diff --git a/bericht-sternwarte.zip b/bericht-sternwarte.zip new file mode 100644 index 0000000..97e436e Binary files /dev/null and b/bericht-sternwarte.zip differ diff --git a/tex/resources/200217-nmap-sternwarte.log b/tex/resources/200217-nmap-sternwarte.log index bfab73e..6378bcc 100644 --- a/tex/resources/200217-nmap-sternwarte.log +++ b/tex/resources/200217-nmap-sternwarte.log @@ -1,4 +1,4 @@ - ternwarte.at +> nmap -T3 -Pn -p0-65535 sternwarte.at Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-17 17:43 CET Nmap scan report for www.sternwarte.at (85.126.106.150) Host is up (0.052s latency). diff --git a/tex/resources/200219-testssl-mizar.log b/tex/resources/200219-testssl-mizar.log new file mode 100644 index 0000000..ec85e61 --- /dev/null +++ b/tex/resources/200219-testssl-mizar.log @@ -0,0 +1,151 @@ +> testssl.sh -t smtp nihal.mag.eu:25 + +########################################################### + testssl.sh 3.0 from https://testssl.sh/ + + This program is free software. Distribution and + modification under GPLv2 permitted. + USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! + + Please file bugs @ https://testssl.sh/bugs/ + +########################################################### + + Using "OpenSSL 1.0.2-chacha (1.0.2k-dev)" [~183 ciphers] + on gandalf:/home/fuero/Appz/testssl.sh/bin/openssl.Linux.x86_64 + (built: "Jan 18 17:12:17 2019", platform: "linux-x86_64") + + + Start 2020-02-19 17:59:15 -->> 85.126.106.142:25 (mizar.mag.eu) <<-- + + rDNS (85.126.106.142): mizar.mag.eu. + Service set: STARTTLS via SMTP + + Testing protocols via sockets + + SSLv2 not offered (OK) + SSLv3 offered (NOT ok) + TLS 1 offered (deprecated) + TLS 1.1 offered (deprecated) + TLS 1.2 offered (OK) + TLS 1.3 not offered and downgraded to a weaker protocol + + Testing cipher categories + + NULL ciphers (no encryption) not offered (OK) + Anonymous NULL Ciphers (no authentication) not offered (OK) + Export ciphers (w/o ADH+NULL) not offered (OK) + LOW: 64 Bit + DES, RC[2,4] (w/o export) offered (NOT ok) + Triple DES Ciphers / IDEA offered + Obsolete: SEED + 128+256 Bit CBC cipher offered + Strong encryption (AEAD ciphers) offered (OK) + + + Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 + + PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA + Elliptic curves offered: prime256v1 + + + Testing server preferences + + Has server cipher order? no (NOT ok) + Negotiated protocol TLSv1.2 + Negotiated cipher AES128-GCM-SHA256 -- inconclusive test, matching cipher in list missing, better see below + Negotiated cipher per proto (matching cipher in list missing) + ECDHE-RSA-AES256-SHA: SSLv3, TLSv1, TLSv1.1 + ECDHE-RSA-AES256-GCM-SHA384: TLSv1.2 + No further cipher order check has been done as order is determined by the client + + + Testing server defaults (Server Hello) + + TLS extensions (standard) "renegotiation info/#65281" "EC point formats/#11" "session ticket/#35" "heartbeat/#15" + Session Ticket RFC 5077 hint 300 seconds, session tickets keys seems to be rotated < daily + SSL Session ID support yes + Session Resumption Tickets: yes, ID: yes + TLS clock skew Random values, no fingerprinting possible + Signature Algorithm SHA256 with RSA + Server key size RSA 2048 bits + Server key usage Digital Signature, Key Encipherment + Server extended key usage TLS Web Server Authentication, TLS Web Client Authentication + Serial / Fingerprints C1EF1BDD3E650999BE7A8114A4E7FC02 / SHA1 4418A20B57042BE0FD24CBF81A5677FE63AFF784 + SHA256 A2A65517606658C876BB107A89C102E8A6CDA718B6D78082B6B497E1457F7581 + Common Name (CN) mizar.mag.eu + subjectAltName (SAN) mizar.mag.eu www.mizar.mag.eu + Issuer Don Dominio / MrDomain RSA DV CA (Soluciones Corporativas IP, SL from ES) + Trust (hostname) Ok via SAN (same w/o SNI) + Chain of trust Ok + EV cert (experimental) no + ETS/"eTLS", visibility info not present + Certificate Validity (UTC) 114 >= 60 days (2018-06-13 02:00 --> 2020-06-13 01:59) + # of certificates provided 4 + Certificate Revocation List http://crl.usertrust.com/DonDominioMrDomainRSADVCA.crl + OCSP URI http://ocsp.usertrust.com + OCSP stapling not offered + OCSP must staple extension -- + DNS CAA RR (experimental) not offered + Certificate Transparency yes (certificate extension) + + + Testing vulnerabilities + + Heartbleed (CVE-2014-0160) not vulnerable (OK), timed out + CCS (CVE-2014-0224) not vulnerable (OK) + ROBOT not vulnerable (OK) + Secure Renegotiation (RFC 5746) supported (OK) + Secure Client-Initiated Renegotiation VULNERABLE (NOT ok), potential DoS threat + CRIME, TLS (CVE-2012-4929) not vulnerable (OK) (not using HTTP anyway) + POODLE, SSL (CVE-2014-3566) VULNERABLE (NOT ok), uses SSLv3+CBC (check TLS_FALLBACK_SCSV mitigation below) + TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK) + SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers + FREAK (CVE-2015-0204) not vulnerable (OK) + DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK) + make sure you don't use this certificate elsewhere with SSLv2 enabled services + https://censys.io/ipv4?q=A2A65517606658C876BB107A89C102E8A6CDA718B6D78082B6B497E1457F7581 could help you to find out + LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected with <= TLS 1.2 + BEAST (CVE-2011-3389) SSL3: ECDHE-RSA-AES256-SHA AES256-SHA ECDHE-RSA-AES128-SHA AES128-SHA DES-CBC3-SHA + TLS1: ECDHE-RSA-AES256-SHA AES256-SHA ECDHE-RSA-AES128-SHA AES128-SHA DES-CBC3-SHA + VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated) + LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS. Check patches + RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): RC4-SHA + + + Testing 370 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength + +Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) +----------------------------------------------------------------------------------------------------------------------------- + xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 + xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA + x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 + x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 + x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA + xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 + xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA + x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 + x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 + x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA + x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA + x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA + + + Running client simulations via sockets + + Android 8.1 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Android 9.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Android 10.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Java 6u45 TLSv1.0 RC4-SHA, No FS + Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) + Java 8u161 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) + Java 11.0.2 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + Java 12.0.1 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.1.0l (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.1.1d (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + Thunderbird (68.3) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + + Done 2020-02-19 18:01:03 [ 114s] -->> 85.126.106.142:25 (mizar.mag.eu) <<-- + + diff --git a/tex/resources/200219-testssl-nihal.log b/tex/resources/200219-testssl-nihal.log new file mode 100644 index 0000000..271e693 --- /dev/null +++ b/tex/resources/200219-testssl-nihal.log @@ -0,0 +1,152 @@ +> testssl.sh -t smtp nihal.mag.eu:25 + +########################################################### + testssl.sh 3.0 from https://testssl.sh/ + + This program is free software. Distribution and + modification under GPLv2 permitted. + USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! + + Please file bugs @ https://testssl.sh/bugs/ + +########################################################### + + Using "OpenSSL 1.0.2-chacha (1.0.2k-dev)" [~183 ciphers] + on gandalf:/home/fuero/Appz/testssl.sh/bin/openssl.Linux.x86_64 + (built: "Jan 18 17:12:17 2019", platform: "linux-x86_64") + + + Start 2020-02-19 18:01:26 -->> 85.126.106.144:25 (nihal.mag.eu) <<-- + + rDNS (85.126.106.144): nihal.mag.eu. + Service set: STARTTLS via SMTP + + Testing protocols via sockets + + SSLv2 not offered (OK) + SSLv3 offered (NOT ok) + TLS 1 offered (deprecated) + TLS 1.1 offered (deprecated) + TLS 1.2 offered (OK) + TLS 1.3 not offered and downgraded to a weaker protocol + + Testing cipher categories + + NULL ciphers (no encryption) not offered (OK) + Anonymous NULL Ciphers (no authentication) not offered (OK) + Export ciphers (w/o ADH+NULL) not offered (OK) + LOW: 64 Bit + DES, RC[2,4] (w/o export) offered (NOT ok) + Triple DES Ciphers / IDEA offered + Obsolete: SEED + 128+256 Bit CBC cipher offered + Strong encryption (AEAD ciphers) offered (OK) + + + Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 + + PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA + Elliptic curves offered: prime256v1 + + + Testing server preferences + + Has server cipher order? no (NOT ok) + Negotiated protocol TLSv1.2 + Negotiated cipher AES128-GCM-SHA256 -- inconclusive test, matching cipher in list missing, better see below + Negotiated cipher per proto (matching cipher in list missing) + ECDHE-RSA-AES256-SHA: SSLv3, TLSv1, TLSv1.1 + ECDHE-RSA-AES256-GCM-SHA384: TLSv1.2 + No further cipher order check has been done as order is determined by the client + + + Testing server defaults (Server Hello) + + TLS extensions (standard) "renegotiation info/#65281" "EC point formats/#11" "session ticket/#35" "heartbeat/#15" + Session Ticket RFC 5077 hint 300 seconds, session tickets keys seems to be rotated < daily + SSL Session ID support yes + Session Resumption Tickets: yes, ID: yes + TLS clock skew Random values, no fingerprinting possible + Signature Algorithm SHA256 with RSA + Server key size RSA 2048 bits + Server key usage Digital Signature, Key Encipherment + Server extended key usage TLS Web Server Authentication, TLS Web Client Authentication + Serial / Fingerprints 94B98C3B5E188707B87E3226540AB8A8 / SHA1 971883B598B6A6D94BDC1965C728D406EE9F9DFF + SHA256 3F8F389AA515D67A96BE0CF2B1E4B796B6855C49F5AA22AEE7C97DDD1BFFF400 + Common Name (CN) nihal.mag.eu + subjectAltName (SAN) nihal.mag.eu www.nihal.mag.eu + Issuer Don Dominio / MrDomain RSA DV CA (Soluciones Corporativas IP, SL from ES) + Trust (hostname) Ok via SAN (same w/o SNI) + Chain of trust Ok + EV cert (experimental) no + ETS/"eTLS", visibility info not present + Certificate Validity (UTC) 114 >= 60 days (2018-06-13 02:00 --> 2020-06-13 01:59) + # of certificates provided 4 + Certificate Revocation List http://crl.usertrust.com/DonDominioMrDomainRSADVCA.crl + OCSP URI http://ocsp.usertrust.com + OCSP stapling not offered + OCSP must staple extension -- + DNS CAA RR (experimental) not offered + Certificate Transparency yes (certificate extension) + + + Testing vulnerabilities + + Heartbleed (CVE-2014-0160) not vulnerable (OK), timed out + CCS (CVE-2014-0224) not vulnerable (OK) + ROBOT not vulnerable (OK) + Secure Renegotiation (RFC 5746) supported (OK) + Secure Client-Initiated Renegotiation VULNERABLE (NOT ok), potential DoS threat + CRIME, TLS (CVE-2012-4929) not vulnerable (OK) (not using HTTP anyway) + POODLE, SSL (CVE-2014-3566) VULNERABLE (NOT ok), uses SSLv3+CBC (check TLS_FALLBACK_SCSV mitigation below) + TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK) + SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers + FREAK (CVE-2015-0204) not vulnerable (OK) + DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK) + make sure you don't use this certificate elsewhere with SSLv2 enabled services + https://censys.io/ipv4?q=3F8F389AA515D67A96BE0CF2B1E4B796B6855C49F5AA22AEE7C97DDD1BFFF400 could help you to find out + LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected with <= TLS 1.2 + BEAST (CVE-2011-3389) SSL3: ECDHE-RSA-AES256-SHA AES256-SHA ECDHE-RSA-AES128-SHA AES128-SHA DES-CBC3-SHA + TLS1: ECDHE-RSA-AES256-SHA AES256-SHA ECDHE-RSA-AES128-SHA AES128-SHA DES-CBC3-SHA + VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated) + LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS. Check patches + RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): RC4-SHA + + + Testing 370 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength + +Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) +----------------------------------------------------------------------------------------------------------------------------- + xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 + xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA + x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 + x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 + x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA + xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 + xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA + x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 + x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 + x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA + x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA + x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA + + + Running client simulations via sockets + + Android 8.1 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Android 9.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Android 10.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Java 6u45 TLSv1.0 RC4-SHA, No FS + Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) + Java 8u161 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) + Java 11.0.2 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + Java 12.0.1 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.1.0l (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.1.1d (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + Thunderbird (68.3) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + + Done 2020-02-19 18:03:25 [ 124s] -->> 85.126.106.144:25 (nihal.mag.eu) <<-- + + + diff --git a/tex/resources/mizar.mag.eu.html b/tex/resources/mizar.mag.eu.html new file mode 100644 index 0000000..7b462fa --- /dev/null +++ b/tex/resources/mizar.mag.eu.html @@ -0,0 +1,163 @@ + + + + +
+ ++ +########################################################### + testssl.sh 3.0 from https://testssl.sh/ + + This program is free software. Distribution and + modification under GPLv2 permitted. + USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! + + Please file bugs @ https://testssl.sh/bugs/ + +########################################################### + + Using "OpenSSL 1.0.2-chacha (1.0.2k-dev)" [~183 ciphers] + on gandalf:/home/fuero/Appz/testssl.sh/bin/openssl.Linux.x86_64 + (built: "Jan 18 17:12:17 2019", platform: "linux-x86_64") + + + Start 2020-02-19 17:59:15 -->> 85.126.106.142:25 (mizar.mag.eu) <<-- + + rDNS (85.126.106.142): mizar.mag.eu. + Service set: STARTTLS via SMTP + + Testing protocols via sockets + + SSLv2 not offered (OK) + SSLv3 offered (NOT ok) + TLS 1 offered (deprecated) + TLS 1.1 offered (deprecated) + TLS 1.2 offered (OK) + TLS 1.3 not offered and downgraded to a weaker protocol + + Testing cipher categories + + NULL ciphers (no encryption) not offered (OK) + Anonymous NULL Ciphers (no authentication) not offered (OK) + Export ciphers (w/o ADH+NULL) not offered (OK) + LOW: 64 Bit + DES, RC[2,4] (w/o export) offered (NOT ok) + Triple DES Ciphers / IDEA offered + Obsolete: SEED + 128+256 Bit CBC cipher offered + Strong encryption (AEAD ciphers) offered (OK) + + + Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 + + PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA + Elliptic curves offered: prime256v1 + + + Testing server preferences + + Has server cipher order? no (NOT ok) + Negotiated protocol TLSv1.2 + Negotiated cipher AES128-GCM-SHA256 -- inconclusive test, matching cipher in list missing, better see below + Negotiated cipher per proto (matching cipher in list missing) + ECDHE-RSA-AES256-SHA: SSLv3, TLSv1, TLSv1.1 + ECDHE-RSA-AES256-GCM-SHA384: TLSv1.2 + No further cipher order check has been done as order is determined by the client + + + Testing server defaults (Server Hello) + + TLS extensions (standard) "renegotiation info/#65281" "EC point formats/#11" "session ticket/#35" "heartbeat/#15" + Session Ticket RFC 5077 hint 300 seconds, session tickets keys seems to be rotated < daily + SSL Session ID support yes + Session Resumption Tickets: yes, ID: yes + TLS clock skew Random values, no fingerprinting possible + Signature Algorithm SHA256 with RSA + Server key size RSA 2048 bits + Server key usage Digital Signature, Key Encipherment + Server extended key usage TLS Web Server Authentication, TLS Web Client Authentication + Serial / Fingerprints C1EF1BDD3E650999BE7A8114A4E7FC02 / SHA1 4418A20B57042BE0FD24CBF81A5677FE63AFF784 + SHA256 A2A65517606658C876BB107A89C102E8A6CDA718B6D78082B6B497E1457F7581 + Common Name (CN) mizar.mag.eu + subjectAltName (SAN) mizar.mag.eu www.mizar.mag.eu + Issuer Don Dominio / MrDomain RSA DV CA (Soluciones Corporativas IP, SL from ES) + Trust (hostname) Ok via SAN (same w/o SNI) + Chain of trust Ok + EV cert (experimental) no + ETS/"eTLS", visibility info not present + Certificate Validity (UTC) 114 >= 60 days (2018-06-13 02:00 --> 2020-06-13 01:59) + # of certificates provided 4 + Certificate Revocation List http://crl.usertrust.com/DonDominioMrDomainRSADVCA.crl + OCSP URI http://ocsp.usertrust.com + OCSP stapling not offered + OCSP must staple extension -- + DNS CAA RR (experimental) not offered + Certificate Transparency yes (certificate extension) + + + Testing vulnerabilities + + Heartbleed (CVE-2014-0160) not vulnerable (OK), timed out + CCS (CVE-2014-0224) not vulnerable (OK) + ROBOT not vulnerable (OK) + Secure Renegotiation (RFC 5746) supported (OK) + Secure Client-Initiated Renegotiation VULNERABLE (NOT ok), potential DoS threat + CRIME, TLS (CVE-2012-4929) not vulnerable (OK) (not using HTTP anyway) + POODLE, SSL (CVE-2014-3566) VULNERABLE (NOT ok), uses SSLv3+CBC (check TLS_FALLBACK_SCSV mitigation below) + TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK) + SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers + FREAK (CVE-2015-0204) not vulnerable (OK) + DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK) + make sure you don't use this certificate elsewhere with SSLv2 enabled services + https://censys.io/ipv4?q=A2A65517606658C876BB107A89C102E8A6CDA718B6D78082B6B497E1457F7581 could help you to find out + LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected with <= TLS 1.2 + BEAST (CVE-2011-3389) SSL3: ECDHE-RSA-AES256-SHA AES256-SHA ECDHE-RSA-AES128-SHA AES128-SHA DES-CBC3-SHA + TLS1: ECDHE-RSA-AES256-SHA AES256-SHA ECDHE-RSA-AES128-SHA AES128-SHA DES-CBC3-SHA + VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated) + LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS. Check patches + RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): RC4-SHA + + + Testing 370 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength + +Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) +----------------------------------------------------------------------------------------------------------------------------- + xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 + xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA + x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 + x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 + x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA + xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 + xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA + x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 + x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 + x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA + x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA + x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA + + + Running client simulations via sockets + + Android 8.1 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Android 9.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Android 10.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Java 6u45 TLSv1.0 RC4-SHA, No FS + Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) + Java 8u161 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) + Java 11.0.2 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + Java 12.0.1 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.1.0l (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.1.1d (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + Thunderbird (68.3) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + + Done 2020-02-19 18:01:03 [ 114s] -->> 85.126.106.142:25 (mizar.mag.eu) <<-- + + ++ + diff --git a/tex/resources/nihal.mag.eu.html b/tex/resources/nihal.mag.eu.html new file mode 100644 index 0000000..470a555 --- /dev/null +++ b/tex/resources/nihal.mag.eu.html @@ -0,0 +1,163 @@ + + + + + + +
+ +########################################################### + testssl.sh 3.0 from https://testssl.sh/ + + This program is free software. Distribution and + modification under GPLv2 permitted. + USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! + + Please file bugs @ https://testssl.sh/bugs/ + +########################################################### + + Using "OpenSSL 1.0.2-chacha (1.0.2k-dev)" [~183 ciphers] + on gandalf:/home/fuero/Appz/testssl.sh/bin/openssl.Linux.x86_64 + (built: "Jan 18 17:12:17 2019", platform: "linux-x86_64") + + + Start 2020-02-19 18:01:26 -->> 85.126.106.144:25 (nihal.mag.eu) <<-- + + rDNS (85.126.106.144): nihal.mag.eu. + Service set: STARTTLS via SMTP + + Testing protocols via sockets + + SSLv2 not offered (OK) + SSLv3 offered (NOT ok) + TLS 1 offered (deprecated) + TLS 1.1 offered (deprecated) + TLS 1.2 offered (OK) + TLS 1.3 not offered and downgraded to a weaker protocol + + Testing cipher categories + + NULL ciphers (no encryption) not offered (OK) + Anonymous NULL Ciphers (no authentication) not offered (OK) + Export ciphers (w/o ADH+NULL) not offered (OK) + LOW: 64 Bit + DES, RC[2,4] (w/o export) offered (NOT ok) + Triple DES Ciphers / IDEA offered + Obsolete: SEED + 128+256 Bit CBC cipher offered + Strong encryption (AEAD ciphers) offered (OK) + + + Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 + + PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA + Elliptic curves offered: prime256v1 + + + Testing server preferences + + Has server cipher order? no (NOT ok) + Negotiated protocol TLSv1.2 + Negotiated cipher AES128-GCM-SHA256 -- inconclusive test, matching cipher in list missing, better see below + Negotiated cipher per proto (matching cipher in list missing) + ECDHE-RSA-AES256-SHA: SSLv3, TLSv1, TLSv1.1 + ECDHE-RSA-AES256-GCM-SHA384: TLSv1.2 + No further cipher order check has been done as order is determined by the client + + + Testing server defaults (Server Hello) + + TLS extensions (standard) "renegotiation info/#65281" "EC point formats/#11" "session ticket/#35" "heartbeat/#15" + Session Ticket RFC 5077 hint 300 seconds, session tickets keys seems to be rotated < daily + SSL Session ID support yes + Session Resumption Tickets: yes, ID: yes + TLS clock skew Random values, no fingerprinting possible + Signature Algorithm SHA256 with RSA + Server key size RSA 2048 bits + Server key usage Digital Signature, Key Encipherment + Server extended key usage TLS Web Server Authentication, TLS Web Client Authentication + Serial / Fingerprints 94B98C3B5E188707B87E3226540AB8A8 / SHA1 971883B598B6A6D94BDC1965C728D406EE9F9DFF + SHA256 3F8F389AA515D67A96BE0CF2B1E4B796B6855C49F5AA22AEE7C97DDD1BFFF400 + Common Name (CN) nihal.mag.eu + subjectAltName (SAN) nihal.mag.eu www.nihal.mag.eu + Issuer Don Dominio / MrDomain RSA DV CA (Soluciones Corporativas IP, SL from ES) + Trust (hostname) Ok via SAN (same w/o SNI) + Chain of trust Ok + EV cert (experimental) no + ETS/"eTLS", visibility info not present + Certificate Validity (UTC) 114 >= 60 days (2018-06-13 02:00 --> 2020-06-13 01:59) + # of certificates provided 4 + Certificate Revocation List http://crl.usertrust.com/DonDominioMrDomainRSADVCA.crl + OCSP URI http://ocsp.usertrust.com + OCSP stapling not offered + OCSP must staple extension -- + DNS CAA RR (experimental) not offered + Certificate Transparency yes (certificate extension) + + + Testing vulnerabilities + + Heartbleed (CVE-2014-0160) not vulnerable (OK), timed out + CCS (CVE-2014-0224) not vulnerable (OK) + ROBOT not vulnerable (OK) + Secure Renegotiation (RFC 5746) supported (OK) + Secure Client-Initiated Renegotiation VULNERABLE (NOT ok), potential DoS threat + CRIME, TLS (CVE-2012-4929) not vulnerable (OK) (not using HTTP anyway) + POODLE, SSL (CVE-2014-3566) VULNERABLE (NOT ok), uses SSLv3+CBC (check TLS_FALLBACK_SCSV mitigation below) + TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK) + SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers + FREAK (CVE-2015-0204) not vulnerable (OK) + DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK) + make sure you don't use this certificate elsewhere with SSLv2 enabled services + https://censys.io/ipv4?q=3F8F389AA515D67A96BE0CF2B1E4B796B6855C49F5AA22AEE7C97DDD1BFFF400 could help you to find out + LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected with <= TLS 1.2 + BEAST (CVE-2011-3389) SSL3: ECDHE-RSA-AES256-SHA AES256-SHA ECDHE-RSA-AES128-SHA AES128-SHA DES-CBC3-SHA + TLS1: ECDHE-RSA-AES256-SHA AES256-SHA ECDHE-RSA-AES128-SHA AES128-SHA DES-CBC3-SHA + VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated) + LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS. Check patches + RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): RC4-SHA + + + Testing 370 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength + +Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) +----------------------------------------------------------------------------------------------------------------------------- + xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 + xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA + x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 + x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 + x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA + xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 + xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA + x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 + x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 + x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA + x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA + x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA + + + Running client simulations via sockets + + Android 8.1 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Android 9.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Android 10.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + Java 6u45 TLSv1.0 RC4-SHA, No FS + Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) + Java 8u161 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) + Java 11.0.2 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + Java 12.0.1 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.1.0l (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + OpenSSL 1.1.1d (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) + Thunderbird (68.3) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) + + Done 2020-02-19 18:03:25 [ 124s] -->> 85.126.106.144:25 (nihal.mag.eu) <<-- + + ++ + diff --git a/tex/writeup.aux b/tex/writeup.aux index b70dd8f..7b9042b 100644 --- a/tex/writeup.aux +++ b/tex/writeup.aux @@ -4,25 +4,31 @@ \catcode `"\active \babel@aux{naustrian}{} \@writefile{toc}{\contentsline {section}{\numberline {1}Zusammenfassung}{1}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2}Methodik}{1}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2}Methodik}{2}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Informationsgewinnung}{2}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Verwendete Programme}{2}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3}Erkenntnisse}{2}\protected@file@percent } -\@writefile{lol}{\contentsline {lstlisting}{\numberline {1}Ergebnis des Portscans von NMap}{2}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {2.3}3 Kategorien der Informationssicherheit}{2}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3}Erkenntnisse}{3}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {1}Ergebnis des Portscans von NMap}{3}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Webserver}{3}\protected@file@percent } \@writefile{lol}{\contentsline {lstlisting}{\numberline {2}HTTP Response Header von \texttt {www.sternwarte.at}}{3}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.1}Kein TLS}{3}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.2}Beliebige Frames per URL laden}{3}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.3}Fehlerhafte Auslieferung spezieller Subseiten}{4}\protected@file@percent } -\@writefile{lol}{\contentsline {lstlisting}{\numberline {3}Erzeugte Fehler durch fehlerhaften Seitenaufruf}{4}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.4}Öffentlich zugängliche Dateien mit Metainformationen}{4}\protected@file@percent } -\@writefile{lol}{\contentsline {lstlisting}{\numberline {4}Mittels DirSearch Gefundene Endpoints}{4}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.5}Sehr alte Version des Servers}{6}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}FTP-Server}{6}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Mail-Server}{7}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Mailserver, der laut DNS zuständig ist}{7}\protected@file@percent } -\@writefile{lol}{\contentsline {lstlisting}{\numberline {5}Mittels DirSearch Gefundene Endpoints}{7}\protected@file@percent } -\@writefile{lol}{\contentsline {lstlisting}{\numberline {6}NMap Portscan auf \texttt {nihal.mag.eu}}{7}\protected@file@percent } -\@writefile{lol}{\contentsline {lstlisting}{\numberline {7}NMap Portscan auf \texttt {mizar.mag.eu}}{8}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.2}Mailserver auf \texttt {sternwarte.at}}{8}\protected@file@percent } -\@writefile{lol}{\contentsline {lstlisting}{\numberline {8}Fehler des Mailservers auf \texttt {sternwarte.at}}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.1}Kein TLS}{4}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.2}Beliebige Frames per URL laden}{4}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.3}Fehlerhafte Auslieferung spezieller Subseiten}{5}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {3}Erzeugte Fehler durch fehlerhaften Seitenaufruf}{5}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.4}Öffentlich zugängliche Dateien mit Metainformationen}{5}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {4}Mittels DirSearch gefundene Endpoints}{6}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.5}Sehr alte Version des Servers}{7}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}FTP-Server}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Mail-Server}{8}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Mailserver, der laut DNS zuständig ist}{9}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {5}Mail Extension DNS Eintrag für \texttt {sternwarte.at}}{9}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {6}NMap Portscan auf \texttt {nihal.mag.eu}}{9}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {7}NMap Portscan auf \texttt {mizar.mag.eu}}{9}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.2}Mailserver auf \texttt {sternwarte.at}}{10}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {8}Fehler des Mailservers auf \texttt {sternwarte.at}}{10}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4}Zusammenassung}{11}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {A}TestSSL Ergebnisse der Mailserver}{11}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {9}TestSSL Ergebnis für \texttt {nihal.mag.eu}}{11}\protected@file@percent } +\@writefile{lol}{\contentsline {lstlisting}{\numberline {10}TestSSL Ergebnis für \texttt {mizar.mag.eu}}{14}\protected@file@percent } +\global\csname @altsecnumformattrue\endcsname diff --git a/tex/writeup.log b/tex/writeup.log index c6eac3f..2431fb7 100644 --- a/tex/writeup.log +++ b/tex/writeup.log @@ -1,4 +1,4 @@ -This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Arch Linux) (preloaded format=pdflatex 2020.2.3) 17 FEB 2020 21:58 +This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Arch Linux) (preloaded format=pdflatex 2020.2.3) 20 FEB 2020 10:21 entering extended mode restricted \write18 enabled. %&-line parsing enabled. @@ -471,28 +471,28 @@ File: microtype.cfg 2019/10/10 v2.7c microtype main configuration file (RS) )) (./writeup.aux) \openout1 = `writeup.aux'. -LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 79. -LaTeX Font Info: ... okay on input line 79. -LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 79. -LaTeX Font Info: ... okay on input line 79. -LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 79. -LaTeX Font Info: ... okay on input line 79. -LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 79. -LaTeX Font Info: ... okay on input line 79. -LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 79. -LaTeX Font Info: ... okay on input line 79. -LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 79. -LaTeX Font Info: ... okay on input line 79. -LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 79. -LaTeX Font Info: Trying to load font information for TS1+cmr on input line 7 -9. +LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 82. +LaTeX Font Info: ... okay on input line 82. +LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 82. +LaTeX Font Info: ... okay on input line 82. +LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 82. +LaTeX Font Info: ... okay on input line 82. +LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 82. +LaTeX Font Info: ... okay on input line 82. +LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 82. +LaTeX Font Info: ... okay on input line 82. +LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 82. +LaTeX Font Info: ... okay on input line 82. +LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 82. +LaTeX Font Info: Trying to load font information for TS1+cmr on input line 8 +2. (/usr/share/texmf-dist/tex/latex/base/ts1cmr.fd File: ts1cmr.fd 2014/09/29 v2.5h Standard LaTeX font definitions ) -LaTeX Font Info: ... okay on input line 79. +LaTeX Font Info: ... okay on input line 82. LaTeX Font Info: Trying to load font information for T1+DejaVuSerif-TLF on i -nput line 79. +nput line 82. (/usr/share/texmf-dist/tex/latex/dejavu/T1DejaVuSerif-TLF.fd File: T1DejaVuSerif-TLF.fd 2011/06/01 Font definitions for T1/DejaVuSerif-TLF. @@ -592,14 +592,14 @@ G,.JBIG2,.JB2,.eps] File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv e )) -LaTeX Info: Redefining \microtypecontext on input line 79. +LaTeX Info: Redefining \microtypecontext on input line 82. Package microtype Info: Generating PDF output. Package microtype Info: Character protrusion enabled (level 2). Package microtype Info: Using default protrusion set `alltext'. Package microtype Info: Automatic font expansion enabled (level 2), (microtype) stretch: 20, shrink: 20, step: 1, non-selected. Package microtype Info: Using default expansion set `basictext'. -LaTeX Info: Redefining \showhyphens on input line 79. +LaTeX Info: Redefining \showhyphens on input line 82. Package microtype Info: No adjustment of tracking. Package microtype Info: No adjustment of interword spacing. Package microtype Info: No adjustment of character kerning. @@ -608,7 +608,7 @@ Package microtype Info: Loading generic protrusion settings for font family (microtype) For optimal results, create family-specific settings. (microtype) See the microtype manual for details. LaTeX Font Info: Trying to load font information for T1+DejaVuSans-TLF on in -put line 81. +put line 84. (/usr/share/texmf-dist/tex/latex/dejavu/T1DejaVuSans-TLF.fd File: T1DejaVuSans-TLF.fd 2011/10/30 Font definitions for T1/DejaVuSans-TLF. @@ -620,39 +620,39 @@ Package microtype Info: Loading generic protrusion settings for font family LaTeX Font Info: Font shape `T1/DejaVuSans-TLF/bx/n' in size <10> not availa ble (Font) Font shape `T1/DejaVuSans-TLF/b/n' tried instead on input l -ine 81. +ine 84. LaTeX Font Info: Font shape `T1/DejaVuSans-TLF/bx/n' in size <20.74> not ava ilable (Font) Font shape `T1/DejaVuSans-TLF/b/n' tried instead on input l -ine 81. +ine 84.