-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Labels
type:featureNew featureNew feature
Description
Split from #47
Issue #47 (Service Scanner - protocol probes) has been substantially completed.
Completed (in current codebase)
- ✅ SSH probe - detects OpenSSH version (
pkg/suricata/scanner/probes.golines 160-185) - ✅ HTTP probe - server header and response code (lines 87-130)
- ✅ TLS probe - TLS version detection (lines 132-158)
- ✅ MySQL probe - version from handshake (lines 187-222)
- ✅ SMTP probe - banner detection (lines 224-249)
- ✅ Additional: FTP, POP3, IMAP, DNS probes
- ✅ CLI access via
nftban suricata scan deep
This Issue: Remaining Enhancements
- TLS certificate CN (Common Name) extraction
- TLS certificate expiry date extraction
- SMTP STARTTLS capability detection
- Optional: Add
nftban services --probealias
Technical Context
Current TLS probe only extracts version:
// probeHTTPS() - missing cert details
conn, err := tls.Dial("tcp", addr, &tls.Config{InsecureSkipVerify: true})
// Only TLS version is captured, not certificate detailsAcceptance Criteria
-
nftban suricata scan deepshows certificate CN -
nftban suricata scan deepshows certificate expiry - SMTP probe reports STARTTLS support (yes/no)
- Results stored in service registry
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
type:featureNew featureNew feature