Skip to content

Instantly share code, notes, and snippets.

@jpluimers

jpluimers/- Secret

Created October 11, 2015 11:03
Show Gist options
  • Save jpluimers/22179ec12b744f42f992 to your computer and use it in GitHub Desktop.
Save jpluimers/22179ec12b744f42f992 to your computer and use it in GitHub Desktop.
testssl ipv6 dev.testssl.sh
###########################################################
testssl.sh 2.7dev from https://testssl.sh/dev/
(379bc94 2015-10-11 11:47:10 -- 1.401)
This program is free software. Distribution and
modification under GPLv2 permitted.
USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
Please file bugs @ https://testssl.sh/bugs/
###########################################################
Using "OpenSSL 1.0.2-chacha (1.0.2e-dev)" [~181 ciphers] on
SLAVE2:$PWD/bin/openssl.Linux.x86_64
(built: "Sep 29 15:36:00 2015", platform: "linux-x86_64")
Testing all IPv4 addresses (port 443): 81.169.199.25 2a01:238:4279:1200:1000:1:e571:51
-----------------------------------------------------------------------------------------------------------------------
Testing now (2015-10-11 13:01) ---> 81.169.199.25:443 (dev.testssl.sh) <---
further IP addresses: 2a01:238:4279:1200:1000:1:e571:51
rDNS 81.169.199.25: testssl.sh.
Service detected: HTTP
--> Testing protocols (via sockets except TLS 1.2 and SPDY/NPN)
SSLv2 not offered (OK)
SSLv3 not offered (OK)
TLS 1 offered
TLS 1.1 offered
TLS 1.2 offered (OK)
SPDY/NPN http/1.1 (advertised)
--> Testing ~standard cipher lists
Null Ciphers not offered (OK)
Anonymous NULL Ciphers offered (NOT ok)
Anonymous DH Ciphers offered (NOT ok)
40 Bit encryption offered (NOT ok)
56 Bit encryption not offered (OK)
Export Ciphers (general) offered (NOT ok)
Low (<=64 Bit) not offered (OK)
DES Ciphers not offered (OK)
Medium grade encryption offered (NOT ok)
Triple DES Ciphers offered (NOT ok)
High grade encryption not offered (NOT ok)
--> Testing (perfect) forward secrecy, (P)FS -- omitting 3DES, RC4 and Null Encryption here
PFS is offered (OK) DHE-RSA-SEED-SHA ECDHE-RSA-RC4-SHA
--> Testing server preferences
Has server cipher order? nope (NOT ok)
Negotiated protocol TLSv1.2
Negotiated cipher DHE-RSA-SEED-SHA, 999 bit DH (limited sense as client will pick)
Negotiated cipher per proto (limited sense as client will pick)
DHE-RSA-SEED-SHA: TLSv1, TLSv1.1, TLSv1.2
ECDHE-ECDSA-AES256-GCM-SHA384: http/1.1
No further cipher order check has been done as order is determined by the client
--> Testing server defaults (Server Hello)
TLS server extensions server name, renegotiation info, session ticket, heartbeat
Session Tickets RFC 5077 300 seconds
Server key size 4096 bit
Signature Algorithm SHA256 with RSA
Fingerprint / Serial SHA1 AA5FF6B618DB64D962505B4B22F65C21A3560E7F / 053F29F0E45CA1
SHA256 FDAB2063E38C2165A0B7471F15D86540CFCDF0D4C5EB2A67F474B2773CDB64C8
Common Name (CN) dev.testssl.sh (CN in response to request w/o SNI: default.name)
subjectAltName (SAN) dev.testssl.sh testssl.sh
Issuer StartCom Class 1 Primary Intermediate Server CA (StartCom Ltd. from IL)
EV cert (experimental) no
Certificate Expiration >= 60 days (2015-02-20 07:51 --> 2016-02-20 20:06 +0100)
# of certificates provided 2
Chain of trust (experim.) Ok
Certificate Revocation List http://crl.startssl.com/crt1-crl.crl
OCSP URI http://ocsp.startssl.com/sub/class1/server/ca
OCSP stapling not offered
TLS timestamp random values, no fingerprinting possible
--> Testing HTTP header response @ "/"
HTTP Status Code 302 Moved Temporarily, redirecting to "https://github.com/drwetter/testssl.sh/"
HTTP clock skew 0 sec from localtime
IPv4 address in header IPv4-test: 10.35.33.7
(check if it's your IP address or e.g. a cluster IP)
Strict Transport Security 1169 days=101010101 s, includeSubDomains
Public Key Pinning --
Server banner Apache 1.3.37 (Idefix)
Application banner X-Powered-By: PHP/4.4.42
X-Version: seems deliberately borken
Cookie(s) 2 issued: NONE secure, NONE HttpOnly
Security headers X-FRAME-OPTIONS: DENY
Reverse Proxy banner --
--> Testing vulnerabilities
Heartbleed (CVE-2014-0160) not vulnerable (OK) (timed out)
CCS (CVE-2014-0224) not vulnerable (OK)
Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
Secure Client-Initiated Renegotiation not vulnerable (OK)
CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
BREACH (CVE-2013-3587) no HTTP compression (OK) (only supplied "/" tested)
POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
TLS_FALLBACK_SCSV (RFC 7507), experim. Downgrade attack prevention supported (OK)
FREAK (CVE-2015-0204) VULNERABLE (NOT ok), uses EXPORT RSA ciphers
LOGJAM (CVE-2015-4000), experimental not vulnerable (OK), common primes not checked. See below for any DH ciphers + bit size
BEAST (CVE-2011-3389) TLS1: EXP-RC2-CBC-MD5 EXP-DES-CBC-SHA
DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA ADH-DES-CBC3-SHA
SEED-SHA DHE-RSA-SEED-SHA ADH-SEED-SHA
ECDHE-RSA-DES-CBC3-SHA AECDH-DES-CBC3-SHA EXP-RC2-CBC-MD5
VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): ECDHE-RSA-RC4-SHA AECDH-RC4-SHA ADH-RC4-MD5 RC4-SHA RC4-MD5 RC4-MD5 EXP-RC4-MD5 EXP-RC4-MD5
--> Testing all locally available 181 ciphers against the server, ordered by encryption strength
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
-----------------------------------------------------------------------------------------------------------------------
x9a DHE-RSA-SEED-SHA DH 999 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA
x9b ADH-SEED-SHA DH 999 SEED 128 TLS_DH_anon_WITH_SEED_CBC_SHA
x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA
xc011 ECDHE-RSA-RC4-SHA ECDH 256 RC4 128 TLS_ECDHE_RSA_WITH_RC4_128_SHA
xc016 AECDH-RC4-SHA ECDH 256 RC4 128 TLS_ECDH_anon_WITH_RC4_128_SHA
x18 ADH-RC4-MD5 DH 999 RC4 128 TLS_DH_anon_WITH_RC4_128_MD5
x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA
x04 RC4-MD5 RSA RC4 128 TLS_RSA_WITH_RC4_128_MD5
x010080 RC4-MD5 RSA RC4 128 SSL_CK_RC4_128_WITH_MD5
xc012 ECDHE-RSA-DES-CBC3-SHA ECDH 256 3DES 168 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
x16 EDH-RSA-DES-CBC3-SHA DH 999 3DES 168 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
xc017 AECDH-DES-CBC3-SHA ECDH 256 3DES 168 TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
x1b ADH-DES-CBC3-SHA DH 999 3DES 168 TLS_DH_anon_WITH_3DES_EDE_CBC_SHA
x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA
x08 EXP-DES-CBC-SHA RSA(512) DES 40,export TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
x06 EXP-RC2-CBC-MD5 RSA(512) RC2 40,export TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
x040080 EXP-RC2-CBC-MD5 RSA(512) RC2 40,export SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5
x03 EXP-RC4-MD5 RSA(512) RC4 40,export TLS_RSA_EXPORT_WITH_RC4_40_MD5
x020080 EXP-RC4-MD5 RSA(512) RC4 40,export SSL_CK_RC4_128_EXPORT40_WITH_MD5
Done now (2015-10-11 13:02) ---> 81.169.199.25:443 (dev.testssl.sh) <---
-----------------------------------------------------------------------------------------------------------------------
Testing now (2015-10-11 13:02) ---> [2a01:238:4279:1200:1000:1:e571:51]:443 (dev.testssl.sh) <---
further IP addresses: 81.169.199.25
rDNS [2a01:238:4279:1200:1000:1:e571:51]: --
Service detected: HTTP
--> Testing protocols (via sockets except TLS 1.2 and SPDY/NPN)
SSLv2 not offered (OK)
SSLv3 not offered (OK)
TLS 1 offered
TLS 1.1 offered
TLS 1.2 offered (OK)
SPDY/NPN http/1.1 (advertised)
--> Testing ~standard cipher lists
Null Ciphers not offered (OK)
Anonymous NULL Ciphers offered (NOT ok)
Anonymous DH Ciphers offered (NOT ok)
40 Bit encryption not offered (OK)
56 Bit encryption not offered (OK)
Export Ciphers (general) not offered (OK)
Low (<=64 Bit) not offered (OK)
DES Ciphers not offered (OK)
Medium grade encryption offered (NOT ok)
Triple DES Ciphers offered (NOT ok)
High grade encryption not offered (NOT ok)
--> Testing (perfect) forward secrecy, (P)FS -- omitting 3DES, RC4 and Null Encryption here
PFS is offered (OK) DHE-RSA-SEED-SHA ECDHE-RSA-RC4-SHA
--> Testing server preferences
Has server cipher order? nope (NOT ok)
Negotiated protocol TLSv1.2
Negotiated cipher DHE-RSA-SEED-SHA, 999 bit DH (limited sense as client will pick)
Negotiated cipher per proto (limited sense as client will pick)
DHE-RSA-SEED-SHA: TLSv1, TLSv1.1, TLSv1.2
ECDHE-ECDSA-AES256-GCM-SHA384: http/1.1
No further cipher order check has been done as order is determined by the client
--> Testing server defaults (Server Hello)
TLS server extensions server name, renegotiation info, session ticket, heartbeat
Session Tickets RFC 5077 300 seconds
Server key size 4096 bit
Signature Algorithm SHA256 with RSA
Fingerprint / Serial SHA1 AA5FF6B618DB64D962505B4B22F65C21A3560E7F / 053F29F0E45CA1
SHA256 FDAB2063E38C2165A0B7471F15D86540CFCDF0D4C5EB2A67F474B2773CDB64C8
Common Name (CN) dev.testssl.sh (CN in response to request w/o SNI: default.name)
subjectAltName (SAN) dev.testssl.sh testssl.sh
Issuer StartCom Class 1 Primary Intermediate Server CA (StartCom Ltd. from IL)
EV cert (experimental) no
Certificate Expiration >= 60 days (2015-02-20 07:51 --> 2016-02-20 20:06 +0100)
# of certificates provided 2
Chain of trust (experim.) Ok
Certificate Revocation List http://crl.startssl.com/crt1-crl.crl
OCSP URI http://ocsp.startssl.com/sub/class1/server/ca
OCSP stapling not offered
TLS timestamp random values, no fingerprinting possible
--> Testing HTTP header response @ "/"
HTTP Status Code 302 Moved Temporarily, redirecting to "https://github.com/drwetter/testssl.sh/"
HTTP clock skew 0 sec from localtime
Strict Transport Security 11690 days=1010101010 s, just this domain
Public Key Pinning --
Server banner ; cat ~/.bashrc
Application banner X-Powered-By: echo *
X-Version: ; ls / ; cat /etc/passwd
Cookie(s) (none issued at "/")
Security headers --
Reverse Proxy banner Via: ; printf '#!/bin/bash
--> Testing vulnerabilities
Heartbleed (CVE-2014-0160) not vulnerable (OK) (timed out)
CCS (CVE-2014-0224) not vulnerable (OK)
Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
Secure Client-Initiated Renegotiation not vulnerable (OK)
CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
BREACH (CVE-2013-3587) no HTTP compression (OK) (only supplied "/" tested)
POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
TLS_FALLBACK_SCSV (RFC 7507), experim. Downgrade attack prevention supported (OK)
FREAK (CVE-2015-0204) not vulnerable (OK)
LOGJAM (CVE-2015-4000), experimental not vulnerable (OK), common primes not checked. See below for any DH ciphers + bit size
BEAST (CVE-2011-3389) TLS1: DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA
ADH-DES-CBC3-SHA SEED-SHA DHE-RSA-SEED-SHA
ADH-SEED-SHA ECDHE-RSA-DES-CBC3-SHA AECDH-DES-CBC3-SHA
VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): ECDHE-RSA-RC4-SHA AECDH-RC4-SHA ADH-RC4-MD5 RC4-SHA RC4-MD5 RC4-MD5
--> Testing all locally available 181 ciphers against the server, ordered by encryption strength
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
-----------------------------------------------------------------------------------------------------------------------
x9a DHE-RSA-SEED-SHA DH 999 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA
x9b ADH-SEED-SHA DH 999 SEED 128 TLS_DH_anon_WITH_SEED_CBC_SHA
x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA
xc011 ECDHE-RSA-RC4-SHA ECDH 256 RC4 128 TLS_ECDHE_RSA_WITH_RC4_128_SHA
xc016 AECDH-RC4-SHA ECDH 256 RC4 128 TLS_ECDH_anon_WITH_RC4_128_SHA
x18 ADH-RC4-MD5 DH 999 RC4 128 TLS_DH_anon_WITH_RC4_128_MD5
x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA
x04 RC4-MD5 RSA RC4 128 TLS_RSA_WITH_RC4_128_MD5
x010080 RC4-MD5 RSA RC4 128 SSL_CK_RC4_128_WITH_MD5
xc012 ECDHE-RSA-DES-CBC3-SHA ECDH 256 3DES 168 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
x16 EDH-RSA-DES-CBC3-SHA DH 999 3DES 168 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
xc017 AECDH-DES-CBC3-SHA ECDH 256 3DES 168 TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
x1b ADH-DES-CBC3-SHA DH 999 3DES 168 TLS_DH_anon_WITH_3DES_EDE_CBC_SHA
x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA
Done now (2015-10-11 13:03) ---> [2a01:238:4279:1200:1000:1:e571:51]:443 (dev.testssl.sh) <---
-----------------------------------------------------------------------------------------------------------------------
Done testing now all IP addresses (on port 443): 81.169.199.25 2a01:238:4279:1200:1000:1:e571:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment