Michael Meyer wrote:
> *** Chandrashekhar B <bchan...@secpod.com> wrote:
>>> On Friday 12 March 2010 10:06:42 Jan-Oliver Wagner wrote:
> 
>>>> * migrate ssl_ciphers to use GnuTLS
>>> Is this the C check?  If so, I would prefer not to move to 
>>> GnuTLS.  GnuTLS is rather conservative in what ciphers it 
>>> supports and may therefore miss weak ciphers because it 
>>> doesn't support them rather than because the scanned service doesn't.
>> Yes, agree, let us invalidate this plugin and write in NASL.
> 
> But this means, do this check with GnuTLS because NASL is linked
> against it. So this will not solve Tim's concern. Or am I mistaken?
> 

Didn't someone have a potential solution for this (Chandra?) suggesting
ssl-enum?  I believe, IIRC, it was a tool set that tested for ALL
ciphers and didn't need an SSL library to do so (went straight to the
protocol level).  It was a C based tool, but it was not very
complicated.  In either case, you could either make this tool
available to be called from a nasl plugin, or with a bit more
effort, duplicate the functionality in nasl. In both cases, you
are not reliant on the scanner library's SSL cipher set limitations.

Thomas
_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

Reply via email to