Re: Browser with weak ciphers in testing ?

2015-07-26 Thread Reco
 Hi.

On Sat, 25 Jul 2015 20:03:59 +0200
Erwan David  wrote:

> To access some appliances/devices whose https console only knows weak
> ciphers (but on a protected network), I need a browser accepting those
> weak ciphers (less I go to each device with a serial cable to enable the
> clear connection).
> 
> What are my options in testing ?

Let's see. You need anything that's linked with libssl, which leaves us
with:

- elinks2
- w3m

If the appliances in question require Javascript, those won't do the
job. What you need or the conventional browsers *and* TLS-capable proxy
(sslstrip or mitmproxy). Or, a MITM tool, such as sslsniff.

For the ad-hoc connections, ncat (from nmap package), or plain old
socat should do the trick.

You could also proxy the connection to such devices with a Web-server
(both apache and nginx can do this), but the setup is somewhat tricky.

Reco


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150726162720.c89d884683d4a4386c8dd...@gmail.com



Re: Browser with weak ciphers in testing ?

2015-07-26 Thread Petter Adsen
On Sat, 25 Jul 2015 20:03:59 +0200
Erwan David  wrote:

> To access some appliances/devices whose https console only knows weak
> ciphers (but on a protected network), I need a browser accepting those
> weak ciphers (less I go to each device with a serial cable to enable the
> clear connection).
> 
> What are my options in testing ?

If there is nothing in the repos that will support the ciphers you
need, maybe you could use an older version of Firefox, and install it
somewhere you won't accidentally run it?

https://ftp.mozilla.org/pub/mozilla.org/firefox/releases/

Just a thought.

Petter

-- 
"I'm ionized"
"Are you sure?"
"I'm positive."


pgpXdC6lb3QYP.pgp
Description: OpenPGP digital signature