Just a thought - there may also be some value in reporting
an informational entry in an audit listing all ciphers
supported on an SSL connection (regardless of their known
strength). Sort of like what is done for web server banners.

Thomas


Veerendra GG wrote:
> All,
> 
> ssl cipher nasl plugin has been released to svn.
> secpod_ssl_ciphers.nasl
> secpod_ssl_ciphers.inc
> 
> This nasl plugin will identify and list out the weak ciphers
> supported by server for sslv2, sslv3 and tlsv1 protocols.
> 
> The weak cipher list has been taken from ssl enum tool.
> http://code.google.com/p/ssl-enum
> 
> feedback are always welcome.. :)
> 
> 
> -- 
> regards,
> Veerendra GG
> 
> Security Research Analyst @ SecPod
> Phone : 91-9886535533
> 
> #L-16, 3rd Cross, 26th Main Road,
> 1st Phase, JP Nagar, Bangalore-78
> Tel: 91-80-41214020
> Fax: 91-80-41214020
> http://www.secpod.com
> 
> 
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Openvas-devel mailing list
> [email protected]
> http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

_______________________________________________
Openvas-plugins mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins

Reply via email to