Just a thought - there may also be some value in reporting an informational entry in an audit listing all ciphers supported on an SSL connection (regardless of their known strength). Sort of like what is done for web server banners.
Thomas Veerendra GG wrote: > All, > > ssl cipher nasl plugin has been released to svn. > secpod_ssl_ciphers.nasl > secpod_ssl_ciphers.inc > > This nasl plugin will identify and list out the weak ciphers > supported by server for sslv2, sslv3 and tlsv1 protocols. > > The weak cipher list has been taken from ssl enum tool. > http://code.google.com/p/ssl-enum > > feedback are always welcome.. :) > > > -- > regards, > Veerendra GG > > Security Research Analyst @ SecPod > Phone : 91-9886535533 > > #L-16, 3rd Cross, 26th Main Road, > 1st Phase, JP Nagar, Bangalore-78 > Tel: 91-80-41214020 > Fax: 91-80-41214020 > http://www.secpod.com > > > > > ------------------------------------------------------------------------ > > _______________________________________________ > Openvas-devel mailing list > [email protected] > http://lists.wald.intevation.org/mailman/listinfo/openvas-devel _______________________________________________ Openvas-plugins mailing list [email protected] http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins
