You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When scanning an Apache server where client certificate is required (SSLVerifyClient verbs shall be set to "require" in /etc/apache2/sites-enabled/default-ssl.conf), SSLyze wrongly claims that this server doesn't support TLSv1.2 (only TLSv1.3).
When client certificate auhtentication is deactivated in Apache, SSLyze reports TLSv1.2 as supported by the server.
To Reproduce
Install an Apache server where client certificate authentication is required
Install SSLyze using pip, for instance
Run SSLyze (sslyze 1.2.3.4)
Deactivate client certificate authentication in Apache configuration, then relaunch Apache process
Run sslyze in the same way as in 3
Expected behavior
SSLyze should report TLSv1.2 as supported whether client cert auth is activated or not.
Environment
OS: Ubuntu 20.04
Python 3.8.5
Additional context
sslyze logs when client authentication is activated (sslyze_log_with_cli_auth)
sslyze logs when client authentication is deactivated (sslyze_log_no_cli_auth)
ssl traffic capture when client authentication is activated (scan_sslyze_with_cli_auth_TLSv12_undetected.pcap).
frame n°45 (dst port = 56134) is a TLSv1.2 ClientHello;
Server response is a ServerHello in frame n°49, and this ServerHello cannot be considered as a TLSv1.3 ServerHello:
- TLS version is 1.2 (no supported_versions extension can be found)
- Selected CipherSuite is 0xc030 (possible CipherSuites in TLSv1.3 are 0x1301, 0x1302, 0x1303, 0x1304, 0x1305)
- Moreover, server certificate is sent in plaintext (afaik server certificate is encrypted in TLSv1.3).
The text was updated successfully, but these errors were encountered:
The bug
When scanning an Apache server where client certificate is required (SSLVerifyClient verbs shall be set to "require" in /etc/apache2/sites-enabled/default-ssl.conf), SSLyze wrongly claims that this server doesn't support TLSv1.2 (only TLSv1.3).
When client certificate auhtentication is deactivated in Apache, SSLyze reports TLSv1.2 as supported by the server.
To Reproduce
Expected behavior
SSLyze should report TLSv1.2 as supported whether client cert auth is activated or not.
Environment
Additional context
issue_github_sslyze.zip
In this pcap,
- TLS version is 1.2 (no supported_versions extension can be found)
- Selected CipherSuite is 0xc030 (possible CipherSuites in TLSv1.3 are 0x1301, 0x1302, 0x1303, 0x1304, 0x1305)
- Moreover, server certificate is sent in plaintext (afaik server certificate is encrypted in TLSv1.3).
The text was updated successfully, but these errors were encountered: