Skip to content

Commit e5ec7ac

Browse files
committed
add opossum to docs
1 parent 9349611 commit e5ec7ac

3 files changed

Lines changed: 13 additions & 3 deletions

File tree

doc/testssl.1

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -659,6 +659,9 @@ variable \f[CR]CCS_MAX_WAITSOCK\f[R].
659659
\f[CR]\-T, \-\-ticketbleed\f[R] Checks for Ticketbleed memory leakage in
660660
BigIP loadbalancers.
661661
.PP
662+
\f[CR]\-\-OP, \-\-opossum\f[R] Checks for HTTP to HTTPS upgrade
663+
vulnerability named Opossum.
664+
.PP
662665
\f[CR]\-\-BB, \-\-robot\f[R] Checks for vulnerability to ROBOT /
663666
(\f[I]Return Of Bleichenbacher\[cq]s Oracle Threat\f[R]) attack.
664667
.PP
@@ -1312,6 +1315,8 @@ RFC 2246: The TLS Protocol Version 1.0
13121315
.IP \[bu] 2
13131316
RFC 2595: Using TLS with IMAP, POP3 and ACAP
13141317
.IP \[bu] 2
1318+
RFC 2817: Upgrading to TLS Within HTTP/1.1
1319+
.IP \[bu] 2
13151320
RFC 2818: HTTP Over TLS
13161321
.IP \[bu] 2
13171322
RFC 2830: Lightweight Directory Access Protocol (v3): Extension for

doc/testssl.1.html

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -590,6 +590,8 @@ <h3 id="vulnerabilities">VULNERABILITIES</h3>
590590
<code>CCS_MAX_WAITSOCK</code>.</p>
591591
<p><code>-T, --ticketbleed</code> Checks for Ticketbleed memory
592592
leakage in BigIP loadbalancers.</p>
593+
<p><code>--OP, --opossum</code> Checks for HTTP to HTTPS upgrade
594+
vulnerability named Opossum.</p>
593595
<p><code>--BB, --robot</code> Checks for vulnerability to ROBOT
594596
/ (<em>Return Of Bleichenbacher’s Oracle Threat</em>)
595597
attack.</p>
@@ -1131,6 +1133,7 @@ <h2 id="rfcs-and-other-standards">RFCs and other standards</h2>
11311133
<ul>
11321134
<li>RFC 2246: The TLS Protocol Version 1.0</li>
11331135
<li>RFC 2595: Using TLS with IMAP, POP3 and ACAP</li>
1136+
<li>RFC 2817: Upgrading to TLS Within HTTP/1.1</li>
11341137
<li>RFC 2818: HTTP Over TLS</li>
11351138
<li>RFC 2830: Lightweight Directory Access Protocol (v3):
11361139
Extension for Transport Layer Security</li>

doc/testssl.1.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -236,9 +236,11 @@ Also for multiple server certificates are being checked for as well as for the c
236236

237237
`-T, --ticketbleed` Checks for Ticketbleed memory leakage in BigIP loadbalancers.
238238

239-
`--BB, --robot` Checks for vulnerability to ROBOT / (*Return Of Bleichenbacher's Oracle Threat*) attack.
239+
`--OP, --opossum` Checks for HTTP to HTTPS upgrade vulnerability named Opossum.
240240

241-
`--SI, --starttls-injection` Checks for STARTTLS injection vulnerabilities (SMTP, IMAP, POP3 only). `socat` and OpenSSL >=1.1.0 is needed.
241+
`--BB, --robot` Checks for vulnerability to ROBOT / (*Return Of Bleichenbacher's Oracle Threat*) attack.
242+
243+
`--SI, --starttls-injection` Checks for STARTTLS injection vulnerabilities (SMTP, IMAP, POP3 only). `socat` and OpenSSL >=1.1.0 is needed.
242244

243245
`-R, --renegotiation` Tests renegotiation vulnerabilities. Currently there's a check for *Secure Renegotiation* and for *Secure Client-Initiated Renegotiation*. Please be aware that vulnerable servers to the latter can likely be DoSed very easily (HTTP). A check for *Insecure Client-Initiated Renegotiation* is not yet implemented.
244246

@@ -490,6 +492,7 @@ Please note that for plain TLS-encrypted ports you must not specify the protocol
490492

491493
* RFC 2246: The TLS Protocol Version 1.0
492494
* RFC 2595: Using TLS with IMAP, POP3 and ACAP
495+
* RFC 2817: Upgrading to TLS Within HTTP/1.1
493496
* RFC 2818: HTTP Over TLS
494497
* RFC 2830: Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security
495498
* RFC 3207: SMTP Service Extension for Secure SMTP over Transport Layer Security
@@ -551,7 +554,6 @@ Please note that for plain TLS-encrypted ports you must not specify the protocol
551554

552555
**etc/client-simulation.txt** contains client simulation data.
553556

554-
555557
**etc/cipher-mapping.txt** provides a mandatory file with mapping from OpenSSL cipher suites names to the ones from IANA / used in the RFCs.
556558

557559
**etc/tls_data.txt** provides a mandatory file for ciphers (bash sockets) and key material.

0 commit comments

Comments
 (0)