-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding Vulnerability Scans to Scan #453
base: master
Are you sure you want to change the base?
Conversation
HostIp: hostname, | ||
} | ||
|
||
u, err := url.Parse(tgt.HostIp) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's assumed that hostname
will never have a scheme.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah, ok. I'll be sure to take that out.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you need some err handling after this?
return | ||
} | ||
|
||
func BERserkScan(addr, hostname string) (grade Grade, output Output, err error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks like Travis failed here, since this function name's first letter is capitalized, add a comment above it or uncapitalized it. Reference: http://www.goinggo.net/2014/03/exportedunexported-identifiers-in-go.html
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah, yes. I'll get to that, thanks.
if serverCipher != 0 { | ||
certData, err := certinfo.ParseCertificateDomain(hostname) | ||
if err != nil { | ||
grade = Bad |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All these grade = Bad
can be removed and return grade, output, err
is the same as just return
I think it might be best to separate this out into a couple smaller PRs. Mainly I'd pull out the heartbleed check to simplify what's being added a bit and maybe Logjam as that's going to require quite a bit more work to finish. |
orphaned PR? |
Part of https://github.com/cloudflare/cfssl/wiki/Adding-Vulnerability-scaning-to-Scan. Extends CFSSL Scan to scan a host for vulnerability to Heartbleed using https://github.com/FiloSottile/Heartbleed.