Skip to content

Commit 4d10873

Browse files
committed
Amend changes and attributions
1 parent 6746fa5 commit 4d10873

File tree

2 files changed

+33
-10
lines changed

2 files changed

+33
-10
lines changed

CHANGELOG.md

Lines changed: 20 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,28 +3,34 @@
33

44
### Features implemented / improvements in 3.2
55

6-
* Rating (SSL Labs, not complete)
6+
* Rating (SSL Labs)
77
* Extend Server (cipher) preference: always now in wide mode instead of running all ciphers in the end (per default)
88
* Remove "negotiated cipher / protocol"
99
* Provide a better verdict wrt to server order: Now per protocol and ciphers are weighted for each protocol
10-
* Switched to multi-stage docker image with opensuse base to avoid musl libc issues, performance gain also
11-
* Improved compatibility with OpenSSL 3.0 and higher versions
10+
* Faster startup, other performance improvements
11+
* Switched to multi-stage docker image with opensuse base to avoid musl libc issues, benefit: also performance gain
12+
* Added GHCR.io docker image builds
13+
* Improved compatibility with OpenSSL 3.0 and higher versions like OpenSSL 3.5
1214
* Improved compatibility with Open/LibreSSL versions not supporting TLS 1.0-1.1 anymore
15+
* Reduced the set of openssl-bad binaries via github to Linux and FreeBSD, no kerberos binaries anymore, no Linux 32 Bit
1316
* Renamed PFS/perfect forward secrecy --> FS/forward secrecy
1417
* Cipher list straightening
1518
* Support RFC 9150 cipher suites
1619
* Improved mass testing
1720
* Better align colors of ciphers with standard cipherlists
1821
* Save a few cycles for ROBOT
1922
* Several ciphers more colorized
23+
* Added support for way more ciphers like all AEAD ciphers known so far
2024
* Percent output char problem fixed
2125
* Several display/output fixes
2226
* BREACH check: list all compression methods and add brotli
2327
* Test for old winshock vulnerability
2428
* Test for STARTTLS injection vulnerabilities (SMTP, POP3, IMAP)
2529
* STARTTLS: XMPP server support, plus a new set of OpenSSL-bad binaries
2630
* STARTTLS sieve support, plus again a new set of OpenSSL-bad binaries
31+
* STARTTLS LDAP support, AD + STARTTLS logic is there but experimental
2732
* Several code improvements to STARTTLS, also better detection when no STARTTLS is offered
33+
* STARTTLS telnet (TN3270/telnet) support
2834
* Detect throtteling via STARTTLS smtp
2935
* Renegotiation checks more reliable against different servers
3036
* STARTTLS on active directory service support
@@ -33,11 +39,16 @@
3339
* Added support for certificates with EdDSA signatures and public keys
3440
* Extract CA list shows supported certification authorities sent by the server
3541
* Wildcard certificates: detection and warning
42+
* Test for support for RFC 8879 certificate compression
43+
* Show intermediate cert validity / bad OCSP
44+
* If a TLS 1.3 host is tested and e.g. /usr/bin/openssl supports it, it'll automagically switch to it
3645
* TLS 1.2 and TLS 1.3 sig algs added
46+
* TLS 1.3: decrypting server response
3747
* Check for ffdhe groups
3848
* Check for six KEMs in draft-connolly-tls-mlkem-key-agreement/draft-kwiatkowski-tls-ecdhe-mlkem/draft-tls-westerbaan-xyber768d00
3949
* Check for ML-DSA signatures (draft-tls-westerbaan-mldsa)
4050
* Show server supported signature algorithms
51+
* Support for EdDSA (Ed25519/Ed448): sigalgo extension, check whether server offers EdDSA certificates, recognize EdDSA signatures
4152
* --add-ca can also now be a directory with \*.pem files
4253
* Warning of 398 day limit for certificates issued after 2020/9/1
4354
* Added environment variable for amount of attempts for ssl renegotiation check
@@ -46,16 +57,18 @@
4657
* Headerflag X-XSS-Protection is now labeled as INFO
4758
* Search for more HTTP security headers on the server
4859
* Strict parser for HSTS
49-
* DNS via proxy improvements
60+
* DNS via proxy improvements, also IPv6 support for proxy
5061
* Client simulation runs in wide mode which is even better readable
5162
* Added --reqheader to support custom headers in HTTP requests
52-
* Test for support for RFC 8879 certificate compression
5363
* Deprecating --fast and --ssl-native (warning only but still av)
54-
* Compatible to GNU grep 3.8
64+
* Compatible to GNU grep >=3.8, bash 5.x
5565
* Don't use external pwd command anymore
5666
* Doesn't hang anymore when there's no local resolver
67+
* Display whether server requests/requires a Client Certificate
5768
* Added --mtls feature to support client authentication
58-
* If a TLS 1.3 host is tested and e.g. /usr/bin/openssl supports it, it'll automagically will switch to it
69+
* CI run against a target with known configuration as a change canary
70+
* Updated client handshakes as new browsers and OpenSSL 3.5.x show KEMs
71+
* Start using client handshakes include ja3/ja4 so that similar handshakes will be recognized
5972

6073

6174
### Features implemented / improvements in 3.0

CREDITS.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Full contribution, see git log.
44
* Dirk Wetter (creator, maintainer and main contributor)
55
- Everything what's not mentioned below and is included in testssl.sh's git log
66
minus what I probably forgot to mention
7-
(too much other things to do at the moment and to list it would be a tough job)
7+
(too much other things to do at the moment and to list it would be too time consuming)
88

99
* David Cooper (main contributor)
1010
- Major extensions to socket support for all protocols
@@ -36,9 +36,9 @@ Full contribution, see git log.
3636
- Check for ffdhe and ML-KEM groups
3737
- TLS 1.2 and TLS 1.3 sig algs added
3838
- Show server supported signature algorithms
39-
- Show supported certification authorities sent by the server when client auth is requested
39+
- Show supported certification authorities sent by the server when client auth is requested and whether certificate-based client authentication is not requested, optional, or required.
4040
- Provide a better verdict wrt to server order: Now per protocol and ciphers are weighted for each protocol
41-
- Provide compatibility to every LibreSSL/OpenSSL versions
41+
- Provide compatibility to every LibreSSL/OpenSSL versions, including OpenSSL 3.5.0
4242
- Lots of fixes and improvements
4343

4444
##### Further credits (in alphabetical order)
@@ -68,6 +68,9 @@ Full contribution, see git log.
6868
* Christian Dresen
6969
- Dockerfile
7070

71+
* enxio
72+
- support for TN3270/telnet STARTTLS
73+
7174
* csett86
7275
- some MacOSX and Java client handshake data
7376

@@ -81,6 +84,10 @@ Full contribution, see git log.
8184
- bugfixes
8285
- former ARM binary support
8386

87+
* Jauder Ho
88+
- GH Action to build new container images upon push
89+
- dependabot actions
90+
8491
* Maciej Grela
8592
- colorless handling
8693

@@ -128,6 +135,9 @@ Full contribution, see git log.
128135
- non-flat JSON support (--json-pretty)
129136
- in file output (CSV, JSON flat, JSON non-flat) support of a minimum severity level
130137

138+
* Brett Randall
139+
- Improved (experimental) Extended Validation (EV) certificate identification.
140+
131141
* Jonathan Roach
132142
- TLS_FALLBACK_SCSV checks
133143

0 commit comments

Comments
 (0)