sslscan fails to detect most ciphers

Bug #1798561 reported by Robin
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
sslscan (Ubuntu)
New
Undecided
Unassigned

Bug Description

The version of sslscan that's been packaged uses the system version of OpenSSL, which has removed support for most of the weak and legacy SSL ciphers. This means that it will fail to detect:

* RC4 ciphers
* Anonymous ciphers
* Null ciphers
* Most weak CBC ciphers
* Weak DHE keys
* Probably others
* SSLv3
* SSLv2

This means that it's giving extremely misleading results, and the impression that the scanned systems are secure, even if they have all the weak ciphers and protocols enabled.

sslscan has had an option for a number of years to be statically compiled against a version of OpenSSL that includes support for all these, allowing it to detect them (with `make static`), so with the current state of OpenSSL in Ubuntu, the statically build version needs to be packaged instead.

If packaging the static build isn't possible (I'm not sure what Ubuntu's policies are on this), then sslscan should be removed from the repository, because it's giving totally false information at the moment.

~Robin

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.