santropolroulant / smell-test

Monitor router traffic and flag weak TLS configuations
GNU General Public License v3.0
1 stars 2 forks source link

Restrict testing to HTTP connections #4

Open kousu opened 6 years ago

kousu commented 6 years ago

There's a lot of DNS noise more than actual outgoing connections. I suspect it would save time it we only ran testssl for real observed connections. So, I propose:

  1. Watch for DNS answers (udp port 53 incoming), and cache IP => domain
  2. Watch, simultaneously, for HTTPS (port 443 tcp). a. look up the domain name for this connection from the DNS cache b. we have to assume that the most recent DNS answer goes with the most recent HTTPS connection
    • we could maybe make this more accurate by caching (LAN IP, remote IP) => domain instead
  3. Run testssl on this domain

I also suggest that we watch for HTTP (tcp port 80) -- which is in the clear, so we can straight up sniff their content -- and flag everything that doesn't immediately HTTP 302 their content to the HTTPS version of the same site.