Perspectives-Server icon indicating copy to clipboard operation
Perspectives-Server copied to clipboard

ssl_scan_sock sending old TLS headers?

Open daveschaefer opened this issue 12 years ago • 3 comments

If you do not scan with SNI, ssl_scan_sock gets a 'protocol version' error from some sites:

python ssl_scan_sock.py howsmyssl.com:443 Error scanning howsmyssl.com:443 - Fatal (2): Code 70 - Protocol Version: The protocol version sent is recognized but not supported.

Perhaps this is happening because we're sending an old client_hello message from an older TLS spec? This should be updated.

daveschaefer avatar Jan 23 '14 07:01 daveschaefer

Apparently the hex contstants in ssl_scan_sock.py may be raw captures from a Wireshark trace. We may be able to trace a client hello with a newer version of openssl, or perhaps we could decipher the constants and write them in a more maintainable way.

daveschaefer avatar Jan 30 '14 05:01 daveschaefer

While working on this a long while back I found a number of things that should be fixed. Created #45 to track it all.

daveschaefer avatar Oct 16 '14 04:10 daveschaefer

consider closing this issue, because SNI is implemented in OpenSSL long time ago, and I've also fixed it implementing a round-robin for OpenSSL scanner

netsafe avatar Jun 20 '15 14:06 netsafe