Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jumanjihouse/docker-testssl
http://testssl.sh/ in a tiny docker container
https://github.com/jumanjihouse/docker-testssl
bigip caa cipher crime ct docker drown freak heartbleed hpkp hsts logjam ocsp poodle rc4 scanner security-tools socket ticketbleed tls
Last synced: 9 days ago
JSON representation
http://testssl.sh/ in a tiny docker container
- Host: GitHub
- URL: https://github.com/jumanjihouse/docker-testssl
- Owner: jumanjihouse
- License: gpl-2.0
- Created: 2015-09-18T01:09:25.000Z (about 9 years ago)
- Default Branch: master
- Last Pushed: 2024-07-22T22:42:42.000Z (4 months ago)
- Last Synced: 2024-08-02T16:08:36.107Z (3 months ago)
- Topics: bigip, caa, cipher, crime, ct, docker, drown, freak, heartbleed, hpkp, hsts, logjam, ocsp, poodle, rc4, scanner, security-tools, socket, ticketbleed, tls
- Language: Shell
- Size: 183 KB
- Stars: 21
- Watchers: 5
- Forks: 9
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
README
Test TLS/SSL of arbitrary services and ports
============================================- [Overview](#overview)
- [How-To](#how-to)
- [Pull an already-built image](#pull-an-already-built-image)
- [Run the image](#run-the-image)
- [Build and test images locally](#build-and-test-images-locally)
- [View labels](#view-labels)
- [Contribute](#contribute)
- [About the build](#about-the-build)
- [Stale tags](#stale-tags)
- [Operational status of SaaS providers](#operational-status-of-saas-providers)
- [License](#license)Overview
--------This repo provides docker images for `testssl.sh`,
a free command line tool to check a service
on any port for the support of TLS/SSL ciphers,
protocols, recent cryptographic flaws, and more.
Each image provides everything needed to run
`testssl.sh` the way upstream intends it to be run.Build status for master branch: [![Circle CI](https://circleci.com/gh/jumanjihouse/docker-testssl/tree/master.svg?style=svg&circle-token=21344117bb3bc61b8096a1a1b76514ab7b8a3f85)](https://circleci.com/gh/jumanjihouse/docker-testssl/tree/master)
Docker image: https://quay.io/repository/jumanjiman/testssl
Docker source: https://github.com/jumanjihouse/docker-testssl
Upstream source: https://github.com/drwetter/testssl.sh:warning: The **latest** tag at quay refers to the **stable** version.
How-To
------### Pull an already-built image
docker pull quay.io/jumanjiman/testssl
### Run the image
You can run the image using the [`docker-compose.yaml`](docker-compose.yaml)
file in this git repo:# Show help.
docker-compose run testssl --help# Do a limited scan with a subset of options against one host.
docker-compose run testssl --heartbleed --ip one https://www.google.com/You can also run the image with the `docker` command directly:
run_opts="
-i
-t
--rm
--read-only
--cap-drop all
--memory 100M
--pids-limit 1000
--cpu-shares 512
"docker run ${run_opts} quay.io/jumanjiman/testssl --help
The above examples use `--read-only` and `--cap-drop all` as recommended by the
CIS Docker Security Benchmarks:* [CIS Security Benchmark for Docker 1.6](https://benchmarks.cisecurity.org/tools2/docker/CIS_Docker_1.6_Benchmark_v1.0.0.pdf)
* [CIS Security Benchmark for Docker 1.11](https://benchmarks.cisecurity.org/tools2/docker/CIS_Docker_1.11.0_Benchmark_v1.0.0.pdf)
* [CIS Security Benchmark for Docker 1.12](https://benchmarks.cisecurity.org/tools2/docker/CIS_Docker_1.12.0_Benchmark_v1.0.0.pdf)
* [CIS Security Benchmark for Docker 1.13](https://benchmarks.cisecurity.org/tools2/docker/CIS_Docker_1.13.0_Benchmark_v1.0.0.pdf)### Build and test images locally
:warning: All build configuration variables are in [`ci/build`](ci/build).
On a host, such as devenv:
# Optional. Your URL may vary.
export DOCKER_HOST=tcp://192.168.254.162:2375# Build images.
ci/build# Run the tests.
ci/testNote: The test harness requires Python and the `pip` command.
### View labels
Each built image has labels that generally follow http://label-schema.org/
We add a label, `ci-build-url`, that is not currently part of the schema.
This extra label provides a permanent link to the CI build for the image.View the ci-build-url label on a built image:
docker inspect \
-f '{{ index .Config.Labels "io.github.jumanjiman.ci-build-url" }}' \
quay.io/jumanjiman/testsslQuery all the labels inside a built image:
docker inspect quay.io/jumanjiman/testssl | jq -M '.[].Config.Labels'
### Contribute
Fork [this repo](https://github.com/jumanjihouse/docker-testssl)
and see [CONTRIBUTING.md](CONTRIBUTING.md).:warning: All build configuration variables are in [`ci/build`](ci/build).
About the build
---------------`ci/build` uses `docker-compose` to create a "base" image
that contains the statically-linked version of openssl from
[https://testssl.sh/](https://testssl.sh/).
From the common base, `ci/build` creates two runtime images:* **stable** version of the `testssl.sh` script
* **dev** version of the `testssl.sh` scriptWhen the build happens against the master branch on CircleCI,
the `ci/publish` script pushes both the stable and dev images to
[Quay.io](https://quay.io/repository/jumanjiman/testssl?tab=tags).
It also pushes a "latest" tag, which refers to the stable version.Stale tags
----------Old images tend to have vulnerabilities.
Quay has a feature to use a special label, `quay.expires-after`, to expire tags.
This repo applies the label to images so that old images get deleted automatically.See https://support.coreos.com/hc/en-us/articles/115001384693-Tag-Expiration
for more information about the Quay feature.
See [src/Dockerfile](src/Dockerfile) for the current value of the label.:warning: This is a Quay feature, not a docker feature.
Operational status of SaaS providers
------------------------------------CircleCI: [http://status.circleci.com/](http://status.circleci.com/)
Quay registry: [http://status.quay.io/](http://status.quay.io/)
License
-------This repo, testssl, and openssl are licensed under the GPLv2.
See [LICENSE](LICENSE).