-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Misinterpretation of no cipher overlap with client #18
Comments
Thank you for this report. I agree, that this has to be handled differently, as qsslcaudit did not actually verified the certificate acceptance. I will alter the logic. It appears that your client expects a certificate signed using elliptic curve algorithms, thus, it refused to deal with a presented certificate. This might be another issue... |
During certificate trust test there can be a situation when client does not accept any of the suggested ciphers. In this case it will refuce TLS connection. However, it does not mean that it trusts the certificate. This commit changes the behavior and the tool returns UNDEFINED test result in such situation. See also Github issue #18.
@Niklas974 I've published a new release which contains a change which alters qsslcaudit's way of thinking in scenarios like you reported. Please, have a look at this build. You can use packages from the official PPA (Ubuntu). I am not sure when it will arrive to Kali. There is another problem in your case: client accepts only elliptic curve-kind of ciphers. This may indicate that it expects that server's certificate will be signed with EC as well. As far as I remember, in this cases it is better to create your self-signed certificate signed with EC to perform proper test. Probably, I'll need to handle this somehow better in qsslcaudit. Will think about it. |
I'm debugging a weird client that does not seem to like any ciphers.
This is correctly displayed by qsslcaudit (see below: "socket error: […]"). In this case, the server (qsslaudit / openssl) breaks the connection (See Packet 108 in wireshark screenshot)
This is all fine, but qsslcaudit interprets the failure as the client not accepting the certificate, even though the server failed before even sending the certificate.
The text was updated successfully, but these errors were encountered: