Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Interpreting the output #56

Open
gzigg opened this issue Apr 9, 2014 · 0 comments
Open

Interpreting the output #56

gzigg opened this issue Apr 9, 2014 · 0 comments

Comments

@gzigg
Copy link

gzigg commented Apr 9, 2014

Hi there Filippo, first of all thank you so much for writing this handy tool. I've installed it at work and am running it off my windows machine using a powershell script to check internal hosts (as well as our external hosts). I will post the powershell wrapper here shortly although I am not a "coder" it is extremely simple and just a wrapper to run your script.

I had a question about interpreting the output of your Heartbleed script, for example I am getting these results (among the detected VULNERABLE and CLEANs):

  1. 2014/04/09 11:17:47 10.48.101.36:443 - ERROR: tls: failed to parse certificate from server: x509: negative serial number

  2. 2014/04/09 11:14:42 10.50.1.1:443 - ERROR: tls: server selected unsupported protocol version 300

  3. 2014/04/09 11:31:28 10.32.42.105:443 - ERROR: remote error: bad record MAC

Do you have a list of possible outcomes to understand whether that means those IP addresses should be tested further or any other way to interprest this output. Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant