-
Notifications
You must be signed in to change notification settings - Fork 456
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Default scan commands are not run when using --certinfo_ca_file #575
Comments
Hello, |
Hello, Sorry - no and I already wrote this in my initial post. When I try
Yes, thats all - nothing else! So there must be a bug when I add a ca to check against. |
Before I open another issue, I thought I add my comment here. I think From my understanding when I previously wanted to do
Is this behaviour really intended? |
@nabla-c0d3 - thanks a lot! |
Fix released as part of v5.0.6. |
Works, thanks a lot! |
Sorry for my late reply. Examples: Using the --fallback parameter only, does only perform the SCSV fallback check:
Using no additional scan parameter, the SCSV check will not be scheduled ("regular" does not include SCSV checks):
"--regular" is deprecated:
This "workaround" works:
|
Hello,
sorry if I am doing anything wrong...
I use sslyze 5.0.5 on Windows with a small batch job:
.\sslyze.exe --regular --certinfo_ca_file=.\pem_files\myca.pem myserver.mydomain.com
in the past this did a scan on my server and presented me the complete output. This is no longer working as --regular is not recognized.
Now I can do ".\sslyze.exe myserver.mydomein.com" and get the result, but then my internal CA is not included in the check.
When I try ".\sslyze.exe --certinfo_ca_file=.\pem_files\myca.pem --certinfo myserver.mydomain.com" the cert is validated against my CA, but all the additional information about TLS versions and vulnerabilities is missing.
I also checked the options and did not find anything that does what --regular did. Was this removed by accident? Because an option that tests for everything would be nice.
The text was updated successfully, but these errors were encountered: