From 7a424784f8e376532e8e23dd88aa57c0d9e85948 Mon Sep 17 00:00:00 2001 From: Jeff Jarmoc Date: Wed, 9 Apr 2014 13:45:00 -0500 Subject: [PATCH] Change default TLS Version to 1.0 Canonical testing shows this to be more widely supported, and yielding far more vulnerable hosts. Changing default to reflect that. Experience of others in #metasploit seems similar. --- modules/auxiliary/scanner/ssl/openssl_heartbleed.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb b/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb index 1e9ef0702c..3cba1ce7c7 100644 --- a/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb +++ b/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb @@ -119,7 +119,7 @@ class Metasploit3 < Msf::Auxiliary [ Opt::RPORT(443), OptEnum.new('STARTTLS', [true, 'Protocol to use with STARTTLS, None to avoid STARTTLS ', 'None', [ 'None', 'SMTP', 'IMAP', 'JABBER', 'POP3' ]]), - OptEnum.new('TLSVERSION', [true, 'TLS version to use', '1.1', ['1.0', '1.1', '1.2']]) + OptEnum.new('TLSVERSION', [true, 'TLS version to use', '1.0', ['1.0', '1.1', '1.2']]) ], self.class) end