-
Notifications
You must be signed in to change notification settings - Fork 266
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
It's not obvious which openssl was used for the scan #179
Comments
google handling of tls versions and ciphers is very complex and it may mask some settings as unsupported what's the exact command line you're using to test them? |
Here is the command I am using: And the output is:
Using normal output does not change anything:
I compared the scan result with other tools as well, e.g. testssl.sh:
I am also wondering why the cipher suites ECDHE-ECDSA-... are not reported by |
Ok, I was not aware that cipherscan by default is using the openssl version which is bundled with cipherscan (OpenSSL 1.0.2-chacha (1.0.2i-dev)). I tried all commands above now with Falling into this trap I would really appreciate if the scan result would contain the openssl versions as well. |
yes, logging the version of script and used openssl in the output (including json) would be a nice addition |
It seems that for ECDH cipher suites the reported list of curves is not complete as x25519 is missing, even it this curve is supported by the server.
This can be checked e.g. against google.com (ssllabs indicates that x25519 is the preferred curve (besides secp256r1), cipherscan only reports prime256v1 in the list of curves.
My setup:
openssl version: 1.1.1c
The text was updated successfully, but these errors were encountered: