aeris
|
d1efc0ec07
|
Verify certificates during checks
|
6 years ago |
aeris
|
e28b857213
|
Certificate trust chain check
|
6 years ago |
aeris
|
a97668a5f8
|
Fetch curves preference
|
6 years ago |
aeris
|
d92523e4f2
|
Improving output
|
6 years ago |
aeris
|
f1860ab3ed
|
Refactor TLS server
|
6 years ago |
aeris
|
61032231b2
|
Handle case of multiple certificates
|
6 years ago |
aeris
|
845626ee45
|
Refactor some checks
|
6 years ago |
aeris
|
a8057ce1ec
|
Raise non TLS exception to help debug
|
7 years ago |
aeris
|
d0160f1067
|
Status helper
|
7 years ago |
aeris
|
52a19f8c35
|
TLS server for testing
|
7 years ago |
aeris
|
0c3bda1467
|
Don't check for supported curves if cipher not supported at all
|
7 years ago |
aeris
|
bd67ce8347
|
Refactor FALLBACK_SCSV
|
7 years ago |
aeris
|
0f67db070b
|
Add X25519 to supported ECC curves
|
7 years ago |
aeris
|
5dbf67e0d0
|
Better and more concise logging
|
7 years ago |
aeris
|
e39b7670f1
|
Fix AEAD and weak key checks
|
7 years ago |
aeris
|
dbc58944ac
|
Check for PSK and SRP ciphers
|
7 years ago |
aeris
|
299725996b
|
Display curve for ECC key
|
7 years ago |
aeris
|
0f45195170
|
Remove trailing score
|
7 years ago |
aeris
|
a212aa0711
|
Bad exception handling
|
7 years ago |
aeris
|
f209e17f5d
|
Check for must_staple cert extension
|
7 years ago |
aeris
|
8a1c4f8856
|
Check for TLS_FALLBACK_SCSV
|
7 years ago |
aeris
|
e604c11e13
|
Refactor test checks
|
7 years ago |
aeris
|
2d014181b4
|
Remove score
|
7 years ago |
aeris
|
5c3a32396d
|
Separate ECC from RSA for key status
|
7 years ago |
aeris
|
04ae17945d
|
Test for ECC curves support
|
7 years ago |
aeris
|
4d3e52a188
|
Fix error when multiple server results
|
7 years ago |
aeris
|
d043c3db4e
|
3DES is error (sweet32)
|
7 years ago |
Aeris
|
e46a1c14c5
|
Override TLS version **and** ciphers for HTTParty
`set_params` override everything with default parameters if not provided
So if ciphers not specified, reset to the default hardcoded ones
See https://github.com/ruby/ruby/blob/v2_3_0/ext/openssl/lib/openssl/ssl.rb#L124
|
7 years ago |
Aeris
|
c34802c7ec
|
Better error handling
|
7 years ago |
Aeris
|
41cdbaa83f
|
More unit tests (SMTP)
|
7 years ago |
Aeris
|
f1c14eef39
|
More unit tests (XMPP)
|
7 years ago |
Aeris
|
5aa9a975fe
|
More unit tests (HTTPS)
|
7 years ago |
Aeris
|
a2c38b05b0
|
Unit tests
|
7 years ago |
Aeris
|
f3d70d1daf
|
Add details for ciphers
|
7 years ago |
Aeris
|
97ac325af0
|
Fix cipher color
|
7 years ago |
Aeris
|
c1499fc6e6
|
Move up host resolving for speed ehanchement
|
7 years ago |
Aeris
|
f5bedc0e8f
|
Fetch ciphers from cipher suite
|
8 years ago |
Aeris
|
2967cd9d39
|
ANSSI recommendation : 3072 bits min
RGS 2.0 B1, §2.2.1.1 (p17)
|
8 years ago |
Aeris
|
f9a93cd83b
|
Cipher size is the weakest supported, not the strongest (+optimization)
|
8 years ago |
Aeris
|
4237a25ab9
|
ECDH is not a PFS cipher, only ECDHE is
|
8 years ago |
Aeris
|
78aba5a9f8
|
Change SSH preferences
See ANSSI report http://www.ssi.gouv.fr/uploads/2014/01/NT_OpenSSH.pdf
|
8 years ago |
Aeris
|
0ecc15cc79
|
Remove SHA-1 warning, not a problem for HMAC
See https://www.schneier.com/blog/archives/2005/02/sha1_broken.html
|
8 years ago |
Aeris
|
60a8a44c1a
|
Fix hang if XMPP server answers with error (unknown vhost)
|
8 years ago |
Aeris
|
4b680c6eec
|
Don’t fail all check if HSTS fail
|
8 years ago |
Aeris
|
f75af5a736
|
Order ciphers by strength
|
8 years ago |
Aeris
|
98df3b2a95
|
Homogenize colors
|
8 years ago |
Aeris
|
2b19052c0c
|
Don’t use net-ssh to (not) ensure server compatibility
|
8 years ago |
Aeris
|
6de0fd5516
|
SSH support
|
8 years ago |
Aeris
|
7298746ccb
|
Miss SSLv2/3 and DSS errors
|
8 years ago |
Aeris
|
9b74c5a829
|
Cipher status
|
8 years ago |