Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RFC: Experimental support for servers which require a client certificate #181

Open
wants to merge 6 commits into
base: master
Choose a base branch
from

Conversation

MarcT512
Copy link
Contributor

RFC: Experimental support for servers which require a client certificate (Fixes #119).
Fix: Typo s/response/respond in "Some servers will fail to response to SSLv3 ciphers over STARTTLS"
Fix: Logic error prevents show trusted CAs running with checkCertificate == true.

RFC patch to enable scanning of servers which require a client certificate.
How: Allow tests to continue in the event the SSL_connect() fails with certain "acceptable" errors . These are:

SSL alert 40 (Handshake failure)
SSL alert 46 (Certificate Unknown)
SSL alert 42 (Bad Certificate)

Testing is encouraged. Unfortunately I cannot provide any public test cases.

Fix use after free of ssl object. (rbsec#178)
Add a function to convert SSL error codes to a string.
In addition, get the underlying error from OpenSSL and display it.

Before:
[...]
Accepted  TLSv1.0  128 bits  AES128-SHA
SSL_get_error(ssl, cipherStatus) said: 1

After:
[...]
Accepted  TLSv1.0  128 bits  AES128-SHA
SSL_get_error(ssl, cipherStatus) returned: 1 (SSL_ERROR_SSL)
[sslscan.c:testCipher@1584]:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number
RFC: Additional SSL error reporting in verbose mode.
Pull in latest from master
RFC: Experimental support for servers which require a client certificate (Fixes rbsec#119).
Fix: Typo s/response/respond in "Some servers will fail to response to SSLv3 ciphers over STARTTLS"
Fix: Logic error prevents show trusted CAs running with checkCertificate == true.

RFC patch to enable scanning of servers which require a client certificate.
How: Allow tests to continue in the event the SSL_connect() fails with certain "acceptable" errors . These are:

SSL alert 40 (Handshake failure)
SSL alert 46 (Certificate Unknown)
SSL alert 42 (Bad Certificate)

Testing is encouraged. Unfortunately I cannot provide any public test cases.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Scan incomplete with server requiring client certificate
1 participant