mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Restore Supported Point Formats Extension. Fixes #1187
Some servers are not compliant with RFC 4492, section 4, and abort the handshake when the extension is missing.
This commit is contained in:
@@ -516,7 +516,13 @@ local function base_extensions(host)
|
|||||||
local tlsname = tls.servername(host)
|
local tlsname = tls.servername(host)
|
||||||
return {
|
return {
|
||||||
-- Claim to support common elliptic curves
|
-- Claim to support common elliptic curves
|
||||||
|
-- TODO: Determine desire to comply with RFC 4492, section 4:
|
||||||
|
-- "The client MUST NOT include these extensions in the ClientHello
|
||||||
|
-- message if it does not propose any ECC cipher suites."
|
||||||
|
-- OTOH, OpenSSL 1.1.1 sends them always so it is probably safe.
|
||||||
["elliptic_curves"] = tls.EXTENSION_HELPERS["elliptic_curves"](tls.DEFAULT_ELLIPTIC_CURVES),
|
["elliptic_curves"] = tls.EXTENSION_HELPERS["elliptic_curves"](tls.DEFAULT_ELLIPTIC_CURVES),
|
||||||
|
-- Some servers require Supported Point Formats Extension
|
||||||
|
["ec_point_formats"] = tls.EXTENSION_HELPERS["ec_point_formats"]({"uncompressed"}),
|
||||||
-- Enable SNI if a server name is available
|
-- Enable SNI if a server name is available
|
||||||
["server_name"] = tlsname and tls.EXTENSION_HELPERS["server_name"](tlsname),
|
["server_name"] = tlsname and tls.EXTENSION_HELPERS["server_name"](tlsname),
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user