Output of ./testssl.sh --mx torproject.org, in text format and HTML format.
Output of checktls.com sender test.
2015-06-19
| Checking [email protected] | |
| looking up MX hosts on domain "torproject.org" | |
| eugeni.torproject.org (preference:10) | |
| Trying TLS on eugeni.torproject.org[38.229.72.13] (10): | |
| seconds test stage and result | |
| [000.026] Connected to server | |
| [002.432] <-- 220 eugeni.torproject.org ESMTP Postfix (Debian/GNU) | |
| [002.432] We are allowed to connect | |
| [002.432] --> EHLO checktls.com | |
| [002.448] <-- 250-eugeni.torproject.org | |
| 250-PIPELINING | |
| 250-SIZE 10240000 | |
| 250-ETRN | |
| 250-STARTTLS | |
| 250-ENHANCEDSTATUSCODES | |
| 250-8BITMIME | |
| 250 DSN | |
| [002.448] We can use this server | |
| [002.448] TLS is an option on this server | |
| [002.449] --> STARTTLS | |
| [002.466] <-- 220 2.0.0 Ready to start TLS | |
| [002.466] STARTTLS command works on this server | |
| [002.521] Cipher in use: ECDHE-RSA-AES256-GCM-SHA384 | |
| [002.521] Connection converted to SSL | |
| [002.538] | |
| Certificate 1 of 3 in chain: | |
| subject= /ST=Klatch/L=Al Khali/O=torproject.org/OU=auto-CA/CN=eugeni.torproject.org/[email protected] | |
| issuer= /ST=Klatch/L=Al Khali/O=torproject.org/OU=auto-CA/CN=auto-ca.torproject.org/[email protected] | |
| [002.552] | |
| Certificate 2 of 3 in chain: | |
| subject= /ST=Klatch/L=Al Khali/O=torproject.org/OU=auto-CA/CN=auto-ca.torproject.org/[email protected] | |
| issuer= /ST=Klatch/L=Al Khali/O=torproject.org/OU=auto-CA/CN=auto-ca.torproject.org/[email protected] | |
| [002.565] | |
| Certificate 3 of 3 in chain: | |
| subject= /ST=Klatch/L=Al Khali/O=torproject.org/OU=auto-CA/CN=auto-ca.torproject.org/[email protected] | |
| issuer= /ST=Klatch/L=Al Khali/O=torproject.org/OU=auto-CA/CN=auto-ca.torproject.org/[email protected] | |
| [002.565] Cert NOT VALIDATED: self signed certificate in certificate chain | |
| [002.566] So email is encrypted but the domain is not verified | |
| [002.566] Cert Hostname VERIFIED (eugeni.torproject.org = eugeni.torproject.org) | |
| [002.566] ~~> EHLO checktls.com | |
| [002.597] <~~ 250-eugeni.torproject.org | |
| 250-PIPELINING | |
| 250-SIZE 10240000 | |
| 250-ETRN | |
| 250-ENHANCEDSTATUSCODES | |
| 250-8BITMIME | |
| 250 DSN | |
| [002.611] TLS successfully started on this server | |
| [002.611] ~~> MAIL FROM:<[email protected]> | |
| [002.630] <~~ 250 2.1.0 Ok | |
| [002.630] Sender is OK | |
| [002.631] ~~> RCPT TO:<[email protected]> | |
| [005.666] <~~ 450 4.2.0 <[email protected]>: Recipient address rejected: Greylisted, see http://postgrey.schweikert.ch/help/torproject.org.html | |
| [005.666] Cannot proof e-mail address (reason: RCPT TO rejected) | |
| [005.667] Note: This does not affect the CheckTLS Confidence Factor | |
| [005.667] ~~> QUIT | |
| [005.682] <~~ 221 2.0.0 Bye |
| <?xml version="1.0" encoding="UTF-8" ?> | |
| <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> | |
| <!-- This file was created with the aha Ansi HTML Adapter. http://ziz.delphigl.com/tool_aha.php --> | |
| <html xmlns="http://www.w3.org/1999/xhtml"> | |
| <head> | |
| <meta http-equiv="Content-Type" content="application/xml+xhtml; charset=UTF-8" /> | |
| <title>stdin</title> | |
| </head> | |
| <body> | |
| <pre> | |
| <span style="font-weight:bold;"> | |
| ######################################################### | |
| testssl.sh 2.5dev http://dev.testssl.sh | |
| (</span><span style="color:dimgray;font-weight:bold;">59299ce 2015-06-17 11:33:29 -- 1.279</span><span style="font-weight:bold;">) | |
| This program is free software. Redistribution + | |
| modification under GPLv2 is permitted. | |
| USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! | |
| Note: you can only check the server with what is | |
| available (ciphers/protocols) locally on your machine! | |
| #########################################################</span> | |
| Using "OpenSSL 1.0.2a 19 Mar 2015" [~141 ciphers] on | |
| adam-w530:/usr/bin/openssl | |
| (built: "reproducible build, date unspecified", platform: "Cygwin-x86_64") | |
| <span style="color:purple;">For now I am providing the config file in to have GOST support</span> | |
| <span style="font-weight:bold;">Testing now all MX records (on port 25): </span>eugeni.torproject.org | |
| ------------------------------------------------------------------------------------------------------------------------- | |
| <span style="color:gray;background-color:black;">Testing now (2015-06-19 11:29) ---> 38.229.72.13:25 (eugeni.torproject.org) <---</span> | |
| rDNS (38.229.72.13): eugeni.torproject.org | |
| Service set: STARTTLS via SMTP | |
| <span style="color:blue;font-weight:bold;">--> Testing protocols </span>(via native openssl) | |
| SSLv2 <span style="color:green;font-weight:bold;">not offered (OK)</span> | |
| SSLv3 <span style="color:red;">offered (NOT ok)</span> | |
| TLS 1 offered | |
| TLS 1.1 offered | |
| TLS 1.2 <span style="color:green;font-weight:bold;">offered (OK)</span> | |
| SPDY/NPN (SPDY is a HTTP protocol and thus not tested here) | |
| <span style="color:blue;font-weight:bold;">--> Testing ~standard cipher lists</span> | |
| Null Ciphers <span style="color:green;font-weight:bold;">not offered (OK)</span> | |
| Anonymous NULL Ciphers <span style="color:green;font-weight:bold;">not offered (OK)</span> | |
| Anonymous DH Ciphers <span style="color:green;font-weight:bold;">not offered (OK)</span> | |
| 40 Bit encryption <span style="color:red;font-weight:bold;">offered (NOT ok)</span> | |
| 56 Bit encryption <span style="color:purple;font-weight:bold;">Local problem: No 56 Bit encryption configured in /usr/bin/openssl</span> | |
| Export Ciphers (general) <span style="color:red;font-weight:bold;">offered (NOT ok)</span> | |
| Low (<=64 Bit) <span style="color:red;font-weight:bold;">offered (NOT ok)</span> | |
| DES Ciphers <span style="color:red;font-weight:bold;">offered (NOT ok)</span> | |
| Medium grade encryption <span style="color:red;">offered (NOT ok)</span> | |
| Triple DES Ciphers <span style="color:olive;">offered (NOT ok)</span> | |
| High grade encryption <span style="color:green;font-weight:bold;">offered (OK)</span> | |
| <span style="color:blue;font-weight:bold;">--> Testing (perfect) forward secrecy, (P)FS</span> -- omitting 3DES, RC4 and Null Encryption here | |
| <span style="color:green;"> PFS ciphers (OK): </span>ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-SEED-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES128-SHA ECDHE-RSA-RC4-SHA | |
| <span style="color:blue;font-weight:bold;">--> Testing server preferences</span> | |
| Has server cipher order? <span style="color:red;">nope (NOT ok)</span> | |
| Negotiated protocol <span style="color:green;font-weight:bold;">TLSv1.2</span> | |
| Negotiated cipher <span style="color:green;font-weight:bold;">ECDHE-RSA-AES256-GCM-SHA384</span>, <span style="color:green;">256 bit ECDH</span> (limited sense as client will pick) | |
| Negotiated cipher per proto (limited sense as client will pick)(SPDY is a HTTP protocol and thus not tested here) | |
| ECDHE-RSA-AES256-SHA: SSLv3, TLSv1, TLSv1.1 | |
| ECDHE-RSA-AES256-GCM-SHA384: TLSv1.2 | |
| No further cipher order check as order is determined by the client | |
| <span style="color:blue;font-weight:bold;">--> Testing server defaults (Server Hello)</span> | |
| TLS timestamp: (not yet implemented for STARTTLS) | |
| HTTP clock skew: not tested as we're not targeting HTTP | |
| TLS server extensions renegotiation info, EC point formats, session ticket, heartbeat | |
| Session Tickets RFC 5077 7200 seconds | |
| Server key size 2048 bit | |
| Signature Algorithm <span style="color:olive;">SHA1 with RSA</span> | |
| Fingerprint / Serial SHA1 62D590B1F07257E21B08EB88D9295C0EF00F3EA2 / 01B8 | |
| SHA256 ED83D27364F556AEAAA066E4D35FB46E959C033C579E226D89A8850F9FDACB5C | |
| Common Name (CN) <span style="text-decoration:underline;">eugeni.torproject.org</span> (matches certificate directly) | |
| subjectAltName (SAN) -- | |
| Issuer <span style="text-decoration:underline;">auto-ca.torproject.org</span> (<span style="text-decoration:underline;">torproject.org</span>) | |
| Certificate Expiration <span style="color:green;">>= 60 days</span> (2015-03-10 20:00 --> 2016-03-09 19:00 -0500) | |
| # of certificates provided 2 | |
| Certificate Revocation List <span style="color:red;">--</span> | |
| OCSP URI <span style="color:red;">--</span> | |
| OCSP stapling not offered | |
| <span style="color:blue;font-weight:bold;">--> Testing vulnerabilities</span> | |
| <span style="font-weight:bold;"> Heartbleed</span> (CVE-2014-0160) (not yet implemented for STARTTLS) | |
| <span style="font-weight:bold;"> CCS</span> (CVE-2014-0224) (not yet implemented for STARTTLS) | |
| <span style="font-weight:bold;"> Secure Renegotiation </span>(CVE 2009-3555) <span style="color:green;font-weight:bold;">not vulnerable (OK)</span> | |
| <span style="font-weight:bold;"> Secure Client-Initiated Renegotiation </span><span style="color:green;">likely not vulnerable (OK)</span> (timed out) | |
| <span style="font-weight:bold;"> CRIME, TLS </span>(CVE-2012-4929) <span style="color:olive;">VULNERABLE (NOT ok), but not using HTTP: probably no exploit known</span> | |
| <span style="font-weight:bold;"> POODLE, SSL</span> (CVE-2014-3566) <span style="color:red;">VULNERABLE (NOT ok)</span>, uses SSLv3+CBC (check TLS_FALLBACK_SCSV mitigation below) | |
| <span style="font-weight:bold;"> TLS_FALLBACK_SCSV</span> (RFC 7507) <span style="color:olive;">Downgrade attack prevention NOT supported</span> | |
| <span style="font-weight:bold;"> FREAK</span> (CVE-2015-0204), experimental <span style="color:red;font-weight:bold;">VULNERABLE (NOT ok)</span>, uses EXPORT RSA ciphers | |
| <span style="font-weight:bold;"> LOGJAM</span> (CVE-2015-4000), experimental <span style="color:red;font-weight:bold;">VULNERABLE (NOT ok)</span>, uses DHE EXPORT ciphers | |
| <span style="font-weight:bold;"> BEAST</span> (CVE-2011-3389) SSL3:<span style="color:olive;"> ECDHE-RSA-DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA | |
| DES-CBC3-SHA EDH-RSA-DES-CBC-SHA DES-CBC-SHA | |
| EXP-EDH-RSA-DES-CBC-SHA EXP-DES-CBC-SHA EXP-RC2-CBC-MD5 | |
| EXP-RC2-CBC-MD5</span> | |
| TLS1:<span style="color:olive;"> ECDHE-RSA-DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA | |
| DES-CBC3-SHA EDH-RSA-DES-CBC-SHA DES-CBC-SHA | |
| EXP-EDH-RSA-DES-CBC-SHA EXP-DES-CBC-SHA EXP-RC2-CBC-MD5 | |
| EXP-RC2-CBC-MD5</span> | |
| -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2 | |
| <span style="font-weight:bold;"> RC4</span> (CVE-2013-2566, CVE-2015-2808) <span style="color:red;">VULNERABLE (NOT ok): </span><span style="color:red;">ECDHE-RSA-RC4-SHA </span><span style="color:red;">RC4-SHA </span><span style="color:red;">RC4-MD5 </span><span style="color:red;">RC4-MD5 </span><span style="color:red;">EXP-RC4-MD5 </span><span style="color:red;">EXP-RC4-MD5 </span> | |
| <span style="color:blue;font-weight:bold;">--> Testing all locally available 141 ciphers against the server</span>, ordered by encryption strength | |
| Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC) | |
| ----------------------------------------------------------------------------------------------------------------------- | |
| xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH <span style="color:green;">256 </span> AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | |
| xc028 ECDHE-RSA-AES256-SHA384 ECDH <span style="color:green;">256 </span> AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | |
| xc014 ECDHE-RSA-AES256-SHA ECDH <span style="color:green;">256 </span> AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | |
| x9f DHE-RSA-AES256-GCM-SHA384 DH <span style="color:olive;">1024 </span> AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | |
| x6b DHE-RSA-AES256-SHA256 DH <span style="color:olive;">1024 </span> AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 | |
| x39 DHE-RSA-AES256-SHA DH <span style="color:olive;">1024 </span> AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA | |
| x88 DHE-RSA-CAMELLIA256-SHA DH <span style="color:olive;">1024 </span> Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA | |
| x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 | |
| x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 | |
| x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA | |
| x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA | |
| xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH <span style="color:green;">256 </span> AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | |
| xc027 ECDHE-RSA-AES128-SHA256 ECDH <span style="color:green;">256 </span> AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 | |
| xc013 ECDHE-RSA-AES128-SHA ECDH <span style="color:green;">256 </span> AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | |
| x9e DHE-RSA-AES128-GCM-SHA256 DH <span style="color:olive;">1024 </span> AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | |
| x67 DHE-RSA-AES128-SHA256 DH <span style="color:olive;">1024 </span> AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 | |
| x33 DHE-RSA-AES128-SHA DH <span style="color:olive;">1024 </span> AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA | |
| x9a DHE-RSA-SEED-SHA DH <span style="color:olive;">1024 </span> SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA | |
| x45 DHE-RSA-CAMELLIA128-SHA DH <span style="color:olive;">1024 </span> Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA | |
| x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 | |
| x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 | |
| x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA | |
| x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA | |
| x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA | |
| xc011 ECDHE-RSA-RC4-SHA ECDH <span style="color:green;">256 </span> RC4 128 TLS_ECDHE_RSA_WITH_RC4_128_SHA | |
| x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA | |
| x04 RC4-MD5 RSA RC4 128 TLS_RSA_WITH_RC4_128_MD5 | |
| x010080 RC4-MD5 RSA RC4 128 SSL_CK_RC4_128_WITH_MD5 | |
| xc012 ECDHE-RSA-DES-CBC3-SHA ECDH <span style="color:green;">256 </span> 3DES 168 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA | |
| x16 EDH-RSA-DES-CBC3-SHA DH <span style="color:olive;">1024 </span> 3DES 168 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA | |
| x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA | |
| x15 EDH-RSA-DES-CBC-SHA DH <span style="color:olive;">1024 </span> DES 56 TLS_DHE_RSA_WITH_DES_CBC_SHA | |
| x09 DES-CBC-SHA RSA DES 56 TLS_RSA_WITH_DES_CBC_SHA | |
| x14 EXP-EDH-RSA-DES-CBC-SHA DH(512) DES 40,export TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA | |
| x08 EXP-DES-CBC-SHA RSA(512) DES 40,export TLS_RSA_EXPORT_WITH_DES40_CBC_SHA | |
| x06 EXP-RC2-CBC-MD5 RSA(512) RC2 40,export TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 | |
| x040080 EXP-RC2-CBC-MD5 RSA(512) RC2 40,export SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5 | |
| x03 EXP-RC4-MD5 RSA(512) RC4 40,export TLS_RSA_EXPORT_WITH_RC4_40_MD5 | |
| x020080 EXP-RC4-MD5 RSA(512) RC4 40,export SSL_CK_RC4_128_EXPORT40_WITH_MD5 | |
| <span style="color:gray;background-color:black;">Done now (2015-06-19 11:41) ---> 38.229.72.13:25 (eugeni.torproject.org) <---</span> | |
| ------------------------------------------------------------------------------------------------------------------------- | |
| <span style="font-weight:bold;">Done testing now all MX records (on port 25): </span>eugeni.torproject.org | |
| </pre> | |
| </body> | |
| </html> |
| ######################################################### | |
| testssl.sh 2.5dev http://dev.testssl.sh | |
| (59299ce 2015-06-17 11:33:29 -- 1.279) | |
| This program is free software. Redistribution + | |
| modification under GPLv2 is permitted. | |
| USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! | |
| Note: you can only check the server with what is | |
| available (ciphers/protocols) locally on your machine! | |
| ######################################################### | |
| Using "OpenSSL 1.0.2a 19 Mar 2015" [~141 ciphers] on | |
| adam-w530:/usr/bin/openssl | |
| (built: "reproducible build, date unspecified", platform: "Cygwin-x86_64") | |
| For now I am providing the config file in to have GOST support | |
| Testing now all MX records (on port 25): eugeni.torproject.org | |
| ------------------------------------------------------------------------------------------------------------------------- | |
| Testing now (2015-06-19 11:17) ---> 38.229.72.13:25 (eugeni.torproject.org) <--- | |
| rDNS (38.229.72.13): eugeni.torproject.org | |
| Service set: STARTTLS via SMTP | |
| --> Testing protocols (via native openssl) | |
| SSLv2 not offered (OK) | |
| SSLv3 offered (NOT ok) | |
| TLS 1 offered | |
| TLS 1.1 offered | |
| TLS 1.2 offered (OK) | |
| SPDY/NPN (SPDY is a HTTP protocol and thus not tested here) | |
| --> Testing ~standard cipher lists | |
| Null Ciphers not offered (OK) | |
| Anonymous NULL Ciphers not offered (OK) | |
| Anonymous DH Ciphers not offered (OK) | |
| 40 Bit encryption offered (NOT ok) | |
| 56 Bit encryption Local problem: No 56 Bit encryption configured in /usr/bin/openssl | |
| Export Ciphers (general) offered (NOT ok) | |
| Low (<=64 Bit) offered (NOT ok) | |
| DES Ciphers offered (NOT ok) | |
| Medium grade encryption offered (NOT ok) | |
| Triple DES Ciphers offered (NOT ok) | |
| High grade encryption offered (OK) | |
| --> Testing (perfect) forward secrecy, (P)FS -- omitting 3DES, RC4 and Null Encryption here | |
| PFS ciphers (OK): ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-SEED-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES128-SHA ECDHE-RSA-RC4-SHA | |
| --> Testing server preferences | |
| Has server cipher order? nope (NOT ok) | |
| Negotiated protocol TLSv1.2 | |
| Negotiated cipher ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (limited sense as client will pick) | |
| Negotiated cipher per proto (limited sense as client will pick)(SPDY is a HTTP protocol and thus not tested here) | |
| ECDHE-RSA-AES256-SHA: SSLv3, TLSv1, TLSv1.1 | |
| ECDHE-RSA-AES256-GCM-SHA384: TLSv1.2 | |
| No further cipher order check as order is determined by the client | |
| --> Testing server defaults (Server Hello) | |
| TLS timestamp: (not yet implemented for STARTTLS) | |
| HTTP clock skew: not tested as we're not targeting HTTP | |
| TLS server extensions renegotiation info, EC point formats, session ticket, heartbeat | |
| Session Tickets RFC 5077 7200 seconds | |
| Server key size 2048 bit | |
| Signature Algorithm SHA1 with RSA | |
| Fingerprint / Serial SHA1 62D590B1F07257E21B08EB88D9295C0EF00F3EA2 / 01B8 | |
| SHA256 ED83D27364F556AEAAA066E4D35FB46E959C033C579E226D89A8850F9FDACB5C | |
| Common Name (CN) eugeni.torproject.org (matches certificate directly) | |
| subjectAltName (SAN) -- | |
| Issuer auto-ca.torproject.org (torproject.org) | |
| Certificate Expiration >= 60 days (2015-03-10 20:00 --> 2016-03-09 19:00 -0500) | |
| # of certificates provided 2 | |
| Certificate Revocation List -- | |
| OCSP URI -- | |
| OCSP stapling not offered | |
| --> Testing vulnerabilities | |
| Heartbleed (CVE-2014-0160) (not yet implemented for STARTTLS) | |
| CCS (CVE-2014-0224) (not yet implemented for STARTTLS) | |
| Secure Renegotiation (CVE 2009-3555) not vulnerable (OK) | |
| Secure Client-Initiated Renegotiation likely not vulnerable (OK) (timed out) | |
| CRIME, TLS (CVE-2012-4929) VULNERABLE (NOT ok), but not using HTTP: probably no exploit known | |
| POODLE, SSL (CVE-2014-3566) VULNERABLE (NOT ok), uses SSLv3+CBC (check TLS_FALLBACK_SCSV mitigation below) | |
| TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention NOT supported | |
| FREAK (CVE-2015-0204), experimental VULNERABLE (NOT ok), uses EXPORT RSA ciphers | |
| LOGJAM (CVE-2015-4000), experimental VULNERABLE (NOT ok), uses DHE EXPORT ciphers | |
| BEAST (CVE-2011-3389) SSL3: ECDHE-RSA-DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA | |
| DES-CBC3-SHA EDH-RSA-DES-CBC-SHA DES-CBC-SHA | |
| EXP-EDH-RSA-DES-CBC-SHA EXP-DES-CBC-SHA EXP-RC2-CBC-MD5 | |
| EXP-RC2-CBC-MD5 | |
| TLS1: ECDHE-RSA-DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA | |
| DES-CBC3-SHA EDH-RSA-DES-CBC-SHA DES-CBC-SHA | |
| EXP-EDH-RSA-DES-CBC-SHA EXP-DES-CBC-SHA EXP-RC2-CBC-MD5 | |
| EXP-RC2-CBC-MD5 | |
| -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2 | |
| RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): ECDHE-RSA-RC4-SHA RC4-SHA RC4-MD5 RC4-MD5 EXP-RC4-MD5 EXP-RC4-MD5 | |
| --> Testing all locally available 141 ciphers against the server, ordered by encryption strength | |
| Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC) | |
| ----------------------------------------------------------------------------------------------------------------------- | |
| xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | |
| xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | |
| xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | |
| x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | |
| x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 | |
| x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA | |
| x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA | |
| x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 | |
| x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 | |
| x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA | |
| x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA | |
| xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | |
| xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 | |
| xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | |
| x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | |
| x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 | |
| x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA | |
| x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA | |
| x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA | |
| x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 | |
| x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 | |
| x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA | |
| x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA | |
| x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA | |
| xc011 ECDHE-RSA-RC4-SHA ECDH 256 RC4 128 TLS_ECDHE_RSA_WITH_RC4_128_SHA | |
| x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA | |
| x04 RC4-MD5 RSA RC4 128 TLS_RSA_WITH_RC4_128_MD5 | |
| x010080 RC4-MD5 RSA RC4 128 SSL_CK_RC4_128_WITH_MD5 | |
| xc012 ECDHE-RSA-DES-CBC3-SHA ECDH 256 3DES 168 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA | |
| x16 EDH-RSA-DES-CBC3-SHA DH 1024 3DES 168 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA | |
| x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA | |
| x15 EDH-RSA-DES-CBC-SHA DH 1024 DES 56 TLS_DHE_RSA_WITH_DES_CBC_SHA | |
| x09 DES-CBC-SHA RSA DES 56 TLS_RSA_WITH_DES_CBC_SHA | |
| x14 EXP-EDH-RSA-DES-CBC-SHA DH(512) DES 40,export TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA | |
| x08 EXP-DES-CBC-SHA RSA(512) DES 40,export TLS_RSA_EXPORT_WITH_DES40_CBC_SHA | |
| x06 EXP-RC2-CBC-MD5 RSA(512) RC2 40,export TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 | |
| x040080 EXP-RC2-CBC-MD5 RSA(512) RC2 40,export SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5 | |
| x03 EXP-RC4-MD5 RSA(512) RC4 40,export TLS_RSA_EXPORT_WITH_RC4_40_MD5 | |
| x020080 EXP-RC4-MD5 RSA(512) RC4 40,export SSL_CK_RC4_128_EXPORT40_WITH_MD5 | |
| Done now (2015-06-19 11:29) ---> 38.229.72.13:25 (eugeni.torproject.org) <--- | |
| ------------------------------------------------------------------------------------------------------------------------- | |
| Done testing now all MX records (on port 25): eugeni.torproject.org |
Output of ./testssl.sh --mx torproject.org, in text format and HTML format.
Output of checktls.com sender test.
2015-06-19