Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

sslscan-2.1.2-1.1 RPM for s390x

From OpenSuSE Ports Tumbleweed for s390x

Name: sslscan Distribution: openSUSE:Factory:zSystems
Version: 2.1.2 Vendor: openSUSE
Release: 1.1 Build date: Sun Nov 26 19:53:38 2023
Group: Productivity/Networking/Diagnostic Build host: s390zl22
Size: 197257 Source RPM: sslscan-2.1.2-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://github.com/rbsec/sslscan
Summary: SSL cipher scanning tool
SSLScan determines what ciphers are supported on SSL-based services,
such as HTTPS. Furthermore, SSLScan will determine the preferred
ciphers of the SSL service.

Provides

Requires

License

SUSE-GPL-3.0+-with-openssl-exception

Changelog

* Sat Nov 25 2023 Dirk Müller <dmueller@suse.com>
  - update to 2.1.2:
    * Fix certificate and cipher enumeration when unsafe
      renegotiation is required
* Fri Nov 10 2023 Dirk Müller <dmueller@suse.com>
  - update to 2.1.1:
    * Work around several dodgy TLS implementations
* Thu Sep 14 2023 Andrea Manzini <andrea.manzini@suse.com>
  - update to 2.1.0:
    * Build against OpenSSL 3.0 instead of 1.1.0 (credit jtesta)
* Sun Apr 16 2023 Dirk Müller <dmueller@suse.com>
  - update to 2.0.16:
    * Fix incorret detection of TLSv1.3 on Server 2019
    * Fix incorrect XML certificate output
* Tue Aug 02 2022 Dirk Müller <dmueller@suse.com>
  - update to 2.0.15:
    * Obtain certificate info even if we can't connect properly
    * Strip out https:// from lines in a target file
    * Fix TLSv1.3 detection against Server 2022 (credit jtesta)
* Sun Mar 27 2022 Dirk Müller <dmueller@suse.com>
  - update to 2.0.12:
    * Add <not-yet-valid> XML element (credit lucacapacci)
* Tue Jan 04 2022 Dirk Müller <dmueller@suse.com>
  - update to 2.0.11:
    * Add --iana-names option to use IANA/RFC cipher names
    * Improve signature algorithm detection
* Tue May 11 2021 Dirk Müller <dmueller@suse.com>
  - update to 2.0.10:
    * Add the --connect-timeout option (credit alkalim)
    * Fix a typo in output
    * Warn on TLSv1.1, as it's now deprecated by RFC 8996
    * Fix a bug with LDAP STARTTLS
    * Fix certificate detection on some broken servers
    * Fix missing SCSV Fallback in XML output
    * Don't show server signature algorithms by default
    * Use --show-sigs to display them
* Fri Dec 18 2020 Johannes Weberhofer <jweberhofer@weberhofer.at>
  - Upgrade to version 2.0.6
    * Add <error> element to XML output
    * Fix the extraneous padding of HTTP responses in XML
    * Update the HTTP request to HTTP/1.1
    * More robust checking the HTTP response is valid
    * Display "No response" when no HTTP response is returned
    * Remove the broken HTTP request scanning option (--http)
    * Fix --targets not working properly
    * Flag certificates in red if CN is the same as issuer
* Mon Sep 28 2020 Johannes Weberhofer <jweberhofer@weberhofer.at>
  - Upgrade to version 2.0.1
    * Correctly set SNI name when using --targets. Fixes gh#rbsec/sslscan#215
* Thu Jul 23 2020 Johannes Weberhofer <jweberhofer@weberhofer.at>
  - Upgrade to version 2.0.0
    Version 2 of sslscan includes a major rewrite of the backend scanning code,
    which means that it is no longer reliant on the version of OpenSSL for many
    checks. This means that it is possible to support legacy protocols (SSLv2 and
    SSLv3), as well as supporting TLSv1.3 - regardless of the version of OpenSSL
    that it has been compiled against. It is still recommended to build statically
    where possible, but dynamically built version should be significantly more
    useful.
    Note that there are also some breaking changes to the XML output, which are
    documented in the readme file.
    This rewrite been made possible largely by the work of jtesta, who has been
    responsible for most of the backend rewrite.
  - Cleaned up spec file
* Wed Jul 22 2020 Wolfgang Frisch <wolfgang.frisch@suse.com>
  - Upgrade to version 2.0.0-beta6
    * Various bugfixes
    * Added -4 and -6 options to force IPv4 and IPv6.
    * Added strength attribute to XML to reflect colouring in stdout
    * Checks for server signature algorithms.
    * Checks for server key exchange groups.
    * Support for SSLv2 and SSLv3 protocol detection regardless of OpenSSL
    * Support for TLSv1.3
    * Support for additional cipher suites.
    * Print curve name and key strength for ECC certs
    * Fix a bug with servers that return incorrect cipher IDs.
    * Add a new "<certificates>" element to the XML output.
    * Remove the "Signature Algorithm:" text and spacing from the XML.
    * Report servers that accept any signature algorithm in the XML
  - Rebased fedora-sslscan-patents.patch
  - OpenSSL dependency bumped to >= 1.1

Files

/usr/bin/sslscan
/usr/share/doc/packages/sslscan
/usr/share/doc/packages/sslscan/README.md
/usr/share/licenses/sslscan
/usr/share/licenses/sslscan/LICENSE
/usr/share/man/man1/sslscan.1.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 9 12:50:11 2024