pshtt


Namepshtt JSON
Version 0.7.1 PyPI version JSON
download
home_pagehttps://www.cisa.gov/cybersecurity
SummaryScan websites for HTTPS deployment best practices
upload_time2023-12-21 18:47:14
maintainer
docs_urlNone
authorCybersecurity and Infrastructure Security Agency
requires_python>=3.7
licenseLicense :: CC0 1.0 Universal (CC0 1.0) Public Domain Dedication
keywords https best practices
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage
            # Pushing HTTPS 🔒 #

[![Latest Version](https://img.shields.io/pypi/v/pshtt.svg)](https://pypi.org/project/pshtt/)
[![GitHub Build Status](https://github.com/cisagov/pshtt/workflows/build/badge.svg)](https://github.com/cisagov/pshtt/actions)
[![CodeQL](https://github.com/cisagov/pshtt/workflows/CodeQL/badge.svg)](https://github.com/cisagov/pshtt/actions/workflows/codeql-analysis.yml)
[![Coverage Status](https://coveralls.io/repos/github/cisagov/pshtt/badge.svg?branch=develop)](https://coveralls.io/github/cisagov/pshtt?branch=develop)
[![Known Vulnerabilities](https://snyk.io/test/github/cisagov/pshtt/develop/badge.svg)](https://snyk.io/test/github/cisagov/pshtt)

`pshtt` (*"pushed"*) is a tool to scan domains for HTTPS best
practices. It saves its results to a CSV (or JSON) file.

`pshtt` was developed to *push* organizations — especially large ones
like the US Federal Government :us: — to adopt HTTPS across the
enterprise. Federal agencies must comply with
[M-15-13](https://https.cio.gov), a 2015 memorandum from the White
House Office of Management and Budget, and [BOD
18-01](https://cyber.dhs.gov/bod/18-01/), a 2017 directive from the
Department of Homeland Security, which require federal agencies to
enforce HTTPS on their public web services. Much has been done, but
there's [more yet to
do](https://18f.gsa.gov/2017/01/04/tracking-the-us-governments-progress-on-moving-https/).

`pshtt` is a collaboration between the Cyber and Infrastructure
Security Agency's [National Cybersecurity Assessments and Technical
Services (NCATS) team](https://github.com/cisagov) and [the General
Service Administration's 18F team](https://18f.gsa.gov), with
[contributions from NASA, Lawrence Livermore National Laboratory, and
various non-governmental
organizations](https://github.com/cisagov/pshtt/graphs/contributors).

## Getting started ##

`pshtt` can be installed as a module, or run directly from the
repository.

### Installed as a module ###

`pshtt` can be installed directly via pip:

```console
pip install pshtt
```

It can then be run directly:

```console
pshtt example.com [options]
```

### Running directly ###

To run the tool locally from the repository, without installing, first
install the requirements:

```console
pip install -r requirements.txt
```

Then run it as a module via `python -m`:

```console
python -m pshtt.cli example.com [options]
```

### Usage and examples ###

```console
pshtt [options] DOMAIN...
pshtt [options] INPUT

pshtt dhs.gov
pshtt --output=homeland.csv --debug dhs.gov us-cert.gov usss.gov
pshtt --sorted current-federal.csv
```

Note: if INPUT ends with `.csv`, domains will be read from the first
column of the CSV. CSV output will always be written to disk (unless
--json is specified), defaulting to `results.csv`.

#### Options ####

```console
  -h --help                     Show this message.
  -s --sorted                   Sort output by domain, A-Z.
  -o --output=OUTFILE           Name output file. (Defaults to "results".)
  -j --json                     Get results in JSON. (Defaults to CSV.)
  -m --markdown                 Get results in Markdown. (Defaults to CSV.)
  -d --debug                    Print debug output.
  -u --user-agent=AGENT         Override user agent.
  -t --timeout=TIMEOUT          Override timeout (in seconds).
  -c --cache-third-parties=DIR  Cache third party data, and what directory to cache it in.
  -f --ca-file=PATH             Specify custom CA bundle (PEM format)
```

##### Using your own CA bundle #####

By default, `pshtt` relies on the root CAs that are trusted in the
[Mozilla root
store](https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt).
If you work behind a corporate proxy or have your own certificates that
aren't publicly trusted, you can specify your own CA bundle:

```console
pshtt --ca-file=/etc/ssl/ca.pem server.internal-location.gov
```

## What's checked? ##

A domain is checked on its four endpoints:

- `http://`
- `http://www`
- `https://`
- `https://www`

### Domain and redirect info ###

The following values are returned in `results.csv`:

- `Domain` - The domain you're scanning!
- `Base Domain` - The base domain of `Domain`. For example, for a
  Domain of `sub.example.com`, the Base Domain will be
  `example.com`. Usually this is the second-level domain, but `pshtt`
  will download and factor in the [Public Suffix
  List](https://publicsuffix.org) when calculating the base
  domain. (To cache the Public Suffix List, use `--suffix-cache` as
  documented above.)
- `Canonical URL` - One of the four endpoints described above; a
  judgment call based on the observed redirect logic of the domain.
- `Live` - The domain is "live" if any endpoint is live.
- `HTTPS Live` - The domain is "HTTPS live" if any HTTPS endpoint is
  live.
- `HTTPS Full Connection` - The domain is "fully connected" if any
  HTTPS endpoint is fully connected.  A "fully connected" HTTPS
  endpoint is one with which pshtt could make a full TLS connection.
- `HTTPS Client Auth Required` - A domain requires client
  authentication if *any* HTTPS endpoint requires it for a full TLS
  connection.
- `Redirect` - The domain is a "redirect domain" if at least one
  endpoint is a redirect, and all endpoints are either redirects or
  down.
- `Redirect to` - If a domain is a "redirect domain", where does it
  redirect to?

### Landing on HTTPS ###

- `Valid HTTPS` - A domain has "valid HTTPS" if it responds on port
  443 at the hostname in its Canonical URL with an unexpired valid
  certificate for the hostname. This can be true even if the Canonical
  URL uses HTTP.
- `HTTPS Publicly Trusted` - A domain is "publicly trusted" if its
  canonical endpoint has a publicly trusted certificate.
- `HTTPS Custom Truststore Trusted` - A domain is "custom truststore
  trusted" if its canonical endpoint has a certificate that is trusted
  by the custom truststore.
- `Defaults to HTTPS` - A domain "defaults to HTTPS" if its canonical
  endpoint uses HTTPS.
- `Downgrades HTTPS` - A domain "downgrades HTTPS" if HTTPS is
  supported in some way, but its canonical HTTPS endpoint immediately
  redirects internally to HTTP.
- `Strictly Forces HTTPS` - This is different than whether a domain
  "defaults" to HTTPS. A domain "Strictly Forces HTTPS" if one of the
  HTTPS endpoints is "live", and if both HTTP endpoints are either
  down or redirect immediately to any HTTPS URI. An HTTP redirect can
  go to HTTPS on another domain, as long as it's immediate. (A domain
  with an invalid cert can still be enforcing HTTPS.)

### Common errors ###

- `HTTPS Bad Chain` - A domain has a bad chain if either HTTPS
  endpoint contains a bad chain.
- `HTTPS Bad Hostname` - A domain has a bad hostname if either HTTPS
  endpoint fails hostname validation.
- `HTTPS Expired Cert` - A domain has an expired certificate if either
  HTTPS endpoint has an expired certificate.
- `HTTPS Self-Signed Cert` - A domain has a self-signed certificate if
  either HTTPS endpoint has a self-signed certificate.
- `HTTPS Probably Missing Intermediate Cert` - A domain is "probably
  missing intermediate certificate" if the canonical HTTPS endpoint is
  probably missing an intermediate certificate.

### HSTS ###

- `HSTS` - A domain has HTTP Strict Transport Security enabled if its
  canonical HTTPS endpoint has HSTS enabled.
- `HSTS Header` - This field provides a domain's HSTS header at its
  canonical endpoint.
- `HSTS Max Age` - A domain's HSTS max-age is its canonical endpoint's
  max-age.
- `HSTS Entire Domain` - A domain has HSTS enabled for the entire
  domain if its **root HTTPS endpoint** (*not the canonical HTTPS
  endpoint*) has HSTS enabled and uses the HSTS `includeSubDomains`
  flag.
- `HSTS Preload Ready` - A domain is HSTS "preload ready" if its
  **root HTTPS endpoint** (*not the canonical HTTPS endpoint*) has
  HSTS enabled, has a max-age of at least 18 weeks, and uses the
  `includeSubDomains` and `preload` flag.
- `HSTS Preload Pending` - A domain is "preload pending" when it
  appears in the [Chrome preload pending
  list](https://hstspreload.org/api/v2/pending) with the
  `include_subdomains` flag equal to `true`.  The intent of `pshtt` is
  to make sure that the user is *fully* protected, so it only counts
  domains as HSTS preloaded if they are *fully* HSTS preloaded
  (meaning that all subdomains are included as well).
- `HSTS Preloaded` - A domain is HSTS preloaded if its domain name
  appears in the [Chrome preload
  list](https://chromium.googlesource.com/chromium/src/net/+/master/http/transport_security_state_static.json)
  with the `include_subdomains` flag equal to `true`, regardless of
  what header is present on any endpoint.  The intent of `pshtt` is to
  make sure that the user is *fully* protected, so it only counts
  domains as HSTS preloaded if they are *fully* HSTS preloaded
  (meaning that all subdomains are included as well).
- `Base Domain HSTS Preloaded` - A domain's base domain is HSTS
  preloaded if its base domain appears in the [Chrome preload
  list](https://chromium.googlesource.com/chromium/src/net/+/master/http/transport_security_state_static.json)
  with the `include_subdomains` flag equal to `true`. This is subtly
  different from `HSTS Entire Domain`, which inspects headers on the
  base domain to see if HSTS is set correctly to encompass the entire
  zone.

### Scoring ###

These three fields use the previous results to come to high-level
conclusions about a domain's behavior.

- `Domain Supports HTTPS` - A domain 'Supports HTTPS' when it doesn't
  downgrade and has valid HTTPS, or when it doesn't downgrade and has
  a bad chain but not a bad hostname (a bad hostname makes it clear
  the domain isn't actively attempting to support HTTPS, whereas an
  incomplete chain is just a mistake.). Domains with a bad chain
  "support" HTTPS but user-side errors can be expected.
- `Domain Enforces HTTPS` - A domain that 'Enforces HTTPS' must
  'Support HTTPS' and default to HTTPS. For websites (where `Redirect`
  is `false`) they are allowed to *eventually* redirect to an
  `https://` URI. For "redirect domains" (domains where the `Redirect`
  value is `true`) they must *immediately* redirect clients to an
  `https://` URI (even if that URI is on another domain) in order to
  be said to enforce HTTPS.
- `Domain Uses Strong HSTS` - A domain 'Uses Strong HSTS' when the
  max-age ≥ 31536000.

### General information ###

- `IP` - The IP for the domain.
- `Server Header` - The server header from the response for the
  domain.
- `Server Version` - The server version, as extracted from the server
  header.
- `HTTPS Cert Chain Length` - The certificate chain length for the
  canonical HTTPS endpoint.
- `Notes` - A field where free-form notes about the domain can be
  stored.

### Uncommon errors ###

- `Unknown Error` - A Boolean value indicating whether or not an
  unexpected exception was encountered when testing the domain.  The
  purpose of this field is to flag any odd websites for further
  debugging.

## Troubleshooting ##

### DNS blackhole / DNS assist ###

One issue which can occur when running `pshtt`, particularly for
home/residential networks, with standard ISPs is the use of "DNS
Assist" features, a.k.a. "DNS Blackholes".

In these environments, you may see inconsistent results from `pshtt`
owing to the fact that your ISP is attempting to detect a request for
an unknown site without a DNS record and is redirecting you to a
search page for that site. This means that an endpoint which *should*
resolve as "not-alive", will instead resolve as "live", owing to the
detection of the live search result page.

If you would like to disable this "feature", several ISPs offer the
ability to opt out of this service, and maintain their own
instructions for doing so:

- [AT&T](http://www.att.net/dnserrorassist/about/srchTrm=Redirect%20Bin)
- [FIOS](https://www.verizon.com/support/residential/internet/fiosinternet/troubleshooting/network/questionsone/99147.htm)

## Who uses pshtt? ##

- GSA maintains [Pulse](https://pulse.cio.gov), a dashboard that
  tracks how federal government domains are meeting best practices on
  the web. [Pulse is open source](https://github.com/18F/pulse).
- The Freedom of the Press Foundation runs
  [securethe.news](https://securethe.news), a site that aims to "track
  and promote the adoption of HTTPS encryption by major news
  organizations' websites". [Secure the News is open
  source](https://securethe.news/blog/secure-news-open-source/).
- DHS issues [HTTPS Reports](https://18f.gsa.gov/2017/01/06/open-source-collaboration-across-agencies-to-improve-https-deployment/)
  to federal executive branch agencies.

## Acknowledgements ##

This code was modeled after [Ben
Balter](https://github.com/benbalter)'s
[site-inspector](https://github.com/benbalter/site-inspector), with
significant guidance from [Eric Mill](https://github.com/konklone).

## Contributing ##

We welcome contributions!  Please see [`CONTRIBUTING.md`](CONTRIBUTING.md) for
details.

## License ##

This project is in the worldwide [public domain](LICENSE).

This project is in the public domain within the United States, and
copyright and related rights in the work worldwide are waived through
the [CC0 1.0 Universal public domain
dedication](https://creativecommons.org/publicdomain/zero/1.0/).

All contributions to this project will be released under the CC0
dedication. By submitting a pull request, you are agreeing to comply
with this waiver of copyright interest.

            

Raw data

            {
    "_id": null,
    "home_page": "https://www.cisa.gov/cybersecurity",
    "name": "pshtt",
    "maintainer": "",
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": "",
    "keywords": "https best practices",
    "author": "Cybersecurity and Infrastructure Security Agency",
    "author_email": "github@cisa.dhs.gov",
    "download_url": "https://files.pythonhosted.org/packages/85/95/9fce1da852550d40b0d7662385cae06789dbb3195f16a19ad9103adf4d15/pshtt-0.7.1.tar.gz",
    "platform": null,
    "description": "# Pushing HTTPS \ud83d\udd12 #\n\n[![Latest Version](https://img.shields.io/pypi/v/pshtt.svg)](https://pypi.org/project/pshtt/)\n[![GitHub Build Status](https://github.com/cisagov/pshtt/workflows/build/badge.svg)](https://github.com/cisagov/pshtt/actions)\n[![CodeQL](https://github.com/cisagov/pshtt/workflows/CodeQL/badge.svg)](https://github.com/cisagov/pshtt/actions/workflows/codeql-analysis.yml)\n[![Coverage Status](https://coveralls.io/repos/github/cisagov/pshtt/badge.svg?branch=develop)](https://coveralls.io/github/cisagov/pshtt?branch=develop)\n[![Known Vulnerabilities](https://snyk.io/test/github/cisagov/pshtt/develop/badge.svg)](https://snyk.io/test/github/cisagov/pshtt)\n\n`pshtt` (*\"pushed\"*) is a tool to scan domains for HTTPS best\npractices. It saves its results to a CSV (or JSON) file.\n\n`pshtt` was developed to *push* organizations \u2014 especially large ones\nlike the US Federal Government :us: \u2014 to adopt HTTPS across the\nenterprise. Federal agencies must comply with\n[M-15-13](https://https.cio.gov), a 2015 memorandum from the White\nHouse Office of Management and Budget, and [BOD\n18-01](https://cyber.dhs.gov/bod/18-01/), a 2017 directive from the\nDepartment of Homeland Security, which require federal agencies to\nenforce HTTPS on their public web services. Much has been done, but\nthere's [more yet to\ndo](https://18f.gsa.gov/2017/01/04/tracking-the-us-governments-progress-on-moving-https/).\n\n`pshtt` is a collaboration between the Cyber and Infrastructure\nSecurity Agency's [National Cybersecurity Assessments and Technical\nServices (NCATS) team](https://github.com/cisagov) and [the General\nService Administration's 18F team](https://18f.gsa.gov), with\n[contributions from NASA, Lawrence Livermore National Laboratory, and\nvarious non-governmental\norganizations](https://github.com/cisagov/pshtt/graphs/contributors).\n\n## Getting started ##\n\n`pshtt` can be installed as a module, or run directly from the\nrepository.\n\n### Installed as a module ###\n\n`pshtt` can be installed directly via pip:\n\n```console\npip install pshtt\n```\n\nIt can then be run directly:\n\n```console\npshtt example.com [options]\n```\n\n### Running directly ###\n\nTo run the tool locally from the repository, without installing, first\ninstall the requirements:\n\n```console\npip install -r requirements.txt\n```\n\nThen run it as a module via `python -m`:\n\n```console\npython -m pshtt.cli example.com [options]\n```\n\n### Usage and examples ###\n\n```console\npshtt [options] DOMAIN...\npshtt [options] INPUT\n\npshtt dhs.gov\npshtt --output=homeland.csv --debug dhs.gov us-cert.gov usss.gov\npshtt --sorted current-federal.csv\n```\n\nNote: if INPUT ends with `.csv`, domains will be read from the first\ncolumn of the CSV. CSV output will always be written to disk (unless\n--json is specified), defaulting to `results.csv`.\n\n#### Options ####\n\n```console\n  -h --help                     Show this message.\n  -s --sorted                   Sort output by domain, A-Z.\n  -o --output=OUTFILE           Name output file. (Defaults to \"results\".)\n  -j --json                     Get results in JSON. (Defaults to CSV.)\n  -m --markdown                 Get results in Markdown. (Defaults to CSV.)\n  -d --debug                    Print debug output.\n  -u --user-agent=AGENT         Override user agent.\n  -t --timeout=TIMEOUT          Override timeout (in seconds).\n  -c --cache-third-parties=DIR  Cache third party data, and what directory to cache it in.\n  -f --ca-file=PATH             Specify custom CA bundle (PEM format)\n```\n\n##### Using your own CA bundle #####\n\nBy default, `pshtt` relies on the root CAs that are trusted in the\n[Mozilla root\nstore](https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt).\nIf you work behind a corporate proxy or have your own certificates that\naren't publicly trusted, you can specify your own CA bundle:\n\n```console\npshtt --ca-file=/etc/ssl/ca.pem server.internal-location.gov\n```\n\n## What's checked? ##\n\nA domain is checked on its four endpoints:\n\n- `http://`\n- `http://www`\n- `https://`\n- `https://www`\n\n### Domain and redirect info ###\n\nThe following values are returned in `results.csv`:\n\n- `Domain` - The domain you're scanning!\n- `Base Domain` - The base domain of `Domain`. For example, for a\n  Domain of `sub.example.com`, the Base Domain will be\n  `example.com`. Usually this is the second-level domain, but `pshtt`\n  will download and factor in the [Public Suffix\n  List](https://publicsuffix.org) when calculating the base\n  domain. (To cache the Public Suffix List, use `--suffix-cache` as\n  documented above.)\n- `Canonical URL` - One of the four endpoints described above; a\n  judgment call based on the observed redirect logic of the domain.\n- `Live` - The domain is \"live\" if any endpoint is live.\n- `HTTPS Live` - The domain is \"HTTPS live\" if any HTTPS endpoint is\n  live.\n- `HTTPS Full Connection` - The domain is \"fully connected\" if any\n  HTTPS endpoint is fully connected.  A \"fully connected\" HTTPS\n  endpoint is one with which pshtt could make a full TLS connection.\n- `HTTPS Client Auth Required` - A domain requires client\n  authentication if *any* HTTPS endpoint requires it for a full TLS\n  connection.\n- `Redirect` - The domain is a \"redirect domain\" if at least one\n  endpoint is a redirect, and all endpoints are either redirects or\n  down.\n- `Redirect to` - If a domain is a \"redirect domain\", where does it\n  redirect to?\n\n### Landing on HTTPS ###\n\n- `Valid HTTPS` - A domain has \"valid HTTPS\" if it responds on port\n  443 at the hostname in its Canonical URL with an unexpired valid\n  certificate for the hostname. This can be true even if the Canonical\n  URL uses HTTP.\n- `HTTPS Publicly Trusted` - A domain is \"publicly trusted\" if its\n  canonical endpoint has a publicly trusted certificate.\n- `HTTPS Custom Truststore Trusted` - A domain is \"custom truststore\n  trusted\" if its canonical endpoint has a certificate that is trusted\n  by the custom truststore.\n- `Defaults to HTTPS` - A domain \"defaults to HTTPS\" if its canonical\n  endpoint uses HTTPS.\n- `Downgrades HTTPS` - A domain \"downgrades HTTPS\" if HTTPS is\n  supported in some way, but its canonical HTTPS endpoint immediately\n  redirects internally to HTTP.\n- `Strictly Forces HTTPS` - This is different than whether a domain\n  \"defaults\" to HTTPS. A domain \"Strictly Forces HTTPS\" if one of the\n  HTTPS endpoints is \"live\", and if both HTTP endpoints are either\n  down or redirect immediately to any HTTPS URI. An HTTP redirect can\n  go to HTTPS on another domain, as long as it's immediate. (A domain\n  with an invalid cert can still be enforcing HTTPS.)\n\n### Common errors ###\n\n- `HTTPS Bad Chain` - A domain has a bad chain if either HTTPS\n  endpoint contains a bad chain.\n- `HTTPS Bad Hostname` - A domain has a bad hostname if either HTTPS\n  endpoint fails hostname validation.\n- `HTTPS Expired Cert` - A domain has an expired certificate if either\n  HTTPS endpoint has an expired certificate.\n- `HTTPS Self-Signed Cert` - A domain has a self-signed certificate if\n  either HTTPS endpoint has a self-signed certificate.\n- `HTTPS Probably Missing Intermediate Cert` - A domain is \"probably\n  missing intermediate certificate\" if the canonical HTTPS endpoint is\n  probably missing an intermediate certificate.\n\n### HSTS ###\n\n- `HSTS` - A domain has HTTP Strict Transport Security enabled if its\n  canonical HTTPS endpoint has HSTS enabled.\n- `HSTS Header` - This field provides a domain's HSTS header at its\n  canonical endpoint.\n- `HSTS Max Age` - A domain's HSTS max-age is its canonical endpoint's\n  max-age.\n- `HSTS Entire Domain` - A domain has HSTS enabled for the entire\n  domain if its **root HTTPS endpoint** (*not the canonical HTTPS\n  endpoint*) has HSTS enabled and uses the HSTS `includeSubDomains`\n  flag.\n- `HSTS Preload Ready` - A domain is HSTS \"preload ready\" if its\n  **root HTTPS endpoint** (*not the canonical HTTPS endpoint*) has\n  HSTS enabled, has a max-age of at least 18 weeks, and uses the\n  `includeSubDomains` and `preload` flag.\n- `HSTS Preload Pending` - A domain is \"preload pending\" when it\n  appears in the [Chrome preload pending\n  list](https://hstspreload.org/api/v2/pending) with the\n  `include_subdomains` flag equal to `true`.  The intent of `pshtt` is\n  to make sure that the user is *fully* protected, so it only counts\n  domains as HSTS preloaded if they are *fully* HSTS preloaded\n  (meaning that all subdomains are included as well).\n- `HSTS Preloaded` - A domain is HSTS preloaded if its domain name\n  appears in the [Chrome preload\n  list](https://chromium.googlesource.com/chromium/src/net/+/master/http/transport_security_state_static.json)\n  with the `include_subdomains` flag equal to `true`, regardless of\n  what header is present on any endpoint.  The intent of `pshtt` is to\n  make sure that the user is *fully* protected, so it only counts\n  domains as HSTS preloaded if they are *fully* HSTS preloaded\n  (meaning that all subdomains are included as well).\n- `Base Domain HSTS Preloaded` - A domain's base domain is HSTS\n  preloaded if its base domain appears in the [Chrome preload\n  list](https://chromium.googlesource.com/chromium/src/net/+/master/http/transport_security_state_static.json)\n  with the `include_subdomains` flag equal to `true`. This is subtly\n  different from `HSTS Entire Domain`, which inspects headers on the\n  base domain to see if HSTS is set correctly to encompass the entire\n  zone.\n\n### Scoring ###\n\nThese three fields use the previous results to come to high-level\nconclusions about a domain's behavior.\n\n- `Domain Supports HTTPS` - A domain 'Supports HTTPS' when it doesn't\n  downgrade and has valid HTTPS, or when it doesn't downgrade and has\n  a bad chain but not a bad hostname (a bad hostname makes it clear\n  the domain isn't actively attempting to support HTTPS, whereas an\n  incomplete chain is just a mistake.). Domains with a bad chain\n  \"support\" HTTPS but user-side errors can be expected.\n- `Domain Enforces HTTPS` - A domain that 'Enforces HTTPS' must\n  'Support HTTPS' and default to HTTPS. For websites (where `Redirect`\n  is `false`) they are allowed to *eventually* redirect to an\n  `https://` URI. For \"redirect domains\" (domains where the `Redirect`\n  value is `true`) they must *immediately* redirect clients to an\n  `https://` URI (even if that URI is on another domain) in order to\n  be said to enforce HTTPS.\n- `Domain Uses Strong HSTS` - A domain 'Uses Strong HSTS' when the\n  max-age \u2265 31536000.\n\n### General information ###\n\n- `IP` - The IP for the domain.\n- `Server Header` - The server header from the response for the\n  domain.\n- `Server Version` - The server version, as extracted from the server\n  header.\n- `HTTPS Cert Chain Length` - The certificate chain length for the\n  canonical HTTPS endpoint.\n- `Notes` - A field where free-form notes about the domain can be\n  stored.\n\n### Uncommon errors ###\n\n- `Unknown Error` - A Boolean value indicating whether or not an\n  unexpected exception was encountered when testing the domain.  The\n  purpose of this field is to flag any odd websites for further\n  debugging.\n\n## Troubleshooting ##\n\n### DNS blackhole / DNS assist ###\n\nOne issue which can occur when running `pshtt`, particularly for\nhome/residential networks, with standard ISPs is the use of \"DNS\nAssist\" features, a.k.a. \"DNS Blackholes\".\n\nIn these environments, you may see inconsistent results from `pshtt`\nowing to the fact that your ISP is attempting to detect a request for\nan unknown site without a DNS record and is redirecting you to a\nsearch page for that site. This means that an endpoint which *should*\nresolve as \"not-alive\", will instead resolve as \"live\", owing to the\ndetection of the live search result page.\n\nIf you would like to disable this \"feature\", several ISPs offer the\nability to opt out of this service, and maintain their own\ninstructions for doing so:\n\n- [AT&T](http://www.att.net/dnserrorassist/about/srchTrm=Redirect%20Bin)\n- [FIOS](https://www.verizon.com/support/residential/internet/fiosinternet/troubleshooting/network/questionsone/99147.htm)\n\n## Who uses pshtt? ##\n\n- GSA maintains [Pulse](https://pulse.cio.gov), a dashboard that\n  tracks how federal government domains are meeting best practices on\n  the web. [Pulse is open source](https://github.com/18F/pulse).\n- The Freedom of the Press Foundation runs\n  [securethe.news](https://securethe.news), a site that aims to \"track\n  and promote the adoption of HTTPS encryption by major news\n  organizations' websites\". [Secure the News is open\n  source](https://securethe.news/blog/secure-news-open-source/).\n- DHS issues [HTTPS Reports](https://18f.gsa.gov/2017/01/06/open-source-collaboration-across-agencies-to-improve-https-deployment/)\n  to federal executive branch agencies.\n\n## Acknowledgements ##\n\nThis code was modeled after [Ben\nBalter](https://github.com/benbalter)'s\n[site-inspector](https://github.com/benbalter/site-inspector), with\nsignificant guidance from [Eric Mill](https://github.com/konklone).\n\n## Contributing ##\n\nWe welcome contributions!  Please see [`CONTRIBUTING.md`](CONTRIBUTING.md) for\ndetails.\n\n## License ##\n\nThis project is in the worldwide [public domain](LICENSE).\n\nThis project is in the public domain within the United States, and\ncopyright and related rights in the work worldwide are waived through\nthe [CC0 1.0 Universal public domain\ndedication](https://creativecommons.org/publicdomain/zero/1.0/).\n\nAll contributions to this project will be released under the CC0\ndedication. By submitting a pull request, you are agreeing to comply\nwith this waiver of copyright interest.\n",
    "bugtrack_url": null,
    "license": "License :: CC0 1.0 Universal (CC0 1.0) Public Domain Dedication",
    "summary": "Scan websites for HTTPS deployment best practices",
    "version": "0.7.1",
    "project_urls": {
        "Homepage": "https://www.cisa.gov/cybersecurity",
        "Source": "https://github.com/cisagov/pshtt",
        "Tracker": "https://github.com/cisagov/pshtt/issues"
    },
    "split_keywords": [
        "https",
        "best",
        "practices"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "ef86f0979438ebe31b4094110dc74ce0c728250b05f8b51272d3c56684d231f0",
                "md5": "34a180b8e4c869d107fa53ab805f5c79",
                "sha256": "1fd85ec970de8f8735c5076035de610c1b48c79a297f20fa5580507b4dac6c72"
            },
            "downloads": -1,
            "filename": "pshtt-0.7.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "34a180b8e4c869d107fa53ab805f5c79",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.7",
            "size": 29922,
            "upload_time": "2023-12-21T18:47:11",
            "upload_time_iso_8601": "2023-12-21T18:47:11.553998Z",
            "url": "https://files.pythonhosted.org/packages/ef/86/f0979438ebe31b4094110dc74ce0c728250b05f8b51272d3c56684d231f0/pshtt-0.7.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "85959fce1da852550d40b0d7662385cae06789dbb3195f16a19ad9103adf4d15",
                "md5": "92f4ee8949c1763c43f33930c42ab26c",
                "sha256": "92e4a48fa577dcb40fc09d06f7d9bc9c8d45583cce2ce47c8e1b582a48c6de6f"
            },
            "downloads": -1,
            "filename": "pshtt-0.7.1.tar.gz",
            "has_sig": false,
            "md5_digest": "92f4ee8949c1763c43f33930c42ab26c",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 36049,
            "upload_time": "2023-12-21T18:47:14",
            "upload_time_iso_8601": "2023-12-21T18:47:14.181246Z",
            "url": "https://files.pythonhosted.org/packages/85/95/9fce1da852550d40b0d7662385cae06789dbb3195f16a19ad9103adf4d15/pshtt-0.7.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-12-21 18:47:14",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "cisagov",
    "github_project": "pshtt",
    "travis_ci": false,
    "coveralls": true,
    "github_actions": true,
    "requirements": [],
    "lcname": "pshtt"
}
        
Elapsed time: 0.21047s