Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: sslscan | Distribution: openSUSE:Factory:zSystems |
Version: 2.1.2 | Vendor: openSUSE |
Release: 1.1 | Build date: Sun Nov 26 19:53:38 2023 |
Group: Productivity/Networking/Diagnostic | Build host: s390zl22 |
Size: 197257 | Source RPM: sslscan-2.1.2-1.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://github.com/rbsec/sslscan | |
Summary: SSL cipher scanning tool |
SSLScan determines what ciphers are supported on SSL-based services, such as HTTPS. Furthermore, SSLScan will determine the preferred ciphers of the SSL service.
SUSE-GPL-3.0+-with-openssl-exception
* Sat Nov 25 2023 Dirk Müller <dmueller@suse.com> - update to 2.1.2: * Fix certificate and cipher enumeration when unsafe renegotiation is required * Fri Nov 10 2023 Dirk Müller <dmueller@suse.com> - update to 2.1.1: * Work around several dodgy TLS implementations * Thu Sep 14 2023 Andrea Manzini <andrea.manzini@suse.com> - update to 2.1.0: * Build against OpenSSL 3.0 instead of 1.1.0 (credit jtesta) * Sun Apr 16 2023 Dirk Müller <dmueller@suse.com> - update to 2.0.16: * Fix incorret detection of TLSv1.3 on Server 2019 * Fix incorrect XML certificate output * Tue Aug 02 2022 Dirk Müller <dmueller@suse.com> - update to 2.0.15: * Obtain certificate info even if we can't connect properly * Strip out https:// from lines in a target file * Fix TLSv1.3 detection against Server 2022 (credit jtesta) * Sun Mar 27 2022 Dirk Müller <dmueller@suse.com> - update to 2.0.12: * Add <not-yet-valid> XML element (credit lucacapacci) * Tue Jan 04 2022 Dirk Müller <dmueller@suse.com> - update to 2.0.11: * Add --iana-names option to use IANA/RFC cipher names * Improve signature algorithm detection * Tue May 11 2021 Dirk Müller <dmueller@suse.com> - update to 2.0.10: * Add the --connect-timeout option (credit alkalim) * Fix a typo in output * Warn on TLSv1.1, as it's now deprecated by RFC 8996 * Fix a bug with LDAP STARTTLS * Fix certificate detection on some broken servers * Fix missing SCSV Fallback in XML output * Don't show server signature algorithms by default * Use --show-sigs to display them * Fri Dec 18 2020 Johannes Weberhofer <jweberhofer@weberhofer.at> - Upgrade to version 2.0.6 * Add <error> element to XML output * Fix the extraneous padding of HTTP responses in XML * Update the HTTP request to HTTP/1.1 * More robust checking the HTTP response is valid * Display "No response" when no HTTP response is returned * Remove the broken HTTP request scanning option (--http) * Fix --targets not working properly * Flag certificates in red if CN is the same as issuer * Mon Sep 28 2020 Johannes Weberhofer <jweberhofer@weberhofer.at> - Upgrade to version 2.0.1 * Correctly set SNI name when using --targets. Fixes gh#rbsec/sslscan#215 * Thu Jul 23 2020 Johannes Weberhofer <jweberhofer@weberhofer.at> - Upgrade to version 2.0.0 Version 2 of sslscan includes a major rewrite of the backend scanning code, which means that it is no longer reliant on the version of OpenSSL for many checks. This means that it is possible to support legacy protocols (SSLv2 and SSLv3), as well as supporting TLSv1.3 - regardless of the version of OpenSSL that it has been compiled against. It is still recommended to build statically where possible, but dynamically built version should be significantly more useful. Note that there are also some breaking changes to the XML output, which are documented in the readme file. This rewrite been made possible largely by the work of jtesta, who has been responsible for most of the backend rewrite. - Cleaned up spec file * Wed Jul 22 2020 Wolfgang Frisch <wolfgang.frisch@suse.com> - Upgrade to version 2.0.0-beta6 * Various bugfixes * Added -4 and -6 options to force IPv4 and IPv6. * Added strength attribute to XML to reflect colouring in stdout * Checks for server signature algorithms. * Checks for server key exchange groups. * Support for SSLv2 and SSLv3 protocol detection regardless of OpenSSL * Support for TLSv1.3 * Support for additional cipher suites. * Print curve name and key strength for ECC certs * Fix a bug with servers that return incorrect cipher IDs. * Add a new "<certificates>" element to the XML output. * Remove the "Signature Algorithm:" text and spacing from the XML. * Report servers that accept any signature algorithm in the XML - Rebased fedora-sslscan-patents.patch - OpenSSL dependency bumped to >= 1.1
/usr/bin/sslscan /usr/share/doc/packages/sslscan /usr/share/doc/packages/sslscan/README.md /usr/share/licenses/sslscan /usr/share/licenses/sslscan/LICENSE /usr/share/man/man1/sslscan.1.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Mar 9 12:50:11 2024