diff --git a/CHANGELOG b/CHANGELOG index e044be19a..4dbd9dd91 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -1,5 +1,16 @@ # Nmap Changelog ($Id$); -*-text-*- +o Version detection now has a generic match line for SSLv3 servers, + which matches more servers than the already-existing set of specific + match lines. The match line found 13% more SSL servers in a test. + Note that Nmap will not be able to do SSL scan-through against a + small fraction of these servers, those that are SSLv3-only or + TLSv1-only, because that ability is not yet built into Nsock. There + is also a new version detection probe that works against SSLv2-only + servers. These have shown themselves to be very rare, so that probe + is not sent by default. Kristof Boeynaems provided the patch and did + the testing. + o [Zenmap] A bug was fixed that caused a crash when doing a keyword: or target: search over hosts that had a MAC address. [David] The crash output was diff --git a/nmap-service-probes b/nmap-service-probes index 97e5e1cd0..e311ae9ec 100644 --- a/nmap-service-probes +++ b/nmap-service-probes @@ -6485,6 +6485,9 @@ match nut m|^Commands: VER REQ HELP LISTVARS LOGOUT LOGIN PASSWORD LISTRW VARTYP match webster m/^DICTIONARY server protocol:\r\n\r\nContact name is/ p/Webster dictionary server/ ##############################NEXT PROBE############################## +# SSLv3 ClientHello probe. Will be able to reliably identify the SSL version +# used, unless the server is running SSLv2 only. Note that it will also detect +# TLSv1-only servers, based on a failed handshake alert. Probe TCP SSLSessionReq q|\x16\x03\0\0S\x01\0\0O\x03\0?G\xd7\xf7\xba,\xee\xea\xb2`~\xf3\0\xfd\x82{\xb9\xd5\x96\xc8w\x9b\xe6\xc4\xdb<=\xdbo\xef\x10n\0\0(\0\x16\0\x13\0\x0a\0f\0\x05\0\x04\0e\0d\0c\0b\0a\0`\0\x15\0\x12\0\x09\0\x14\0\x11\0\x08\0\x06\0\x03\x01\0| rarity 3 @@ -6505,25 +6508,16 @@ match login m|^\0\r\nlogin: \^W\^@\^@\^@\^| p/VxWorks logind/ o/VxWorks/ match maxdb m|^.Rejected bad connect packet\0$|s p/SAP MaxDB/ -# OpenSSL/0.9.7aa -match ssl m|^\x16\x03\0\0J\x02\0\0F\x03\0| p/OpenSSL/ - -# Don't think these 2 are correct: -#match ssl m|^\x16\x03\0\x04#\x02\0\0F\x03\0| p/Apache Tomcat SSL/ -#match ssl m|^\x16\x03\0\0\*\x02\0\0&\x03\0| p/Apache mod_ssl/ +# OpenSSL/0.9.7aa, 0.9.8e +match ssl m|^\x16\x03\0\0J\x02\0\0F\x03\0| p/OpenSSL/ i/SSLv3/ # Microsoft-IIS/5.0 - note that OpenSSL must go above this one because this is more general match ssl m|^\x16\x03\0..\x02\0\0F\x03\0|s p/Microsoft IIS SSL/ o/Windows/ # Novell Netware 6 Enterprise Web server 5.1 https # Novell Netware Ldap over SSL or enterprise web server 5.1 over SSL match ssl m|^\x16\x03\0\0:\x02\0\x006\x03\0| p/Novell Netware SSL/ o/NetWare/ -# Very generic: -match ssl m|^\x16\x03\0\0\*\x02\0\0&\x03\0| # Cisco IDS 4.1 Appliance match ssl m|^\x16\x03\0\0\*\x02\0\0&\x03\0\xd10:\xbd\\\x8e\xe3\x15\x1c\x0fZ\xe4\x04\x87\x07\xc0\x82\xa9\xd4\x0e\x9c1LXk\xd1\xd2\x0b\x1a\xc6/p\0\0\n\0\x16\x03\0\x026\x0b\0\x022\0| p/Cisco IDS SSL/ d/firewall/ -# These Nessus match lines might be problematic: -match ssl m|^\x15\x03\0\0\x02\x02\($| p/Nessus security scanner/ -match ssl m|^\x16\x03\x01\0J\x02\0\0F\x03\x01| p/Nessus security scanner/ # PGP Corporation Keyserver Web Console 7.0 - custom Apache 1.3 # PGP LDAPS Keyserver 8.X match ssl m|^\x16\x03\0\0\+\x02\0\0'\x03\0...\?|s p/PGP Corporation product SSL/ @@ -6549,6 +6543,33 @@ match tor m|^\x16\x03\0\0\*\x02\0\0&\x03\0.*T[oO][rR]1.*[\x00-\x20]([-\w_.]+)