Skip to content

Releases: nabla-c0d3/sslyze

0.13.4

14 Feb 20:12
Compare
Choose a tag to compare

Changelog

  • Added --json_out command for writing results to a file as JSON.
  • Bug fixes with client authentication and connectivity testing.
  • The --certinfo_basic command now also checks that the server certificate chain's order is valid.

0.13.3

02 Feb 06:11
Compare
Choose a tag to compare

Changelog

  • Major rewrite and cleanup in order to:
    • Turn SSLyze into a Python module, allowing scans to be run and processed directly from Python
    • Add SSLyze to PyPi
    • These changes should make it easy to build tools and scripts on top of SSLyze
  • Renamed the command line tool to sslyze_cli.py to avoid conflicts with the sslyze module
  • Added the --fallback command to check support for the TLS_FALLBACK_SCSV cipher suite, which prevents downgrade attacks
  • Added the --openssl_ccs command to check for the OpenSSL CCS Injection vulnerability
  • Renamed the --certinfo=basic and --certinfo=full commands to --certinfo_basic and --certinfo_full
  • Removed the --chrome_sha1 command and merged the SHA1 deprecation check into --certinfo_basic
  • Fixed support for client authentication
  • Extended support for scanning through a CONNECT proxy to StartTLS protocols
  • Modified cipher suite plugin to return RFC cipher names instead of OpenSSL cipher names

0.12.0

24 Sep 06:46
Compare
Choose a tag to compare

Changelog

  • Added the Google trust store for certificate validation and updated the Apple, Microsoft and Mozilla stores.
  • A full (client) certificate chain can now be supplied when using client certificates.
  • Added the ability to print the XML output to the console using --xml_out -.
  • Various bug fixes including TLS errors that were mistakenly reported as network timeouts.
  • Updated list of OIDs for identifying EV certificates.
  • Updated OpenSSL to 1.0.2d, which fixes issues with certificate path validation when using --certinfo.

0.11.0

12 Apr 17:44
Compare
Choose a tag to compare

Changelog

  • Added support for Postgres StartTLS
  • Added the --ca_file option for specifying a local trust store to validate the server's certificate
  • Added the --quiet option to hide any text output when using --xml_out
  • Improved the formatting of the XML output to make it easier to parse and more useful; this will break any tool that was processing the XML output from previous versions, but an XML Schema Definition is now available in SSLyze's root folder
  • Bug fixes for EC certificates, HSTS, XMPP and LDAP
  • Updated OpenSSL to 1.0.2a
  • Updated Microsoft, Apple and Mozilla trust stores

0.10.0

21 Sep 23:54
Compare
Choose a tag to compare

Changelog

  • PluginOpenSSLCipherSuites now displays the size of the handshake's Diffie-Hellmann parameters
  • SSLyze on Windows is now packaged as a single .exe file
  • PluginCertInfo now displays the server's full certificate chain instead of its leaf certificate only, in both the console and XML results
  • PluginHSTS now properly detects HSTS headers when receiving HTTP redirections
  • New plugin to check if a server is affected by Chrome's deprecation of SHA1-signed certificates. See --chrome_sha1
  • Clarified the console output of most plugins and checks
  • Bug fixes for XML output and client certificate support
  • Updated OpenSSL to 1.0.1i
  • Updated Microsoft, Apple and Mozilla trust stores

0.9.0

23 Sep 05:28
Compare
Choose a tag to compare

Changelog

  • Experimental support for Heartbleed detection; see --heartbleed. Heartbleed detection has also been added to --regular scans
  • Capped the maximum number of concurrent connections to around 30 per server in order to avoid DOSing the scanned servers. Scans are slightly slower but a lot less aggressive, resulting in better scan results with less timeout and connection errors
  • Support for Basic Authentication when tunneling scans through an HTTPS proxy with --https_tunnel
  • Bug fixes for IPv6 and XMPP support
  • Updated OpenSSL to 1.0.1g
  • Updated the Apple, Microsoft, Mozilla and Java trust stores
  • Cleaned up the text output of PluginOpenSSLCipherSuites

0.8.0

23 Sep 05:35
Compare
Choose a tag to compare

Changelog

  • Additional certificate chain validation using the Apple, Microsoft and Java trust stores in addition to Mozilla's
  • Added support for StartTLS RDP; see --starttls=rdp
  • Greatly improved the reliability and accuracy of scan results by adding an exponential backoff algorithm to retry failed network connections. This will especially impact scans against servers that stop properly answering after several concurrent connections have already been opened. The number of retry attempts can be controlled using --nb_retries
  • Bug fixes including:
    • Better results when the server requested a client certificate but none was supplied
    • Clarified text and XML output
    • Better HTTP Strict Transport Security plugin
    • Fixed PluginCompression false negatives

0.7.0

23 Sep 05:37
Compare
Choose a tag to compare

Changelog

  • Complete rewrite of the OpenSSL wrapper as a C extension
    • SSLyze is now statically linked with the latest version of OpenSSL instead of using the system’s (potentially outdated/broken) OpenSSL library
    • All of SSLyze’s features are now available on all supported platforms (including SSL 2.0, TLS 1.1 and TLS 1.2)
    • Scans are slightly faster
    • Python 2.6 is no longer supported
  • Support for StartTLS FTP, POP, IMAP, LDAP and “auto”. See —starttls
  • Support for OCSP Stapling. See —certinfo
  • Other various improvements that results in SSLyze being more stable/robust

0.6.0

23 Sep 05:38
Compare
Choose a tag to compare

Changelog

  • Added support for Server Name Indication; see –sni
  • Partial results are returned when the server requires client authentication but no client certificate was provided
  • Preliminary IPv6 support
  • Various bug fixes and better support of client authentication and HTTPS tunneling

0.5.0

23 Sep 05:40
Compare
Choose a tag to compare

Changelog

  • XML output including full certificate parsing; see --xml_out
  • The list of servers to scan can be provided using a text file; see --targets_in
  • Improved certificate verification with hostname validation and EV certificates support
  • Clarified output and lots of bug fixes
  • OS X Mountain Lion is now officially supported
  • Support for compression / CRIME testing