-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vpn.drew.edu / vpn.uu.edu / vpn.valpo.edu (SonicWall) #14
Comments
The timeout originates here: Line 106 in d76f7aa
We shouldn't need to pass the |
Gateway
Yet it is SonicWall according to the HTML code of https://vpn.valpo.edu/spog/welcome: <!DOCTYPE html><html><head><meta charset=utf-8><meta name=viewport content="width=device-width,initial-scale=1"><meta name=brandName content="SonicWall"><meta name=modelNameShort content="SMA"> |
The use case for this option is to do If you get timeouts/SSL errors/DNS errors, you don't want to waste time re-trying TLS/HTTPS connections to such servers, in order to speed up the overall run. In "normal" usage I don't think this behavior is desirable, since some servers have flaky behavior that will (for example) abruptly disconnect TLS sockets when they get HTTPS requests that they don't understand. This monstrosity is a chief offender. |
Same with
Again a SonicWall: |
About For example, even if SonicWall detection was updated, the script would still fail with a timeout in Check Point detection before even making it to SonicWall detection:
|
So you'd prefer to have the Perhaps |
I may be missing something, but it looks like failure on timeout in a sniffer may result in skipping all the following sniffers. That's not something we want. If so, yes, the default should be Actually, we should probably handle SSL exceptions and timeouts differently:
In short:
|
Agreed, but based on the practical experience of running this I think the default behavior should actually be reversed…
Many VPN servers are buggy and they don't really speak HTTP(S) in a general-purpose way. Some of them abruptly terminate TLS sockets or mis-encode their output, when they get HTTP requests that they don't understand… because they're aimed at different VPN protocols. (There's one related-ish case where we explicitly check for, and ignore, such misbehavior.) If we give up after an SSL failure, we'll get some false negatives.
When doing a large "survey" run, the most common cause of a timeout is that the DNS name exists… but it isn't listening on the given port. That's going to repeat over and over. Perhaps what we really need here are separate flags to |
Gateway
vpn.drew.edu
is not detected:It is clearly a SonicWall VPN:
The text was updated successfully, but these errors were encountered: