For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
| import time | |
| from invoke import task, Context | |
| CMD_COMPOSE = "docker-compose -f docker-compose.dev.yml" | |
| CMD_RUN_APP = f"{CMD_COMPOSE} run --rm app" | |
| @task | |
| def build(ctx): |
| import tweepy | |
| from datetime import datetime, timedelta | |
| consumer_key = '' | |
| consumer_secret = '' | |
| access_token = '' | |
| access_secret = '' | |
| auth = tweepy.OAuthHandler(consumer_key, consumer_secret) | |
| auth.set_access_token(access_token, access_secret) |
| name | download_total | |
|---|---|---|
| AFNetworking | 61983241 | |
| Fabric | 50998892 | |
| Crashlytics | 49667729 | |
| SDWebImage | 45471101 | |
| Alamofire | 42097177 | |
| CocoaLumberjack | 36071914 | |
| Bolts | 35294870 | |
| FirebaseInstanceID | 30277793 | |
| FirebaseAnalytics | 30254593 |
| # With SSLyze 1.4.0, the code that performs connectivity testing with a server needs to be slightly changed: | |
| # SSLyze before 1.4.0 | |
| try: | |
| server_info = ServerConnectivityInfo( | |
| hostname='smtp.gmail.com', | |
| port=587, | |
| tls_wrapped_protocol=TlsWrappedProtocolEnum.STARTTLS_SMTP | |
| ) | |
| server_info.test_connectivity_to_server() |
For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| from __future__ import absolute_import | |
| from __future__ import unicode_literals | |
| from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult | |
| from sslyze.plugins.utils.certificate_utils import CertificateUtils | |
| from sslyze.plugins.certificate_info_plugin import CertificateInfoScanCommand | |
| from sslyze.plugins.session_renegotiation_plugin import SessionRenegotiationScanCommand |
| from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult | |
| from sslyze.plugins.robot_plugin import RobotScanCommand, RobotScanResultEnum | |
| from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError | |
| from sslyze.ssl_settings import TlsWrappedProtocolEnum | |
| SERVERS_TO_SCAN = [ | |
| ('www.google.com', 443, TlsWrappedProtocolEnum.HTTPS), | |
| ('smtp.gmail.com', 587, TlsWrappedProtocolEnum.STARTTLS_SMTP), | |
| ('imap.gmail.com', 993, TlsWrappedProtocolEnum.PLAIN_TLS), |
| set _NT_SYMBOL_PATH=D:\Python36;srv*c:\mycache*https://msdl.microsoft.com/download/symbols | |
| set OANOCACHE=1 | |
| "C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -p:14724 -f:.\umdh1.txt | |
| "C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -d .\umdh1.txt .\umdh2.txt > .\umd12.txt |
| from pympler import tracker | |
| from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError | |
| from sslyze.ssl_settings import TlsWrappedProtocolEnum | |
| memory_tracker = tracker.SummaryTracker() | |
| # Setup the server to scan and ensure it is online/reachable | |
| hostname = 'smtp.gmail.com' | |
| for i in range(20): | |
| try: |
| from pympler import tracker | |
| from nassl.ssl_client import OpenSslVersionEnum, OpenSslVerifyEnum | |
| import socket | |
| from nassl.legacy_ssl_client import LegacySslClient, SslClient | |
| memory_tracker = tracker.SummaryTracker() | |
| for i in range(20): | |
| sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) |