-
Notifications
You must be signed in to change notification settings - Fork 456
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Heartbleed not detected #202
Comments
Thanks - this was a timing issue. |
This is unfortunately again an issue. I can privatly share a vulnerable system with you if needed. |
@al3xdelarge can you send it to my email address (on my GH profile)? Thanks! |
Just sent it. Thank you! |
@al3xdelarge I finally looked into it. This was due to the server's TLS stack not supporting the Server Name Indication extension (or just rejecting any name sent via SNI). Since SSLyze always sends the SNI extension, the server was always returning a TLS Alert 112 "unrecognized_name" (ie. rejecting the SNI extension's value), ending the TLS handshake before SSLyze could test for Heartbleed and CCS. The fix I just committed was to remove the SNI extension from all checks (including Heartbleed and CCS) except the certificate_info check which requires it. With this changes, SSLyze correctly flags the server you sent me as vulnerable. |
Fixed in v3.0.3. |
Seems that the heartbleed plugin does not detect a heartbleed vuln. correctly.
example site: ascn.papasg.com
The text was updated successfully, but these errors were encountered: