You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you do not scan with SNI, ssl_scan_sock gets a 'protocol version' error from some sites:
python ssl_scan_sock.py howsmyssl.com:443
Error scanning howsmyssl.com:443 - Fatal (2): Code 70 - Protocol Version: The protocol version sent is recognized but not supported.
Perhaps this is happening because we're sending an old client_hello message from an older TLS spec? This should be updated.
The text was updated successfully, but these errors were encountered:
Apparently the hex contstants in ssl_scan_sock.py may be raw captures from a Wireshark trace. We may be able to trace a client hello with a newer version of openssl, or perhaps we could decipher the constants and write them in a more maintainable way.
consider closing this issue, because SNI is implemented in OpenSSL long time ago, and I've also fixed it implementing a round-robin for OpenSSL scanner
If you do not scan with SNI, ssl_scan_sock gets a 'protocol version' error from some sites:
Perhaps this is happening because we're sending an old client_hello message from an older TLS spec? This should be updated.
The text was updated successfully, but these errors were encountered: