Skip to content

Instantly share code, notes, and snippets.

@jpluimers
Created September 9, 2016 13:47
Show Gist options
  • Save jpluimers/6d536c6ed8af20bcacb0d89077101f41 to your computer and use it in GitHub Desktop.
Save jpluimers/6d536c6ed8af20bcacb0d89077101f41 to your computer and use it in GitHub Desktop.
AHA of testssl.sh output

###########################################################
testssl.sh 2.7dev from https://testssl.sh/dev/
(16d161f 2016-05-27 15:52:23 -- 1.487)
This program is free software. Distribution and
modification under GPLv2 permitted.
USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
Please file bugs @ https://testssl.sh/bugs/
###########################################################
Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
on retinambpro1tb:./bin/openssl.Darwin.x86_64
(built: "Sep 7 19:34:54 2016", platform: "darwin64-x86_64-cc")
 Start 2016-09-09 15:40:16 -->> 81.169.199.25:443 (testssl.sh) <<--
rDNS (81.169.199.25): testssl.sh.
Service detected: HTTP
 Testing protocols (via sockets except TLS 1.2, SPDY+HTTP2) 
 SSLv2 not offered (OK)
 SSLv3 not offered (OK)
 TLS 1 offered
 TLS 1.1 offered
 TLS 1.2 offered (OK)
 SPDY/NPN h2, http/1.1 (advertised)
 HTTP2/ALPN h2, http/1.1 (offered)
 Testing ~standard cipher lists 
 Null Ciphers not offered (OK)
 Anonymous NULL Ciphers not offered (OK)
 Anonymous DH Ciphers not offered (OK)
 40 Bit encryption not offered (OK)
 56 Bit encryption not offered (OK)
 Export Ciphers (general) not offered (OK)
 Low (<=64 Bit) not offered (OK)
 DES Ciphers not offered (OK)
 Medium grade encryption not offered (OK)
 Triple DES Ciphers not offered (OK)
 High grade encryption offered (OK)
 Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption as well as 3DES and RC4 here 
 PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES128-SHA
 Testing server preferences 
 Has server cipher order? yes (OK)
 Negotiated protocol TLSv1.2
 Negotiated cipher ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH
 Cipher order
TLSv1: DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA AES256-SHA
TLSv1.1: DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA AES256-SHA
TLSv1.2: ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES256-SHA
h2: ECDHE-ECDSA-AES256-GCM-SHA384
http/1.1: ECDHE-ECDSA-AES256-GCM-SHA384
 Testing server defaults (Server Hello) 
 TLS extensions (standard) "server name/#0" "renegotiation info/#65281" "EC point formats/#11" "session ticket/#35" "status request/#5" "heartbeat/#15" "next protocol/#13172"
 Session Tickets RFC 5077 300 seconds (PFS requires session ticket keys to be rotated <= daily)
 SSL Session ID support yes
 TLS clock skew random values, no fingerprinting possible
 Signature Algorithm SHA256 with RSA
 Server key size 4096 bits
 Fingerprint / Serial SHA1 04B271342358DA65561A7604D63CBDC340DD7ADD / 664152EE3E270CB2E35F6AAB2E381898
SHA256 A82B73476774DDD484D14E98466C5E36C804BFD8F3C24D7BD60FD75AF3ECF707
 Common Name (CN) "testssl.sh" (CN in response to request w/o SNI: "default.name")
 subjectAltName (SAN) "testssl.sh" "bugs.testssl.sh" "dev.testssl.sh" "borken.testssl.sh" "secure.testssl.sh" "www.testssl.sh"
 Issuer "StartCom Class 1 DV Server CA" ("StartCom Ltd." from "IL")
 EV cert (experimental) no
 Certificate Expiration 163 >= 60 days (2016-02-19 22:30 --> 2017-02-19 22:30 +0100)
 # of certificates provided 2
 Chain of trust (experim.) Ok 
 Certificate Revocation List http://crl.startssl.com/sca-server1.crl
 OCSP URI http://ocsp.startssl.com
 OCSP stapling offered
 Testing HTTP header response @ "/" 
 HTTP Status Code  200 OK
 HTTP clock skew 0 sec from localtime
 Strict Transport Security 362 days=31337000 s, just this domain
 Public Key Pinning # of keys: 2, 30 days=2592000 s, just this domain
matching host key: 0SAMpcsNkPtjORdHdRDxho0NjSUJBgJGVPIFfieSEeA
 Server banner Never trust a banner
 Application banner X-Powered-By(B: A portion of humor
 Cookie(s) (none issued at "/")
 Security headers X-FRAME-OPTIONS: DENY
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
 Reverse Proxy banner --
 Testing vulnerabilities 
 Heartbleed (CVE-2014-0160) not vulnerable (OK) (timed out)
 CCS (CVE-2014-0224) not vulnerable (OK)
 Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
 Secure Client-Initiated Renegotiation not vulnerable (OK)
 CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
 BREACH (CVE-2013-3587) no HTTP compression (OK)  - only supplied "/" tested
 POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
 TLS_FALLBACK_SCSV (RFC 7507), experim. Downgrade attack prevention supported (OK)
 FREAK (CVE-2015-0204) not vulnerable (OK)
 DROWN (2016-0800, CVE-2016-0703), exper. not vulnerable on this port (OK)
make sure you don't use this certificate elsewhere with SSLv2 enabled services
https://censys.io/ipv4?q=A82B73476774DDD484D14E98466C5E36C804BFD8F3C24D7BD60FD75AF3ECF707 could help you to find out
 LOGJAM (CVE-2015-4000), experimental not vulnerable (OK), common primes not checked. See below for any DH ciphers + bit size
 BEAST (CVE-2011-3389) TLS1: DHE-RSA-AES128-SHA AES256-SHA
DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA128-SHA DHE-RSA-CAMELLIA256-SHA
ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA
VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
 RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
 Testing all 183 locally available ciphers against the server, ordered by encryption strength 
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
--------------------------------------------------------------------------------------------------------------------------
xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256  AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028 ECDHE-RSA-AES256-SHA384 ECDH 256  AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014 ECDHE-RSA-AES256-SHA ECDH 256  AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f DHE-RSA-AES256-GCM-SHA384 DH 2048  AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
x6b DHE-RSA-AES256-SHA256 DH 2048  AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39 DHE-RSA-AES256-SHA DH 2048  AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88 DHE-RSA-CAMELLIA256-SHA DH 2048  Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256  AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027 ECDHE-RSA-AES128-SHA256 ECDH 256  AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013 ECDHE-RSA-AES128-SHA ECDH 256  AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e DHE-RSA-AES128-GCM-SHA256 DH 2048  AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
x67 DHE-RSA-AES128-SHA256 DH 2048  AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33 DHE-RSA-AES128-SHA DH 2048  AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45 DHE-RSA-CAMELLIA128-SHA DH 2048  Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
 Running browser simulations (experimental) 
Android 2.3.7 No connection
Android 4.0.4 TLSv1 ECDHE-RSA-AES128-SHA
Android 4.1.1 TLSv1 ECDHE-RSA-AES256-SHA
Android 4.2.2 TLSv1 ECDHE-RSA-AES256-SHA
Android 4.3 TLSv1.0 ECDHE-RSA-AES256-SHA
Android 4.4.2 TLSv1.1 ECDHE-RSA-AES256-SHA
Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Baidu Jan 2015 TLSv1 DHE-RSA-CAMELLIA256-SHA
BingPreview Jan 2015 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Chrome 47 / OSX TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Firefox 31.3.0ESR / Win7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Firefox 42 / OSX TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
GoogleBot Feb 2015 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
IE6 / XP No connection
IE7 / Vista TLSv1.0 ECDHE-RSA-AES256-SHA
IE8 / XP No connection
IE8-10 / Win7 TLSv1.0 ECDHE-RSA-AES256-SHA
IE11 / Win7 TLSv1.2 DHE-RSA-AES256-GCM-SHA384
IE11 / Win8.1 TLSv1.2 DHE-RSA-AES256-GCM-SHA384
IE10 / Win Phone 8.0 TLSv1.0 ECDHE-RSA-AES256-SHA
IE11 / Win Phone 8.1 TLSv1.2 ECDHE-RSA-AES256-SHA
IE11 / Win Phone 8.1 Update TLSv1.2 DHE-RSA-AES256-GCM-SHA384
IE11 / Win10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Edge 13 / Win10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Edge 12 / Win Phone 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Java 6u45 No connection
Java 7u25 TLSv1 ECDHE-RSA-AES128-SHA
Java 8u31 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
OpenSSL 0.9.8y TLSv1 DHE-RSA-AES256-SHA
OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Safari 5.1.9/ OSX 10.6.8 TLSv1 ECDHE-RSA-AES256-SHA
Safari 6 / iOS 6.0.1 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 6.0.4/ OS X 10.8.4 TLSv1 ECDHE-RSA-AES256-SHA
Safari 7 / iOS 7.1 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 7 / OS X 10.9 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 8 / iOS 8.4 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 8 / OS X 10.10 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 9 / iOS 9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Safari 9 / OS X 10.11 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
 Done 2016-09-09 15:45:36 -->> 81.169.199.25:443 (testssl.sh) <<--
<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!-- This file was created with the aha Ansi HTML Adapter. http://ziz.delphigl.com/tool_aha.php -->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="application/xml+xhtml; charset=UTF-8" />
<title>/tmp/testssl.sh.ansi.txt</title>
</head>
<body>
<pre>
<span style="font-weight:bold;">
###########################################################
testssl.sh 2.7dev from https://testssl.sh/dev/
(</span><span style="color:dimgray;font-weight:bold;">16d161f 2016-05-27 15:52:23 -- 1.487</span><span style="font-weight:bold;">)
This program is free software. Distribution and
modification under GPLv2 permitted.
USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
Please file bugs @ https://testssl.sh/bugs/
###########################################################</span>
Using &quot;OpenSSL 1.0.2-chacha (1.0.2i-dev)&quot; [~183 ciphers]
on retinambpro1tb:./bin/openssl.Darwin.x86_64
(built: &quot;Sep 7 19:34:54 2016&quot;, platform: &quot;darwin64-x86_64-cc&quot;)
<span style="color:gray;background-color:black;"> Start 2016-09-09 15:40:16 --&gt;&gt; 81.169.199.25:443 (testssl.sh) &lt;&lt;--</span>
rDNS (81.169.199.25): testssl.sh.
Service detected: HTTP
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Testing protocols </span><span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;">(via sockets except TLS 1.2, SPDY+HTTP2) </span>
<span style="font-weight:bold;"> SSLv2 </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> SSLv3 </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> TLS 1 </span>offered
<span style="font-weight:bold;"> TLS 1.1 </span>offered
<span style="font-weight:bold;"> TLS 1.2 </span><span style="color:green;font-weight:bold;">offered (OK)</span>
<span style="font-weight:bold;"> SPDY/NPN </span>h2, http/1.1 (advertised)
<span style="font-weight:bold;"> HTTP2/ALPN </span>h2, http/1.1 (offered)
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Testing ~standard cipher lists </span>
<span style="font-weight:bold;"> Null Ciphers </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> Anonymous NULL Ciphers </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> Anonymous DH Ciphers </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> 40 Bit encryption </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> 56 Bit encryption </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> Export Ciphers (general) </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> Low (&lt;=64 Bit) </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> DES Ciphers </span><span style="color:green;font-weight:bold;">not offered (OK)</span>
<span style="font-weight:bold;"> Medium grade encryption </span><span style="color:green;">not offered (OK)</span>
<span style="font-weight:bold;"> Triple DES Ciphers </span>not offered (OK)
<span style="font-weight:bold;"> High grade encryption </span><span style="color:green;font-weight:bold;">offered (OK)</span>
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption as well as 3DES and RC4 here </span>
<span style="color:green;"> PFS is offered (OK)</span> ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES128-SHA
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Testing server preferences </span>
<span style="font-weight:bold;"> Has server cipher order? </span><span style="color:green;font-weight:bold;">yes (OK)</span>
<span style="font-weight:bold;"> Negotiated protocol </span><span style="color:green;font-weight:bold;">TLSv1.2</span>
<span style="font-weight:bold;"> Negotiated cipher </span><span style="color:green;font-weight:bold;">ECDHE-RSA-AES256-GCM-SHA384</span>, <span style="color:green;">256 bit ECDH</span>
<span style="font-weight:bold;"> Cipher order</span>
TLSv1: DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA AES256-SHA
TLSv1.1: DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA AES256-SHA
TLSv1.2: ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES256-SHA
h2: ECDHE-ECDSA-AES256-GCM-SHA384
http/1.1: ECDHE-ECDSA-AES256-GCM-SHA384
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Testing server defaults (Server Hello) </span>
<span style="font-weight:bold;"> TLS extensions (standard) </span>&quot;server name/#0&quot; &quot;renegotiation info/#65281&quot; &quot;EC point formats/#11&quot; &quot;session ticket/#35&quot; &quot;status request/#5&quot; &quot;heartbeat/#15&quot; &quot;next protocol/#13172&quot;
<span style="font-weight:bold;"> Session Tickets RFC 5077 </span>300 seconds <span style="color:olive;font-weight:bold;">(PFS requires session ticket keys to be rotated &lt;= daily)</span>
<span style="font-weight:bold;"> SSL Session ID support </span>yes
<span style="font-weight:bold;"> TLS clock skew</span> random values, no fingerprinting possible
<span style="font-weight:bold;"> Signature Algorithm </span><span style="color:green;">SHA256 with RSA</span>
<span style="font-weight:bold;"> Server key size </span><span style="color:green;">4096</span> bits
<span style="font-weight:bold;"> Fingerprint / Serial </span>SHA1 04B271342358DA65561A7604D63CBDC340DD7ADD / 664152EE3E270CB2E35F6AAB2E381898
SHA256 A82B73476774DDD484D14E98466C5E36C804BFD8F3C24D7BD60FD75AF3ECF707
<span style="font-weight:bold;"> Common Name (CN) </span>&quot;testssl.sh&quot; (CN in response to request w/o SNI: &quot;default.name&quot;)
<span style="font-weight:bold;"> subjectAltName (SAN) </span>&quot;testssl.sh&quot; &quot;bugs.testssl.sh&quot; &quot;dev.testssl.sh&quot; &quot;borken.testssl.sh&quot; &quot;secure.testssl.sh&quot; &quot;www.testssl.sh&quot;
<span style="font-weight:bold;"> Issuer </span>&quot;StartCom Class 1 DV Server CA&quot; (&quot;StartCom Ltd.&quot; from &quot;IL&quot;)
<span style="font-weight:bold;"> EV cert</span> (experimental) no
<span style="font-weight:bold;"> Certificate Expiration </span><span style="color:green;">163 &gt;= 60 days</span> (2016-02-19 22:30 --&gt; 2017-02-19 22:30 +0100)
<span style="font-weight:bold;"> # of certificates provided</span> 2
<span style="font-weight:bold;"> Chain of trust</span> (experim.) <span style="color:green;">Ok </span><span style="color:purple;"></span>
<span style="font-weight:bold;"> Certificate Revocation List </span>http://crl.startssl.com/sca-server1.crl
<span style="font-weight:bold;"> OCSP URI </span>http://ocsp.startssl.com
<span style="font-weight:bold;"> OCSP stapling </span><span style="color:green;">offered</span>
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Testing HTTP header response @ &quot;/&quot; </span>
<span style="font-weight:bold;"> HTTP Status Code </span> 200 OK
<span style="font-weight:bold;"> HTTP clock skew </span>0 sec from localtime
<span style="font-weight:bold;"> Strict Transport Security </span><span style="color:green;">362 days</span>=31337000 s<span style="color:teal;">, just this domain</span>
<span style="font-weight:bold;"> Public Key Pinning </span># of keys: 2, <span style="color:green;">30 days</span>=2592000 s<span style="color:teal;">, just this domain</span>
matching host key: <span style="color:green;">0SAMpcsNkPtjORdHdRDxho0NjSUJBgJGVPIFfieSEeA</span>
<span style="font-weight:bold;"> Server banner </span>Never trust a banner
<span style="font-weight:bold;"> Application banner </span><span style="color:olive;"></span><span style="color:olive;font-weight:bold;">X-Powered-By</span>: A portion of humor
<span style="font-weight:bold;"> Cookie(s) </span>(none issued at &quot;/&quot;)
<span style="font-weight:bold;"> Security headers </span><span style="color:green;">X-FRAME-OPTIONS:</span> DENY
<span style="color:green;">X-XSS-Protection:</span> 1; mode=block
<span style="color:green;">X-Content-Type-Options:</span> nosniff
<span style="font-weight:bold;"> Reverse Proxy banner </span>--
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Testing vulnerabilities </span>
<span style="font-weight:bold;"> Heartbleed</span> (CVE-2014-0160) <span style="color:green;font-weight:bold;">not vulnerable (OK)</span> (timed out)
<span style="font-weight:bold;"> CCS</span> (CVE-2014-0224) <span style="color:green;font-weight:bold;">not vulnerable (OK)</span>
<span style="font-weight:bold;"> Secure Renegotiation </span>(CVE-2009-3555) <span style="color:green;font-weight:bold;">not vulnerable (OK)</span>
<span style="font-weight:bold;"> Secure Client-Initiated Renegotiation </span><span style="color:green;">not vulnerable (OK)</span>
<span style="font-weight:bold;"> CRIME, TLS </span>(CVE-2012-4929) <span style="color:green;">not vulnerable (OK)</span>
<span style="font-weight:bold;"> BREACH</span> (CVE-2013-3587) <span style="color:green;font-weight:bold;">no HTTP compression (OK) </span> - only supplied &quot;/&quot; tested
<span style="font-weight:bold;"> POODLE, SSL</span> (CVE-2014-3566) <span style="color:green;font-weight:bold;">not vulnerable (OK)</span>
<span style="font-weight:bold;"> TLS_FALLBACK_SCSV</span> (RFC 7507), experim. <span style="color:green;">Downgrade attack prevention supported (OK)</span>
<span style="font-weight:bold;"> FREAK</span> (CVE-2015-0204) <span style="color:green;font-weight:bold;">not vulnerable (OK)</span>
<span style="font-weight:bold;"> DROWN</span> (2016-0800, CVE-2016-0703), exper. <span style="color:green;font-weight:bold;">not vulnerable on this port (OK)</span>
make sure you don't use this certificate elsewhere with SSLv2 enabled services
https://censys.io/ipv4?q=A82B73476774DDD484D14E98466C5E36C804BFD8F3C24D7BD60FD75AF3ECF707 could help you to find out
<span style="font-weight:bold;"> LOGJAM</span> (CVE-2015-4000), experimental <span style="color:green;font-weight:bold;">not vulnerable (OK)</span>, common primes not checked. See below for any DH ciphers + bit size
<span style="font-weight:bold;"> BEAST</span> (CVE-2011-3389) TLS1:<span style="color:olive;font-weight:bold;"> DHE-RSA-AES128-SHA AES256-SHA
DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA128-SHA DHE-RSA-CAMELLIA256-SHA
ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA</span>
<span style="color:olive;font-weight:bold;">VULNERABLE</span> -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
<span style="font-weight:bold;"> RC4</span> (CVE-2013-2566, CVE-2015-2808) <span style="color:green;">no RC4 ciphers detected (OK)</span>
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Testing all 183 locally available ciphers against the server, ordered by encryption strength </span>
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
--------------------------------------------------------------------------------------------------------------------------
xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH <span style="color:green;">256 </span> AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028 ECDHE-RSA-AES256-SHA384 ECDH <span style="color:green;">256 </span> AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014 ECDHE-RSA-AES256-SHA ECDH <span style="color:green;">256 </span> AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f DHE-RSA-AES256-GCM-SHA384 DH <span style="color:green;">2048 </span> AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
x6b DHE-RSA-AES256-SHA256 DH <span style="color:green;">2048 </span> AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39 DHE-RSA-AES256-SHA DH <span style="color:green;">2048 </span> AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88 DHE-RSA-CAMELLIA256-SHA DH <span style="color:green;">2048 </span> Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH <span style="color:green;">256 </span> AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027 ECDHE-RSA-AES128-SHA256 ECDH <span style="color:green;">256 </span> AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013 ECDHE-RSA-AES128-SHA ECDH <span style="color:green;">256 </span> AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e DHE-RSA-AES128-GCM-SHA256 DH <span style="color:green;">2048 </span> AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
x67 DHE-RSA-AES128-SHA256 DH <span style="color:green;">2048 </span> AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33 DHE-RSA-AES128-SHA DH <span style="color:green;">2048 </span> AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45 DHE-RSA-CAMELLIA128-SHA DH <span style="color:green;">2048 </span> Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
<span style="font-weight:bold;"></span><span style="text-decoration:underline;font-weight:bold;"> Running browser simulations (experimental) </span>
Android 2.3.7 No connection
Android 4.0.4 TLSv1 ECDHE-RSA-AES128-SHA
Android 4.1.1 TLSv1 ECDHE-RSA-AES256-SHA
Android 4.2.2 TLSv1 ECDHE-RSA-AES256-SHA
Android 4.3 TLSv1.0 ECDHE-RSA-AES256-SHA
Android 4.4.2 TLSv1.1 ECDHE-RSA-AES256-SHA
Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Baidu Jan 2015 TLSv1 DHE-RSA-CAMELLIA256-SHA
BingPreview Jan 2015 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Chrome 47 / OSX TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Firefox 31.3.0ESR / Win7 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Firefox 42 / OSX TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
GoogleBot Feb 2015 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
IE6 / XP No connection
IE7 / Vista TLSv1.0 ECDHE-RSA-AES256-SHA
IE8 / XP No connection
IE8-10 / Win7 TLSv1.0 ECDHE-RSA-AES256-SHA
IE11 / Win7 TLSv1.2 DHE-RSA-AES256-GCM-SHA384
IE11 / Win8.1 TLSv1.2 DHE-RSA-AES256-GCM-SHA384
IE10 / Win Phone 8.0 TLSv1.0 ECDHE-RSA-AES256-SHA
IE11 / Win Phone 8.1 TLSv1.2 ECDHE-RSA-AES256-SHA
IE11 / Win Phone 8.1 Update TLSv1.2 DHE-RSA-AES256-GCM-SHA384
IE11 / Win10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Edge 13 / Win10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Edge 12 / Win Phone 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Java 6u45 No connection
Java 7u25 TLSv1 ECDHE-RSA-AES128-SHA
Java 8u31 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
OpenSSL 0.9.8y TLSv1 DHE-RSA-AES256-SHA
OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Safari 5.1.9/ OSX 10.6.8 TLSv1 ECDHE-RSA-AES256-SHA
Safari 6 / iOS 6.0.1 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 6.0.4/ OS X 10.8.4 TLSv1 ECDHE-RSA-AES256-SHA
Safari 7 / iOS 7.1 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 7 / OS X 10.9 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 8 / iOS 8.4 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 8 / OS X 10.10 TLSv1.2 ECDHE-RSA-AES256-SHA384
Safari 9 / iOS 9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Safari 9 / OS X 10.11 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
<span style="color:gray;background-color:black;"> Done 2016-09-09 15:45:36 --&gt;&gt; 81.169.199.25:443 (testssl.sh) &lt;&lt;--</span>
</pre>
</body>
</html>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment