-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS-TLS Vulnerability(s) #1384
Comments
Yeah, that's possible, but this should be a separate feature request. |
With v0.107.5 installed from Snapcraft, testssl is still throwing the same warning. Can this be double checked? Output from testssl
|
@xDazld, iirc, both SWEET32 and LUCKY13 have mitigations in Go stdlib. We've completely excluded all CBC ciphers in v0.108 betas, which is a breaking change (and thus will be released in the next “zero-major” version), but it resolves those completely. |
Got it, thanks. |
Issue Details
So I ran the https://github.com/drwetter/testssl.sh tool against the DNS-o-TLS port (853).
Vulnerabilities Information
Additional Information
Shouldn't be offering:
Possibility to have OSCP Stapling?
The text was updated successfully, but these errors were encountered: