OWASP / O-Saft

O-Saft - OWASP SSL advanced forensic tool
GNU General Public License v2.0
373 stars 86 forks source link

Reliability of the cipher suites checking #139

Open kylak opened 4 months ago

kylak commented 4 months ago

Hi.

There's another issue why I believe in general the result maybe not reliable: for some cipher suites you would need to provide TLS extensions or specific values in those extensions, otherwise the server won't possibly accept the ClientHello, see e.g. https://github.com/drwetter/testssl.sh/issues/1207#issuecomment-468298835

source: https://github.com/drwetter/testssl.sh/issues/2526#issuecomment-2238598908

Did you know that ? Is it automatically managed by O-Saft when checking the full range of cipher suites ?

EnDe commented 4 months ago

Yes, we are aware about that. This is a general issue with targets using TLS 1.3. We know about targets where our tool bails out with errors. So depends on what you exactly mean with "reliability":

Before going into details, can you please explain what you want to achieve? May be you consult the documentation first. If grep is not your favorite, you can query the docs in o-saft.tcl's Help window ;-)

kylak commented 4 months ago

I want to achieve two things :

  1. To know the SSL/TLS protocol versions enabled on a server.
  2. To know if there are any other cipher suites authorized by the server than some that I have given him.

Yes the doc seems to have a lot of infos, I'm going to check it out.