-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Description
I'm experiencing the same inconsistency in the results as in issue #1107, when repeatedly testing the same Debian server.
Here is an example for ports 465 (SSL-only) and 587 (STARTTLS):
# IP address of the server is 192.252.146.33
famzah@vbox64:~/testssl$ for i in {1..20} ; do ./testssl.sh --robot famzah.net:465|grep " ROBOT" ; done
ROBOT not vulnerable (OK)
ROBOT VULNERABLE (NOT ok)
ROBOT VULNERABLE (NOT ok) - weakly vulnerable as the attack would take too long
famzah@vbox64:~/testssl$ for i in {1..20} ; do ./testssl.sh --robot --starttls smtp famzah.net:587|grep " ROBOT" ; done
ROBOT not vulnerable (OK)
ROBOT VULNERABLE (NOT ok)
ROBOT VULNERABLE (NOT ok) - weakly vulnerable as the attack would take too longI cannot reproduce this on port 25 (STARTTLS) where I consistently get "not vulnerable (OK)". This is the expected result as the server is using the patched OpenSSL by Debian. The server is running Debian Buster and OpenSSL is version "1.1.1d-0+deb10u7". Note: ports 465 & 587 are served by a different server implementation compared to the server for port 25. I cannot disclose more about the implementations.
You should be able to reproduce on your end easily. It takes a couple of attempts to get different results. Usually in less than 10 attempts you will encounter a different result.
It you can't reproduce, I have saved the screen output and the "/tmp" dir content for both "not vulnerable (OK)" and "VULNERABLE (NOT ok)" runs executed with debug=3. If you need the saved data, I will attach it here.
The question is -- Is "testssl.sh" encountering a bug and reports inconsistent results, or is it the server for ports 465 & 587 which does something weird and really is vulnerable.
Thank you.
Here is my environment:
famzah@vbox64:~/testssl$ ./testssl.sh -b 2>/dev/null | grep "from"
testssl.sh 3.0.6 from https://testssl.sh/
famzah@vbox64:~/testssl$ ./testssl.sh -b 2>/dev/null | grep -A3 OpenSSL
Using "OpenSSL 1.1.1f 31 Mar 2020" [~79 ciphers]
on vbox64:/usr/bin/openssl
(built: "Aug 23 17:02:39 2021", platform: "debian-amd64")
# maybe related to: https://github.com/drwetter/testssl.sh/issues/1119
famzah@vbox64:~/testssl$ ./testssl.sh --robot --starttls smtp famzah.net:587|head -n2|tail -n1
No engine or GOST support via engine with your /usr/bin/openssl
famzah@vbox64:~/testssl$ lsb_release -a
Description: Ubuntu 20.04.3 LTS
famzah@vbox64:~/testssl$ uname -a
Linux vbox64 5.4.0-92-generic #103-Ubuntu SMP Fri Nov 26 16:13:00 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux