Created
February 18, 2017 02:13
-
-
Save bknowles/b50fc255bb3d9575a7e2412060464a81 to your computer and use it in GitHub Desktop.
Sample output from testssl.sh for issue #638
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ ./testssl.sh https://testssl.sh | |
########################################################### | |
testssl.sh 2.9dev from https://testssl.sh/dev/ | |
(d2cbbaf 2017-02-16 19:10:59 -- ) | |
This program is free software. Distribution and | |
modification under GPLv2 permitted. | |
USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! | |
Please file bugs @ https://testssl.sh/bugs/ | |
########################################################### | |
Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers] | |
on frobgaiju:./bin/openssl.Darwin.x86_64 | |
(built: "Sep 7 19:34:54 2016", platform: "darwin64-x86_64-cc") | |
Start 2017-02-17 19:53:04 -->> 81.169.199.25:443 (testssl.sh) <<-- | |
rDNS (81.169.199.25): testssl.sh. | |
Service detected: HTTP | |
Testing protocols via sockets except SPDY+HTTP2 | |
SSLv2 not offered (OK) | |
SSLv3 not offered (OK) | |
TLS 1 offered | |
TLS 1.1 offered | |
TLS 1.2 offered (OK) | |
SPDY/NPN h2, http/1.1 (advertised) | |
HTTP2/ALPN h2, http/1.1 (offered) | |
Testing ~standard cipher lists | |
Null Ciphers not offered (OK) | |
Anonymous NULL Ciphers not offered (OK) | |
Anonymous DH Ciphers not offered (OK) | |
40 Bit encryption not offered (OK) | |
56 Bit encryption not offered (OK) | |
Export Ciphers (general) not offered (OK) | |
Low (<=64 Bit) not offered (OK) | |
DES Ciphers not offered (OK) | |
"Medium" grade encryption not offered (OK) | |
Triple DES Ciphers not offered (OK) | |
High grade encryption offered (OK) | |
Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 | |
PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA DHE-RSA-AES256-GCM-SHA384 | |
DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA ECDHE-RSA-AES128-GCM-SHA256 | |
ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256 | |
DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA | |
Elliptic curves offered: prime256v1 | |
Testing server preferences | |
Has server cipher order? yes (OK) | |
Negotiated protocol TLSv1.2 | |
Negotiated cipher ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Cipher order | |
TLSv1: DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA | |
DHE-RSA-AES128-SHA AES256-SHA | |
TLSv1.1: DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA | |
DHE-RSA-AES128-SHA AES256-SHA | |
TLSv1.2: ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 | |
DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA256 | |
ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA | |
AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES256-SHA | |
h2: ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 | |
DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA256 | |
ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA | |
AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES256-SHA | |
http/1.1: ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 | |
DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA256 | |
ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA | |
AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES256-SHA | |
Testing server defaults (Server Hello) | |
TLS extensions (standard) "server name/#0" "renegotiation info/#65281" "EC point formats/#11" "session ticket/#35" "status | |
request/#5" "heartbeat/#15" "next protocol/#13172" "application layer protocol negotiation/#16" | |
Session Tickets RFC 5077 300 seconds (PFS requires session ticket keys to be rotated <= daily) | |
SSL Session ID support yes | |
TLS clock skew random values, no fingerprinting possible | |
Signature Algorithm SHA256 with RSA | |
Server key size RSA 4096 bits | |
Fingerprint / Serial SHA1 25F891F0441EA2461A4AF1DE5EE7515CD955B6BE / 03EE5D3ACB7CB134D525468BBE179C179BB9 | |
SHA256 167F79B340784BC3CCF94A91AD07792E6CB779D0E9EED3542930AD4534F846D9 | |
Common Name (CN) testssl.sh (CN in response to request w/o SNI: default.name) | |
subjectAltName (SAN) testssl.sh | |
Issuer Let's Encrypt Authority X3 (Let's Encrypt from US) | |
Trust (hostname) Ok via SAN and CN (SNI mandatory) | |
Chain of trust "/etc/*.pem" cannot be found / not readable | |
EV cert (experimental) no | |
Certificate Expiration 77 >= 30 days (2017-02-05 13:40 --> 2017-05-06 14:40 -0500) | |
# of certificates provided 2 | |
Certificate Revocation List -- | |
OCSP URI http://ocsp.int-x3.letsencrypt.org/ | |
OCSP stapling offered | |
DNS CAA RR (experimental) -- | |
Testing HTTP header response @ "/" | |
HTTP Status Code 200 OK | |
HTTP clock skew 0 sec from localtime | |
Strict Transport Security HSTS max-age is set to 0. HSTS is disabled, just this domain | |
Public Key Pinning -- | |
Server banner Never trust a banner | |
Application banner X-Powered-By: A portion of humor | |
Cookie(s) (none issued at "/") | |
Security headers X-Frame-Options DENY | |
X-XSS-Protection 1; mode=block | |
X-Content-Type-Options nosniff | |
Reverse Proxy banner -- | |
Testing vulnerabilities | |
Heartbleed (CVE-2014-0160) not vulnerable (OK), timed out | |
CCS (CVE-2014-0224) not vulnerable (OK) | |
Secure Renegotiation (CVE-2009-3555) not vulnerable (OK) | |
Secure Client-Initiated Renegotiation not vulnerable (OK) | |
CRIME, TLS (CVE-2012-4929) not vulnerable (OK) | |
BREACH (CVE-2013-3587) no HTTP compression (OK) - only supplied "/" tested | |
POODLE, SSL (CVE-2014-3566) not vulnerable (OK) | |
TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK) | |
SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK) | |
FREAK (CVE-2015-0204) not vulnerable (OK) | |
DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this port (OK) | |
make sure you don't use this certificate elsewhere with SSLv2 enabled services | |
https://censys.io/ipv4?q=167F79B340784BC3CCF94A91AD07792E6CB779D0E9EED3542930AD4534F846D9 could help you to find out | |
LOGJAM (CVE-2015-4000), experimental head: illegal line count -- -1 | |
Local problem: couldn't read common primes file /etc/common-primes.txt | |
partly not vulnerable: no DH EXPORT ciphers | |
BEAST (CVE-2011-3389) TLS1: DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA | |
ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA AES256-SHA | |
VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2 | |
LUCKY13 (CVE-2013-0169) VULNERABLE, uses cipher block chaining (CBC) ciphers | |
RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK) | |
Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength | |
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC) | |
----------------------------------------------------------------------------------------------------------------------------- | |
xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | |
xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | |
xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | |
x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | |
x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 | |
x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA | |
x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA | |
x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 | |
x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 | |
x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA | |
xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | |
xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 | |
xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | |
x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | |
x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 | |
x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA | |
x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA | |
x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 | |
Running browser simulations via sockets (experimental) | |
Android 2.3.7 No connection | |
Android 4.0.4 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
Android 4.1.1 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
Android 4.2.2 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
Android 4.3 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
Android 4.4.2 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) | |
Baidu Jan 2015 TLSv1.0 DHE-RSA-CAMELLIA256-SHA, 2048 bit DH | |
BingPreview Jan 2015 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Chrome 47 / OSX TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) | |
Firefox 31.3.0ESR / Win7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) | |
Firefox 42 OS X TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) | |
GoogleBot Feb 2015 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) | |
IE 6 XP No connection | |
IE 7 Vista TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
IE 8 XP No connection | |
IE 8-10 Win 7 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
IE 11 Win 7 TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 2048 bit DH | |
IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
IE 10 Win Phone 8.0 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
IE 11 Win Phone 8.1 TLSv1.2 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
IE 11 Win Phone 8.1 Update TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 2048 bit DH | |
IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Java 6u45 No connection | |
Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) | |
Java 8u31 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) | |
OpenSSL 0.9.8y TLSv1.0 DHE-RSA-AES256-SHA, 2048 bit DH | |
OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
Safari 6 iOS 6.0.1 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) | |
Safari 6.0.4 OS X 10.8.4 TLSv1.0 ECDHE-RSA-AES256-SHA, 256 bit ECDH (P-256) | |
Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) | |
Safari 7 OS X 10.9 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) | |
Safari 8 iOS 8.4 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) | |
Safari 8 OS X 10.10 TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256) | |
Safari 9 iOS 9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Safari 9 OS X 10.11 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Done 2017-02-17 19:58:06 -->> 81.169.199.25:443 (testssl.sh) <<-- |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment