This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "O-Saft"
(link corrected) |
(updated description according to the features of the latest stable release '14.12.07') |
||
| Line 24: | Line 24: | ||
* Ensure that following perl modules (and their dependencies) are installed | * Ensure that following perl modules (and their dependencies) are installed | ||
: <nowiki>     </nowiki> ''IO::Socket::INET'', ''IO::Socket::SSL'', ''Net::SSLeay'' | : <nowiki>     </nowiki> ''IO::Socket::INET'', ''IO::Socket::SSL'', ''Net::SSLeay'' | ||
| + | : <nowiki>     </nowiki> ''IO::Socket::INET'' (only if option '--mx' is used) | ||
: <nowiki>     </nowiki> ''Net::SSLinfo'' (which is part of the tarball) | : <nowiki>     </nowiki> ''Net::SSLinfo'' (which is part of the tarball) | ||
* read and (re-)move ''o-saft-README'' | * read and (re-)move ''o-saft-README'' | ||
| Line 55: | Line 56: | ||
:* output format can be customized | :* output format can be customized | ||
:* various trace and debug options to hunt unusual connection problems | :* various trace and debug options to hunt unusual connection problems | ||
| − | :* supports STARTTLS for various protocols like (SMTP, POP3, IMAP, LDAP, RDP, XMPP,...) | + | :* +cipherall: supports STARTTLS for various protocols like (SMTP, POP3, IMAP, LDAP, RDP, XMPP, IRC (experimental) ...),<br> slows down to prevent blockades of requests due to too much connections (supported for some protocols like SMTP) |
| + | :* check of STARTTLS/SMTP for all servers of a MX Resource Record (e.g. ''checkAllCiphers --mx your.tld:25 --starttls=smtp'') | ||
==New Features of Test Version== | ==New Features of Test Version== | ||
| Line 62: | Line 64: | ||
* Start ''INSTALL-devel.sh'' | * Start ''INSTALL-devel.sh'' | ||
* Enjoy new functionality: | * Enjoy new functionality: | ||
| − | :* | + | :* help improved |
| − | |||
| − | |||
| − | |||
| − | |||
* please give us feedback via the [https://lists.owasp.org/mailman/listinfo/o-saft mailinglist] | * please give us feedback via the [https://lists.owasp.org/mailman/listinfo/o-saft mailinglist] | ||
| Line 124: | Line 122: | ||
== News and Events == | == News and Events == | ||
* '''09/12/2014''' Presentation '' Richtig verschlüsseln mit SSL/TLS'' at <u>'''[[German_OWASP_Day_2014|German OWASP Day 2014]]'''</u>, programm see <u>[[German_OWASP_Day_2014/Programm|here]]</u> | * '''09/12/2014''' Presentation '' Richtig verschlüsseln mit SSL/TLS'' at <u>'''[[German_OWASP_Day_2014|German OWASP Day 2014]]'''</u>, programm see <u>[[German_OWASP_Day_2014/Programm|here]]</u> | ||
| + | * 07/12/2014, stable release '''14.12.07''' | ||
* 16/11/2014, stable release '''14.11.14''' | * 16/11/2014, stable release '''14.11.14''' | ||
* 15/10/2014, check for '''Poodle''' vulnerability, see test ersion: <u>[https://github.com/OWASP/O-Saft/archive/master.zip master.zip]</u> | * 15/10/2014, check for '''Poodle''' vulnerability, see test ersion: <u>[https://github.com/OWASP/O-Saft/archive/master.zip master.zip]</u> | ||
| Line 132: | Line 131: | ||
* '''2013 Top Security Tools''' | * '''2013 Top Security Tools''' | ||
:thanks for voting <u>[http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ O-Saft as #10 best security tools 2013 ]</u> | :thanks for voting <u>[http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ O-Saft as #10 best security tools 2013 ]</u> | ||
| − | * Latest stable release | + | * '''Latest stable release''' |
| − | : | + | :12/2014, O-Saft 14.12.07 |
== In Print / Media == | == In Print / Media == | ||
Revision as of 23:30, 23 December 2014
O-Saft
O-Saft is an easy to use tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations. It's designed to be used by penetration testers, security auditors or server administrators. The idea is to show the important informations or the special checks with a simple call of the tool. However, it provides a wide range of options so that it can be used for comprehensive and special checks by experienced people. O-Saft is a command-line tool, so it can be used offline and in closed environments. However, it can simply be turned into an online CGI-tool (please read documentation first). Introduction
DescriptionThe main idea is to have a tool which works on common platforms and can simply be automated.
New Features of Test Version
|
What is O-Saft?O-Saft provides:
DocumentationPresentations
(This presentations are in German) Project LeaderAchim Hoffmann LicensingOWASP O-Saft is free to use. It is licensed under the GPL v2 license. Related ProjectsGithubOhloh |
Quick Download
News and Events
In Print / MediaFind a OWASP 24/7 podcast about the tool here. Classifications
| |||||||
- FAQs
- Where can I get missing Perl-Modules?
This depends on your OS and Perl installation, but just try 'cpan <Module-Name>', e.g. 'cpan Net:DNS'
- I am connected to the internet via a Proxy
open the cpan-shell using 'cpan' and configure your proxy settings: 'o conf init /proxy/' - I can not download the requested files (the proxy needs authentication)
run 'cpan <Module-Name>' several times, read the error messages and copy the requested files manually to the paths (without any additional temporary extension of the name),
e.g. http://www.cpan.org/authors/01mailrc.txt.gz => <Your Program Path>/cpan/sources/authors/01mailrc.txt.gz
- I am connected to the internet via a Proxy
- Acknowledgements
Volunteers
O-Saft is developed by from the contributions of OWASP members. The primary contributors to date have been:
Repository
O-Saft's source code can be found at https://github.com/OWASP/O-Saft .
The latest stable tarball is https://github.com/OWASP/O-Saft/raw/master/o-saft.tgz
- Road Map
https://www.owasp.org/index.php/Projects/O-Saft/Roadmap
- Involvement in the development and promotion of O-Saft is actively encouraged!
You do not have to be a security expert in order to contribute. Contacts:
- mailto: Achim at owasp dot org
- Mailinglist
Some of the ways you can help:
- Quality assurance: simply test O-Saft and report defects
- Give some ideas how to implement scoring
- Need help in implementing SSL for other protocols like LDAP, IMAP, ...
- (currently, November 2014, we have proxy and STARTTLS functionality for LDAP, IMAP, POP, SMTP,...)


