Taras, On Fri, Jun 1, 2012 at 1:41 PM, Taras <ox...@oxdef.info> wrote: > Andres, > > please take into account that it is not final version yet. > > >> * If we're not going to use openssl anymore, shouldn't we remove it >> from the dependency check file? > > Not yet because it is used at least in proxy.py :( We also need to migrate > there to ssl module.
Ahhh, understood! >> >> try: >> from OpenSSL import SSL >> except: >> packages.append('pyOpenSSL') >> packages_debian.append('python-pyopenssl') >> packages_mac_ports.extend(['py26-openssl']) >> reasonForExit = True >> #mem_test('after ssl import') >> >> * "class sslCertificate2" , that won't work, the plugin filename and >> the class should have the same name > > I have fixed before your sent mail ;) Great, >> >> * I recommend storing ca.pem in plugins/audit/sslCertificate/ca.pem > > Agree > >> >> * What happens if the remote end uses a different version of SSL in >> the line that says: "ssl_version=ssl.PROTOCOL_SSLv23" ? > > See table for such cases [0]. > >> >> * I think this is an info() "v.setName('Invalid SSL >> certificate/connection')" > > We have already discussed that any problem which could cause browser show to > the user invalid certificate is vuln with low severity. What was changed? The problem is that in this case you're creating a vuln() when the connection fails, not when there is an old SSL vuln or some problem with SSL. I completely agree with vuln() for something that's a vulnerability... but not for a SSL connection error that might happen because of a timeout. > For soon expire certificate I use info object. Agreed, > >> * Not sure why we do this? >> ssl_sock.write("""GET / HTTP/1.0\r\n\r\n""") >> data = ssl_sock.read() > > What do yo mean here? My point is that we don't really need to send any information to the server because we already have the SSL which is what we needed. > >> * We lost some features, right? > > Check for SSL version was incorrect. But I think I have found > how we can check it. Give some time :) > >> >> 1) >> # Print the SSL information to the log >> desc = 'This is the information about the SSL certificate >> used in the target site:' > > ... > Do we need this information? If yes I can try to make some clone of > dump_x509 cert function. Would be good, >> >> 2) >> desc = 'The certificate is using an old version of SSL > > See above. That's a vuln() , we need it. >> 3) And some other things that were in the previous version. > > All other things like expired certificate or incorrect wildcard domain now > should checks ssl module. > What else? I just want to make sure we're not loosing things we already had ! > [0] http://docs.python.org/library/ssl#ssl.wrap_socket > > >> On Fri, Jun 1, 2012 at 3:00 PM,<ox...@users.sourceforge.net> wrote: >>> >>> Revision: 5038 >>> http://w3af.svn.sourceforge.net/w3af/?rev=5038&view=rev >>> Author: oxdef >>> Date: 2012-06-01 11:00:10 +0000 (Fri, 01 Jun 2012) >>> Log Message: >>> ----------- >>> migrated to built-in ssl module >>> >>> Modified Paths: >>> -------------- >>> branches/ssl/core/controllers/dependency_check/dependency_check.py >>> branches/ssl/plugins/audit/sslCertificate.py >>> >>> Added Paths: >>> ----------- >>> branches/ssl/plugins/audit/ca.pem >>> >>> This was sent by the SourceForge.net collaborative development platform, >>> the world's largest Open Source development site. >>> >>> >>> >>> ------------------------------------------------------------------------------ >>> Live Security Virtual Conference >>> Exclusive live event will cover all the ways today's security and >>> threat landscape has changed and how IT managers can respond. Discussions >>> will include endpoint security, mobile security and the latest in malware >>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>> _______________________________________________ >>> W3af-svn-notify mailing list >>> w3af-svn-not...@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/w3af-svn-notify >> >> >> >> > > > -- > Taras > http://oxdef.info -- Andrés Riancho Project Leader at w3af - http://w3af.org/ Web Application Attack and Audit Framework Twitter: @w3af GPG: 0x93C344F3 ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ W3af-develop mailing list W3af-develop@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/w3af-develop