mirror of
https://github.com/mail-in-a-box/mailinabox.git
synced 2024-11-25 02:47:04 +00:00
165 lines
7.4 KiB
Python
165 lines
7.4 KiB
Python
#!/usr/bin/python3
|
|
|
|
# Runs SSLyze on the TLS endpoints of a box and outputs
|
|
# the results so we can inspect the settings and compare
|
|
# against a known good version in tls_results.txt.
|
|
#
|
|
# Make sure you have SSLyze available:
|
|
# wget https://github.com/nabla-c0d3/sslyze/releases/download/release-0.11/sslyze-0_11-linux64.zip
|
|
# unzip sslyze-0_11-linux64.zip
|
|
#
|
|
# Then run:
|
|
#
|
|
# python3 tls.py yourservername
|
|
#
|
|
# If you are on a residential network that blocks outbound
|
|
# port 25 connections, then you can proxy the connections
|
|
# through some other host you can ssh into (maybe the box
|
|
# itself?):
|
|
#
|
|
# python3 tls.py --proxy user@ssh_host yourservername
|
|
#
|
|
# (This will launch "ssh -N -L10023:yourservername:testport user@ssh_host"
|
|
# to create a tunnel.)
|
|
|
|
import sys, subprocess, re, time, json, csv, io, urllib.request
|
|
|
|
######################################################################
|
|
|
|
# PARSE COMMAND LINE
|
|
|
|
proxy = None
|
|
args = list(sys.argv[1:])
|
|
while len(args) > 0:
|
|
if args[0] == "--proxy":
|
|
args.pop(0)
|
|
proxy = args.pop(0)
|
|
break
|
|
|
|
if len(args) == 0:
|
|
print("Usage: python3 tls.py [--proxy ssh_host] hostname")
|
|
sys.exit(0)
|
|
|
|
host = args[0]
|
|
|
|
######################################################################
|
|
|
|
SSLYZE = "sslyze-0_11-linux64/sslyze/sslyze.py"
|
|
|
|
common_opts = ["--sslv2", "--sslv3", "--tlsv1", "--tlsv1_1", "--tlsv1_2", "--reneg", "--resum",
|
|
"--hide_rejected_ciphers", "--compression", "--heartbleed"]
|
|
|
|
# Recommendations from Mozilla as of May 20, 2015 at
|
|
# https://wiki.mozilla.org/Security/Server_Side_TLS.
|
|
#
|
|
# The 'modern' ciphers support Firefox 27, Chrome 22, IE 11,
|
|
# Opera 14, Safari 7, Android 4.4, Java 8. Assumes TLSv1.1,
|
|
# TLSv1.2 only, though we may also be allowing TLSv3.
|
|
#
|
|
# The 'intermediate' ciphers support Firefox 1, Chrome 1, IE 7,
|
|
# Opera 5, Safari 1, Windows XP IE8, Android 2.3, Java 7.
|
|
# Assumes TLSv1, TLSv1.1, TLSv1.2.
|
|
#
|
|
# The 'old' ciphers bring compatibility back to Win XP IE 6.
|
|
MOZILLA_CIPHERS_MODERN = "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256"
|
|
MOZILLA_CIPHERS_INTERMEDIATE = "ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS"
|
|
MOZILLA_CIPHERS_OLD = "ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP"
|
|
|
|
######################################################################
|
|
|
|
def sslyze(opts, port, ok_ciphers):
|
|
# Print header.
|
|
header = ("PORT %d" % port)
|
|
print(header)
|
|
print("-" * (len(header)))
|
|
|
|
# What ciphers should we expect?
|
|
ok_ciphers = subprocess.check_output(["openssl", "ciphers", ok_ciphers]).decode("utf8").strip().split(":")
|
|
|
|
# Form the SSLyze connection string.
|
|
connection_string = host + ":" + str(port)
|
|
|
|
# Proxy via SSH.
|
|
proxy_proc = None
|
|
if proxy:
|
|
connection_string = "localhost:10023"
|
|
proxy_proc = subprocess.Popen(["ssh", "-N", "-L10023:%s:%d" % (host, port), proxy])
|
|
time.sleep(3)
|
|
|
|
try:
|
|
# Execute SSLyze.
|
|
out = subprocess.check_output([SSLYZE] + common_opts + opts + [connection_string])
|
|
out = out.decode("utf8")
|
|
|
|
# Trim output to make better for storing in git.
|
|
if "SCAN RESULTS FOR" not in out:
|
|
# Failed. Just output the error.
|
|
out = re.sub("[\w\W]*CHECKING HOST\(S\) AVAILABILITY\n\s*-+\n", "", out) # chop off header that shows the host we queried
|
|
out = re.sub("[\w\W]*SCAN RESULTS FOR.*\n\s*-+\n", "", out) # chop off header that shows the host we queried
|
|
out = re.sub("SCAN COMPLETED IN .*", "", out)
|
|
out = out.rstrip(" \n-") + "\n"
|
|
|
|
# Print.
|
|
print(out)
|
|
|
|
# Pull out the accepted ciphers list for each SSL/TLS protocol
|
|
# version outputted.
|
|
accepted_ciphers = set()
|
|
for ciphers in re.findall(" Accepted:([\w\W]*?)\n *\n", out):
|
|
accepted_ciphers |= set(re.findall("\n\s*(\S*)", ciphers))
|
|
|
|
# Compare to what Mozilla recommends, for a given modernness-level.
|
|
print(" Should Not Offer: " + (", ".join(sorted(accepted_ciphers-set(ok_ciphers))) or "(none -- good)"))
|
|
print(" Could Also Offer: " + (", ".join(sorted(set(ok_ciphers)-accepted_ciphers)) or "(none -- good)"))
|
|
|
|
# What clients does that mean we support on this protocol?
|
|
supported_clients = { }
|
|
for cipher in accepted_ciphers:
|
|
if cipher in cipher_clients:
|
|
for client in cipher_clients[cipher]:
|
|
supported_clients[client] = supported_clients.get(client, 0) + 1
|
|
print(" Supported Clients: " + (", ".join(sorted(supported_clients.keys(), key = lambda client : -supported_clients[client]))))
|
|
|
|
# Blank line.
|
|
print()
|
|
|
|
finally:
|
|
if proxy_proc:
|
|
proxy_proc.terminate()
|
|
try:
|
|
proxy_proc.wait(5)
|
|
except subprocess.TimeoutExpired:
|
|
proxy_proc.kill()
|
|
|
|
# Get a list of OpenSSL cipher names.
|
|
cipher_names = { }
|
|
for cipher in csv.DictReader(io.StringIO(urllib.request.urlopen("https://raw.githubusercontent.com/mail-in-a-box/user-agent-tls-capabilities/master/cipher_names.csv").read().decode("utf8"))):
|
|
# not sure why there are some multi-line values, use first line:
|
|
cipher["OpenSSL"] = cipher["OpenSSL"].split("\n")[0]
|
|
cipher_names[cipher["IANA"]] = cipher["OpenSSL"]
|
|
|
|
# Get a list of what clients support what ciphers, using OpenSSL cipher names.
|
|
client_compatibility = json.loads(urllib.request.urlopen("https://raw.githubusercontent.com/mail-in-a-box/user-agent-tls-capabilities/master/clients.json").read().decode("utf8"))
|
|
cipher_clients = { }
|
|
for client in client_compatibility:
|
|
if len(set(client['protocols']) & set(["TLS 1.0", "TLS 1.1", "TLS 1.2"])) == 0: continue # does not support TLS
|
|
for cipher in client['ciphers']:
|
|
cipher_clients.setdefault(cipher_names.get(cipher), set()).add("/".join(x for x in [client['client']['name'], client['client']['version'], client['client']['platform']] if x))
|
|
|
|
# Run SSLyze on various ports.
|
|
|
|
# SMTP
|
|
sslyze(["--starttls=smtp"], 25, MOZILLA_CIPHERS_OLD)
|
|
|
|
# SMTP Submission
|
|
sslyze(["--starttls=smtp"], 587, MOZILLA_CIPHERS_MODERN)
|
|
|
|
# HTTPS
|
|
sslyze(["--http_get", "--chrome_sha1", "--hsts"], 443, MOZILLA_CIPHERS_INTERMEDIATE)
|
|
|
|
# IMAP
|
|
sslyze([], 993, MOZILLA_CIPHERS_MODERN)
|
|
|
|
# POP3
|
|
sslyze([], 995, MOZILLA_CIPHERS_MODERN)
|