Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: determine SSL/TLS support on services #1176

Merged
merged 1 commit into from
Aug 24, 2022
Merged

Fix: determine SSL/TLS support on services #1176

merged 1 commit into from
Aug 24, 2022

Conversation

jjnicola
Copy link
Member

@jjnicola jjnicola commented Aug 24, 2022

What:
Scanner failed to determine SSL/TLS support on services requiring a client certificate.
Jira: SC-659

Why:
Now the variable trp is passed to the function to be set.

How:
sudo openvas-nasl -X -B -d -i ./ -t zero.webappsecurity.com find_service.nasl --kb="Ports/tcp/443=1"

without the patch, I have seen like the transport key stores a random integer (trp not set/initiliazed)
lib misc-Message: 13:59:08.804: set key Transports/TCP/443 -> 109136

with the patch, the transport key is set with the right value:
lib misc-Message: 14:02:51.355: set key Transports/TCP/443 -> 9

Checklist:

  • Tests
  • PR merge commit message adjusted

Scanner failed to determine SSL/TLS support on services requiring a client certificate.
Now the variable trp is passed to the function to be set.

Test:
`sudo openvas-nasl -X -B -d -i ./ -t zero.webappsecurity.com find_service.nasl --kb="Ports/tcp/443=1"`

without the patch, I have seen like the transport key stores a random integer (trp not set/initiliazed)
`lib  misc-Message: 13:59:08.804: set key Transports/TCP/443 -> 109136`

with the patch, the transport key is set with the right value:
`lib  misc-Message: 14:02:51.355: set key Transports/TCP/443 -> 9`
@jjnicola jjnicola requested a review from a team as a code owner August 24, 2022 13:39
@jjnicola jjnicola enabled auto-merge (squash) August 24, 2022 13:39
@jjnicola jjnicola disabled auto-merge August 24, 2022 13:39
@jjnicola jjnicola enabled auto-merge (squash) August 24, 2022 13:39
@jjnicola jjnicola merged commit 710066d into main Aug 24, 2022
@jjnicola jjnicola deleted the fix-tls-main branch August 24, 2022 18:47
mergify bot pushed a commit that referenced this pull request Aug 24, 2022
Scanner failed to determine SSL/TLS support on services requiring a client certificate.
Now the variable trp is passed to the function to be set.

Test:
`sudo openvas-nasl -X -B -d -i ./ -t zero.webappsecurity.com find_service.nasl --kb="Ports/tcp/443=1"`

without the patch, I have seen like the transport key stores a random integer (trp not set/initiliazed)
`lib  misc-Message: 13:59:08.804: set key Transports/TCP/443 -> 109136`

with the patch, the transport key is set with the right value:
`lib  misc-Message: 14:02:51.355: set key Transports/TCP/443 -> 9`

(cherry picked from commit 710066d)
jjnicola added a commit that referenced this pull request Aug 25, 2022
Scanner failed to determine SSL/TLS support on services requiring a client certificate.
Now the variable trp is passed to the function to be set.

Test:
`sudo openvas-nasl -X -B -d -i ./ -t zero.webappsecurity.com find_service.nasl --kb="Ports/tcp/443=1"`

without the patch, I have seen like the transport key stores a random integer (trp not set/initiliazed)
`lib  misc-Message: 13:59:08.804: set key Transports/TCP/443 -> 109136`

with the patch, the transport key is set with the right value:
`lib  misc-Message: 14:02:51.355: set key Transports/TCP/443 -> 9`

(cherry picked from commit 710066d)

Co-authored-by: Juan José Nicola <juan.nicola@greenbone.net>
@nichtsfrei nichtsfrei mentioned this pull request Sep 7, 2022
@cfi-gb
Copy link
Member

cfi-gb commented Dec 16, 2022

support on services requiring a client certificate.

Note that this seems to also affect other kind of SSL/TLS services, not only the ones requiring a client certificate

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants