LinkScan

LinkScan Reference Manual

Section 29

  Previous   Contents   Next   Help   Reference   HowTo   Card 

LinkScan Application Notes

  1. LinkScan to Email Interface
  2. Testing Wireless Servers with LinkScan
  3. Testing Secure Servers with LinkScan

29.1 LinkScan to Email Interface

LinkScan incorporates several functions that relate to electronic mail. These include:

Some or all of the following parameters must be configured in order to use these functions:

Windows Systems -- linkscan.sys

Sendmailpath = perl utils/sendmail.pl
Smtphost = smtp.example.com
Hostname = www.example.com
Mailfrom = LinkScan@example.com
Nameservers =
[...]
Mailto = 1

Unix Systems -- linkscan.sys

Sendmailpath = /usr/lib/sendmail -t
Smtphost = 
Hostname = www.example.com
Mailfrom = LinkScan@example.com
Nameservers =
[...]
Mailto = 1

linkscan.cfg

For completeness, we address two related settings in the linkscan.cfg file:

Mailhost = example.com
Checkmailto = 0

29.2 Testing Wireless Servers with LinkScan

LinkScan includes support for the Wireless Application Protocol (WAP) and Wireless Markup Language (WML). This allows LinkScan to validate wireless sites via an HTTP gateway. Typically, you will need to add the following configuration commands to linkscan.cfg:


Extraheader User-Agent: Nokia7110/1.0 (04.80)
Mimetypes text/vnd.wap.wml H

This will cause LinkScan to send an appropriate User-Agent header with each request and to parse/follow documents with a MIME/Content-Type of text/vnd.wap.wml.

29.3 Testing Secure Servers with LinkScan

LinkScan may be configured to test websites hosted on secure servers running the Secure Sockets Layer (SSL). i.e. sites with URL's of the form https://www.example.com/.

On the Microsoft Windows platforms, you need only specify the URL of the site to be scanned. LinkScan includes native support for the Secure Sockets Layer.

On Unix systems, you will need to install additional software to handle the SSL encryption. The required packages are:

At the time of writing LinkScan has been tested with OpenSSL version 0.9.6 and Net::SSLeay version 1.05.

Installation of both packages is very straightforward if you have root access:



cd $HOME/openssl-0.9.6
./config
make
make test
make install   # See Note 1

cd $HOME/Net_SSLeay.pm-1.05
perl Makefile.PL
make
make test      # See Note 2
make install   # See Note 1

Note 1: The make install steps may fail if you do not have root access. You may install and run these packages from a user directory if you do not have root access by using something like this:


cd $HOME/openssl-0.9.6
./config --openssldir=$HOME/myopenssl
make
make test
make install

cd $HOME/Net_SSLeay.pm-1.05
perl Makefile.PL $HOME/myopenssl
make
make test
mv ./blib/lib/Net/ /usr/www/linkscan/
mv ./blib/lib/auto/ /usr/www/linkscan/

Note 2: The make test on Net::SSLeay will produce a number of errors. In general, you can safely ignore them.

Once the module Net::SSLeay has been successfully installed, LinkScan will be able to scan https://... sites without any additional configuration changes.

Disclaimer

Each of the above referenced programs (with the exception of LinkScan) is maintained by parties other than Electronic Software Publishing Corporation. You are solely responsible for your use of those products and your compliance with any applicable software license agreements. Several of the referenced products contain encryption algorithms, the distribution and use of which may be subject to various laws and regulations. You are solely responsible for compliance.

LinkScan Reference Manual. Section 29. LinkScan Application Notes
LinkScan Version 9.0
© Copyright 1997-2001 Electronic Software Publishing Corporation (Elsop)
LinkScan™ and Elsop™ are Trademarks of Electronic Software Publishing Corporation

  Previous   Contents   Next   Help   Reference   HowTo   Card