This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP DeepViolet TLS/SSL Scanner"

From OWASP
Jump to: navigation, search
m (News and Events)
 
(42 intermediate revisions by the same user not shown)
Line 1: Line 1:
=Main=
 
 
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
  
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
+
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
 
==OWASP DeepViolet TLS/SSL Scanner Code Project==
 
  
DeepViolet is a TLS/SSL scanning library/tool written in Java.  Use DeepViolet from the command line in your own *nix or Windows scripts. Alternatively, use the graphical user interface to scan HTTPS web servers from your desktop or include the DeepViolet API to include TLS/SSL scanning in your applications. Check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and more.
+
==OWASP DeepViolet TLS/SSL API Project and Tools==
  
==Description==
+
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.
  
Great free and commercial products exist in the TLS/SSL scanning space.  The reason to build a new TLS/SSL scanning tool was, 1) learn more about TLS/SSL protocols, crypto, and trust management.  In fact, learn everything there is to know about the brief moment a web browser connects to a secure web server, 2) develop a tool in Java.
+
==How is DeepViolet Helpful?==
  
'''Project requirements''': Java SE 8. Tested on OS X 10.11.5 El Capitan and
+
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself. Originally, DeepViolet was written as an educational tool. A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better. The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools. However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.
Windows 10. GitHub includes Travis CI Build Badge to provide code compile confidence.
 
  
 
==Licensing==
 
==Licensing==
Line 21: Line 16:
 
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
 
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
  
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
+
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 +
 
 +
== Quick Start ==
 +
 
 +
See project [https://github.com/spoofzu/DeepViolet GitHub home page]
 +
 
  
 
== Project Resources ==
 
== Project Resources ==
  
[https://github.com/spoofzu/DeepViolet Source Code]
+
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]
 +
 
 +
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]
 +
 
 +
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]
 +
 
 +
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions
 +
 
 +
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]
  
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]
+
==Requirements==
  
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]
+
Java SE 8+
  
<!--
+
Tested on OS X and Windows
[https://github.com/SamanthaGroves Slide Presentation tbd]
 
  
[https://github.com/SamanthaGroves Video tbd]
+
| style="padding-left:25px;width:200px;" valign="top" |
-->
 
  
 
== Project Leader(s) ==
 
== Project Leader(s) ==
  
Milton Smith<br/>
+
Milton Smith<br />
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]
+
[https://www.securitycurmudgeon.com/ blog] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email]  
 
 
| valign="top"  style="padding-left:25px;width:200px;" |
 
  
 
== Related Projects ==
 
== Related Projects ==
Line 48: Line 52:
 
   
 
   
 
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]
 
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]
 +
 +
== News and Events ==
 +
* [24 Jul 2018] SecurityOnline.info: OWASP DeepViolet TLS/SSL API
 +
* [Jun 8, 2018] DV at [https://www.blackhat.com/us-18/arsenal/schedule/index.html#deepviolet-ssltls-scanning-api-38-tools-10724 Blackhat 2018 USA]
 +
* [Jun 8, 2018] Significant updates to DV and DeepVioletTools code
 +
* [27 September 2017] [https://www.elementarydigital.co.uk/the-best-ssl-troubleshooting-tools-to-test-out/ Elementary: The Best SSL Troubleshooting Tools to Test Out]
 +
* [1 June 2017] ZAP's HttpsInfo addon leveraging DeepViolet has been released (v9) [http://bit.ly/2r6mmBj More]
 +
* [25 May 2017] DeepViolet Beta 5.0.2 available for download, See [https://github.com/spoofzu/DeepViolet/releases/tag/5.0.2 release notes] for detail.
 +
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]
 +
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]
 +
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].
 +
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.
 +
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]
 +
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]
  
 
==Classifications==
 
==Classifications==
Line 53: Line 71:
 
   {| width="200" cellpadding="2"
 
   {| width="200" cellpadding="2"
 
   |-
 
   |-
   | colspan="2" align="center" | [[File:Project_Type_Files_CODE.jpg|link=]]
+
   | colspan="2" align="center" | [[File:Project_Type_Files_CODE.jpg|link=]]
 
   |-
 
   |-
   | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]
+
   | rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]
   | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=Builders]]   
+
   | width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=Builders]]   
 
   |-
 
   |-
   | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=Defenders]]
+
   | width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=Defenders]]
 
   |-
 
   |-
   | colspan="2" align="center" |  
+
   | colspan="2" align="center" |  
 
   |}
 
   |}
 
== News and Events ==
 
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.
 
  
 
|}
 
|}
  
=FAQs=
+
=Roadmap=
Following are various frequently asked questions.
 
 
 
==How can I participate in your project?==
 
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.
 
 
 
==If I am not a programmer can I participate in your project?==
 
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.
 
 
 
= Acknowledgements =
 
 
 
Many thanks and significant contributions around negotiating TLS handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://[email protected]/ email]
 
 
 
==Volunteers==
 
 
 
None yet.  Fame, fortune, and security glory is within your grasp.
 
 
 
= Road Map and Getting Involved =
 
 
 
 
 
==Roadmap==
 
 
 
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.
 
  
==Getting Involved==
+
This project is operational and includes a number of powerful featuresThe roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.
You do not have to be a security expert or a programmer to contributeSome of the ways you can help are as follows:
 
  
===Coding===
+
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests
 
===Localization===
 
Are you fluent in another language? Can you help translate the text strings in the <strong>Code Project Template</strong> into that language?
 
===Testing===
 
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.
 
===Build Management===
 
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.
 
===Feedback===
 
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.  Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].
 
  
 
=Project About=
 
=Project About=
Line 120: Line 103:
 
__NOTOC__ <headertabs />  
 
__NOTOC__ <headertabs />  
  
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]
+
[[Category:OWASP Project]]   
 +
[[Category:OWASP_Builders]]  
 +
[[Category:OWASP_Defenders]]   
 +
[[Category:OWASP_Code]]

Latest revision as of 17:21, 26 July 2018

OWASP Project Header.jpg

OWASP DeepViolet TLS/SSL API Project and Tools

DeepViolet is a TLS/SSL scanning API written in Java. To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API. If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop. Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.

How is DeepViolet Helpful?

Already great tools exist today for TLS/SSL scanning like, Qualys Labs, Mozilla Observatory, OpenSSL. Why do I care about DeepViolet? A valid question and one I asked myself. Originally, DeepViolet was written as an educational tool. A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better. The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools. However, it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs. What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.

Licensing

This library is free software: you can redistribute it and/or modify it under the terms of the Apache License, Version 2.0. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Quick Start

See project GitHub home page


Project Resources

Code | Binaries | API JavaDocs

Issue Tracker

Road Map(Beta 5)

DeepViolet Dev Group, ask questions

Twitter: @DeepVioletAPI

Requirements

Java SE 8+

Tested on OS X and Windows

Project Leader(s)

Milton Smith
blog twitter email

Related Projects

OWASP Zed Attack Proxy Project

OWASP Security Logging Project

News and Events

Classifications

Project Type Files CODE.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png

This project is operational and includes a number of powerful features. The roadmap is managed via the projects GitHub site, DeepViolet Roadmap. For example, at the time of this writing an issue has been created for Beta5 which is labeled, Beta5 Proposed Features/Roadmap.

For information about contributing see DeepViolet's Contributing page on GitHub.

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: DeepViolet
Purpose: TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.
License: Apache License 2.0
who is working on this project?
Project Leader(s):
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: [https://lists.owasp.org/mailman/listinfo/deepviolet Mailing List Archives]
Project Roadmap: Not Yet Created
Key Contacts
  • Contact [[User:Miltonsmith | Milton Smith]] @ to contribute to this project
  • Contact [[User:Miltonsmith | Milton Smith]] @ to review or sponsor this project
current release
Not Yet Published
last reviewed release
Not Yet Reviewed


other releases