBC_SHA256
SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA
SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA
SSL_ECDH_RSA_WITH_AES_128_CBC_SHA
SSL_ECDHE_ECDSA_WITH_RC4_128_SHA
SSL_ECDHE_RSA_WITH_RC4_128_SHA
SSL_ECDH_ECDSA_WITH_RC4_128_SHA
SSL_ECDH_RSA_WITH_RC4_128_SHA
SSL_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
SSL_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
SSL_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
SSL_ECDH_RSA_WITH_3DES_EDE_CBC_SHA

These names aren't exactly right either should start with TLS instead of SSL.

The standard cipher suite names are defined here:
https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4

README.md typo

analyze.pl -> analyze-ssl.pl

And to keep it consistent the other script names should also end in '.pl'.

Typo in usage

The usage says that "--dump_chain" should be used to dump the certificate chain, but the correct spelling is "--dump-chain".

Script

I need to be able to run this script using a specific proxy script. How can that be done...or can it?

check-ssl-heartbleed.pl - don't run it against unpatched generation 1 og 2 ILO.

Not this scripts fault ... google search ' c04249852 site:hp.com'

However, the first-generation iLO and iLO 2 products use the RSA SSL libraries and there is a bug in these libraries that will cause first-generation iLO and iLO 2 devices to enter a live lockup situation when a vulnerability scanner runs to check for the Heartbleed vulnerability. Although the server's operating system will continue to function normally, first-generation iLO and iLO 2 will no longer be responsive over the management network.

False negative when attempting to test heartbleed with STARTTLS on SMTP

I've been testing this script and it works great but i'm come across some machines which have SMTP port 25 open and when trying to exploit the vulnerability using STARTTLS, the script returns a timeout error.
However, testing it with other implementations like https://github.com/sensepost/heartbleed-poc work fine.
The issue is probably related to the case when the server dumps the memory through heartbleed but doesn't close the connection and makes the script time out. There have been reports of the same false negative on other scritps.
On the _readframe function, If you print the buffer before returning you will see some garbage followed by the bleed:

if ( ! select( my $rout = $rin,undef,undef,$timeout )) {
    $$rerr = 'timeout';
    print Dumper $buf ."\n";    ---> added this line - It dumps the server bleed (i used the module Data::Dumper)
    return;
};

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.