Bug 1056650

Summary: Scan incomplete with server requiring client certificate
Product: [Fedora] Fedora Reporter: Stephan Mueller <smueller>
Component: sslscanAssignee: Michal Ambroz <rebus>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 20CC: rebus
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: sslscan-1.10.2-1.el6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-02-17 21:09:24 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Stephan Mueller 2014-01-22 16:01:22 UTC
Description of problem:
When using sslscan against a server that is configured to only allow requests based with a valid client SSL certificate (aka bi-directional authentication), and sslscan cannot offer such a certificate, sslscan will not report any results.

The TLS handshake agrees on the cipher as part of the Client/Server Hello and before the certificate authentication is completed. That means that for scanning a TLS server to see which ciphers are supported, there is NO need for a client certificate and even NO need for a successful TLS session establishment.

sslscan, however, seem to require a successful TLS session establishment before it reports the status on a connection. When reimplementing sslscan with a script as follows, the script will produce the intended output, whereas sslscan does not report status:

ciphers=$(openssl ciphers ALL | sed 's/:/ /g')
protos="ssl2 ssl3 tls1 tls1_1 tls1_2"

for p in $protos
do
        for c in $ciphers
        do
                openssl s_client -connect ${SERVER}:${PORT} -cipher ${c} -${p} > ${SERVER}.${c}.${p}
        done
done

Version-Release number of selected component (if applicable):

version 1.10.1 (and I guess all earlier versions)


How reproducible:
always


Steps to Reproduce:
1. Set up a server with bidirectional authentication requirement
2. sslscan <server>
3. Monitor output of sslscan

Actual results:
no scan results of supported ciphers

Expected results:
scan results with supported ciphers


Additional info:
N/A

Comment 1 Michal Ambroz 2014-01-28 18:19:22 UTC
Submitted upstream as enhancement request:
https://github.com/DinoTools/sslscan/issues/8

Comment 2 Fedora Update System 2014-02-16 16:40:03 UTC
sslscan-1.10.2-1.fc20 has been submitted as an update for Fedora 20.
https://admin.fedoraproject.org/updates/sslscan-1.10.2-1.fc20

Comment 3 Fedora Update System 2014-02-16 16:40:12 UTC
sslscan-1.10.2-1.fc19 has been submitted as an update for Fedora 19.
https://admin.fedoraproject.org/updates/sslscan-1.10.2-1.fc19

Comment 4 Fedora Update System 2014-02-16 16:40:20 UTC
sslscan-1.10.2-1.el6 has been submitted as an update for Fedora EPEL 6.
https://admin.fedoraproject.org/updates/sslscan-1.10.2-1.el6

Comment 5 Fedora Update System 2014-02-17 21:06:28 UTC
Package sslscan-1.10.2-1.fc19:
* should fix your issue,
* was pushed to the Fedora 19 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing sslscan-1.10.2-1.fc19'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2014-2655/sslscan-1.10.2-1.fc19
then log in and leave karma (feedback).

Comment 6 Fedora Update System 2014-02-17 21:09:24 UTC
sslscan-1.10.2-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2014-02-20 00:42:59 UTC
sslscan-1.10.2-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2014-02-20 06:59:17 UTC
sslscan-1.10.2-1.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.