-
-
Notifications
You must be signed in to change notification settings - Fork 219
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Config analysis for more services #331
Comments
Regarding lighttpd we could easily check for some of the documented options: https://wiki.alpinelinux.org/wiki/Lighttpd_Advanced_security
Further ideas? |
This issue is stale because it has been open for 28 days with no activity. |
This issue is stale because it has been open for 28 days with no activity. |
FYI: lighttpd 1.4.68 and later TLS defaults are now stronger. In the modern lighttpd config, the default set of ciphers all support perfect forward secrecy (PFS) and none of the ciphers in the default ciphers list are vulnerable to BEAST or Poodle, so lighttpd recommends leaving other TLS settings at their defaults, too. |
This issue is stale because it has been open for 28 days with no activity. |
Is your feature request related to a problem? Please describe.
There are multiple services we found in firmware:
Describe the solution you'd like
EMBA should be able to analyse the configuration files of these services
The text was updated successfully, but these errors were encountered: