-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add an option to ignore invalid certificates when cloning Git repos #116
Comments
@ggbce are you running Nosey Parker using the Docker image? |
A workaround: clone the Git repos you want to scan separately, outside of Nosey Parker, and then scan the local clones. |
No. I run the compiled application (v0.16.0 x86_64) released on December 6th on Kali Linux.
…___________________________
Avis de confidentialité :
Les renseignements contenus dans le présent courriel incluant les pièces jointes peuvent contenir des renseignements confidentiels ou protégés en vertu de la loi ou visés par le secret professionnel.
Si vous n'êtes pas le destinataire prévu, veuillez prendre note que la divulgation, la distribution ou la reproduction de cette communication est strictement interdite. Si vous avez reçu cette communication par erreur, veuillez immédiatement en avertir l'expéditeur par téléphone ou par courriel et supprimer la communication de votre appareil fixe ou mobile, sans en faire de copie.
|
If I understand right, What happens if you try a regular |
What does the full commandline invocation look like? |
Like @bradlarsen said. It's to talk with a local server (self-signed or internal authority certification).
If I would like to make a "git" command. I didn't do it normally from a Linux machine. All dev teams use their Windows machines where they are on the domain. But for the purpose and find how to allow NoseyParker to make the scan from a machine where the certificate is consderated not valid... If I try to clone I should use:
|
NOTE: My goal is to automate the scan on periodic base to ensure a high level of security. |
Indeed! I left that comment as a workaround — the idea was to provide a path that makes what you're trying to do possible, until Nosey Parker has more suitable built-in support for your use case. |
* Allow to ignore validation of TLS certificates This adds a new `--ignore-certs` option to both the `scan` and `github` commands, which causes certificate validation to be skipped. This makes it possible to enumerate GitHub Enterprise Server instances and clone from https sources that are are behind invalid or self-signed certificates. Fixes #116. Co-authored-by: Brad Larsen <[email protected]>
I would like to use NoseyParker to scan or git projects on our internal GitLab server where it is on LAN area and use also an internal enterprise certificate. When I launch a scan I got this error:
fatal: unable to get access to 'https://myserver.local'/test/project1' : Server certificate verification failed. CAfile: non CRLfile: none
If I use my web browser, it work fine. Yes, Firefox or Chrome give me a warning when I try to access it from a Linux machine where is not a Windows member of the domain, but I can accept the unknown certificate. Does it possible to improve to accept unknown certificates like --ignore-invalidcertificate ?
The text was updated successfully, but these errors were encountered: