Skip to content

Commit a9f4bb5

Browse files
authored
Merge pull request #1810 from drwetter/starttls_injection
STARTTLS injection
2 parents ffe223f + e1a43e6 commit a9f4bb5

File tree

6 files changed

+260
-117
lines changed

6 files changed

+260
-117
lines changed

CHANGELOG.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,8 @@
1212
* Percent output char problem fixed
1313
* Several display/output fixes
1414
* BREACH check: list all compression methods and add brotli
15-
* test for winshock vulnerability
15+
* Test for old winshock vulnerability
16+
* Test for STARTTLS injection vulnerabilities (SMTP, POP3, IMAP)
1617
* Security fix: DNS input
1718
* Don't use external pwd anymore
1819
* STARTTLS: XMPP server support
@@ -30,6 +31,7 @@
3031
* Client simulation runs in wide mode which is even better readable
3132
* Added --reqheader to support custom headers in HTTP requests
3233

34+
3335
### Features implemented / improvements in 3.0
3436

3537
* Full support of TLS 1.3, shows also drafts supported

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ FROM alpine:3.11
22

33
RUN apk update && \
44
apk upgrade && \
5-
apk add bash procps drill git coreutils libidn curl && \
5+
apk add bash procps drill git coreutils libidn curl socat openssl && \
66
rm -rf /var/cache/apk/* && \
77
addgroup testssl && \
88
adduser -G testssl -g "testssl user" -s /bin/bash -D testssl && \

doc/testssl.1

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -354,7 +354,10 @@ Security headers (X\-Frame\-Options, X\-XSS\-Protection, Expect\-CT,\.\.\. , CSP
354354
\fB\-T, \-\-ticketbleed\fR Checks for Ticketbleed memory leakage in BigIP loadbalancers\.
355355
.
356356
.P
357-
\fB\-BB, \-\-robot\fR Checks for vulnerability to ROBOT / (\fIReturn Of Bleichenbacher\'s Oracle Threat\fR) attack\.
357+
\fB\-\-BB, \-\-robot\fR Checks for vulnerability to ROBOT / (\fIReturn Of Bleichenbacher\'s Oracle Threat\fR) attack\.
358+
.
359+
.P
360+
\fB\-\-SI, \-\-starttls\-injection\fR Checks for STARTTLS injection vulnerabilities (SMTP, IMAP, POP3 only)\. \fIsocat\fR and OpenSSL >=1.1.0 is needed\.
358361
.
359362
.P
360363
\fB\-R, \-\-renegotiation\fR Tests renegotiation vulnerabilities\. Currently there\'s a check for \fISecure Renegotiation\fR and for \fISecure Client\-Initiated Renegotiation\fR\. Please be aware that vulnerable servers to the latter can likely be DoSed very easily (HTTP)\. A check for \fIInsecure Client\-Initiated Renegotiation\fR is not yet implemented\.

doc/testssl.1.html

Lines changed: 3 additions & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

doc/testssl.1.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,9 @@ Also for multiple server certificates are being checked for as well as for the c
234234

235235
`-T, --ticketbleed` Checks for Ticketbleed memory leakage in BigIP loadbalancers.
236236

237-
`-BB, --robot` Checks for vulnerability to ROBOT / (*Return Of Bleichenbacher's Oracle Threat*) attack.
237+
`--BB, --robot` Checks for vulnerability to ROBOT / (*Return Of Bleichenbacher's Oracle Threat*) attack.
238+
239+
`--SI, --starttls-injection` Checks for STARTTLS injection vulnerabilities (SMTP, IMAP, POP3 only). `socat` and OpenSSL >=1.1.0 is needed.
238240

239241
`-R, --renegotiation` Tests renegotiation vulnerabilities. Currently there's a check for *Secure Renegotiation* and for *Secure Client-Initiated Renegotiation*. Please be aware that vulnerable servers to the latter can likely be DoSed very easily (HTTP). A check for *Insecure Client-Initiated Renegotiation* is not yet implemented.
240242

0 commit comments

Comments
 (0)