...
 
Commits (5)
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is enabled
TLSv1.0 is enabled
TLSv1.1 is enabled
TLSv1.2 is enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 enabled
TLSv1.0 enabled
TLSv1.1 enabled
TLSv1.2 enabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,9 +21,9 @@ Server supports TLS Fallback SCSV
Compression enabled (CRIME)
Heartbleed:
TLS 1.2 not vulnerable to heartbleed
TLS 1.1 not vulnerable to heartbleed
TLS 1.0 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
TLSv1.1 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve P-256 DHE 256
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 enabled
TLSv1.3 not enabled
Supported Server Cipher(s):
Preferred 400 Bad Request TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305  Curve 25519 DHE 253
......
......@@ -4,12 +4,12 @@
Testing SSL server www.amazon.com on port 443 using SNI name www.amazon.com
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is enabled
TLSv1.1 is enabled
TLSv1.2 is enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 enabled
TLSv1.1 enabled
TLSv1.2 enabled
TLSv1.3 not enabled
OCSP Stapling Request:
OCSP Response Status: successful (0x0)
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is enabled
SSLv3 is enabled
TLSv1.0 is enabled
TLSv1.1 is not enabled
TLSv1.2 is not enabled
TLSv1.3 is not enabled
SSLv2 enabled
SSLv3 enabled
TLSv1.0 enabled
TLSv1.1 disabled
TLSv1.2 disabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Server does not support TLS Fallback SCSV
......@@ -21,7 +21,7 @@ Server does not support TLS Fallback SCSV
Compression enabled (CRIME)
Heartbleed:
TLS 1.0 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is enabled
TLSv1.1 is enabled
TLSv1.2 is enabled
TLSv1.3 is enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 enabled
TLSv1.1 enabled
TLSv1.2 enabled
TLSv1.3 enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,16 +21,16 @@ Server supports TLS Fallback SCSV
Compression disabled
Heartbleed:
TLS 1.3 not vulnerable to heartbleed
TLS 1.2 not vulnerable to heartbleed
TLS 1.1 not vulnerable to heartbleed
TLS 1.0 not vulnerable to heartbleed
TLSv1.3 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
TLSv1.1 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_SHA256 Curve 25519 DHE 253
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_SHA256 Curve 25519 DHE 253
Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve 25519 DHE 253
Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384  DHE 2048 bits
Accepted TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305  Curve 25519 DHE 253
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is enabled
TLSv1.3 is enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 enabled
TLSv1.3 enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,14 +21,14 @@ Session renegotiation not supported
Compression disabled
Heartbleed:
TLS 1.3 not vulnerable to heartbleed
TLS 1.2 not vulnerable to heartbleed
TLSv1.3 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve P-521 DHE 521
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve P-521 DHE 521
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve P-521 DHE 521
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_SHA256 Curve P-521 DHE 521
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve P-521 DHE 521
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve P-521 DHE 521
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve P-521 DHE 521
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_SHA256 Curve P-521 DHE 521
Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve P-521 DHE 521
Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384  DHE 8192 bits
Accepted TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305  Curve P-521 DHE 521
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is enabled
TLSv1.1 is enabled
TLSv1.2 is enabled
TLSv1.3 is enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 enabled
TLSv1.1 enabled
TLSv1.2 enabled
TLSv1.3 enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,16 +21,16 @@ Server supports TLS Fallback SCSV
Compression disabled
Heartbleed:
TLS 1.3 not vulnerable to heartbleed
TLS 1.2 not vulnerable to heartbleed
TLS 1.1 not vulnerable to heartbleed
TLS 1.0 not vulnerable to heartbleed
TLSv1.3 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
TLSv1.1 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_SHA256 Curve 25519 DHE 253
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_SHA256 Curve 25519 DHE 253
Preferred TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve 25519 DHE 253
Accepted TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve 25519 DHE 253
Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-CCM Curve 25519 DHE 253
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 enabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,7 +21,7 @@ Session renegotiation not supported
Compression disabled
Heartbleed:
TLS 1.2 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384  DHE 2048 bits
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 enabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,7 +21,7 @@ Session renegotiation not supported
Compression disabled
Heartbleed:
TLS 1.2 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384  DHE 1024 bits
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 enabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,7 +21,7 @@ Session renegotiation not supported
Compression disabled
Heartbleed:
TLS 1.2 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve 25519 DHE 253
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is enabled
SSLv3 is not enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is not enabled
TLSv1.3 is not enabled
SSLv2 enabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 disabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Connection failed - unable to determine TLS Fallback SCSV support
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is not enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 enabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 disabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Connection failed - unable to determine TLS Fallback SCSV support
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is enabled
TLSv1.1 is enabled
TLSv1.2 is enabled
TLSv1.3 is enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 enabled
TLSv1.1 enabled
TLSv1.2 enabled
TLSv1.3 enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,15 +21,15 @@ Server supports TLS Fallback SCSV
Compression disabled
Heartbleed:
TLS 1.3 not vulnerable to heartbleed
TLS 1.2 not vulnerable to heartbleed
TLS 1.1 not vulnerable to heartbleed
TLS 1.0 not vulnerable to heartbleed
TLSv1.3 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
TLSv1.1 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve 25519 DHE 253
Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384  DHE 3072 bits
Accepted TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305  Curve 25519 DHE 253
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is enabled
TLSv1.0 is enabled
TLSv1.1 is enabled
TLSv1.2 is enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 enabled
TLSv1.0 enabled
TLSv1.1 enabled
TLSv1.2 enabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,9 +21,9 @@ Server supports TLS Fallback SCSV
Compression enabled (CRIME)
Heartbleed:
TLS 1.2 not vulnerable to heartbleed
TLS 1.1 not vulnerable to heartbleed
TLS 1.0 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
TLSv1.1 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve P-256 DHE 256
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is not enabled
TLSv1.3 is enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 disabled
TLSv1.3 enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
......@@ -21,14 +21,14 @@ Session renegotiation not supported
Compression disabled
Heartbleed:
TLS 1.3 not vulnerable to heartbleed
TLSv1.3 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_8_SHA256 Curve 25519 DHE 253
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 128 bits TLS_AES_128_CCM_8_SHA256 Curve 25519 DHE 253
Server Key Exchange Group(s):
TLSv1.3 128 bits secp256r1 (NIST P-256)
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is enabled
SSLv3 is enabled
TLSv1.0 is enabled
TLSv1.1 is not enabled
TLSv1.2 is not enabled
TLSv1.3 is not enabled
SSLv2 enabled
SSLv3 enabled
TLSv1.0 enabled
TLSv1.1 disabled
TLSv1.2 disabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Server does not support TLS Fallback SCSV
......@@ -21,7 +21,7 @@ Server does not support TLS Fallback SCSV
Compression enabled (CRIME)
Heartbleed:
TLS 1.0 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is enabled
SSLv3 is enabled
TLSv1.0 is enabled
TLSv1.1 is not enabled
TLSv1.2 is not enabled
TLSv1.3 is not enabled
SSLv2 enabled
SSLv3 enabled
TLSv1.0 enabled
TLSv1.1 disabled
TLSv1.2 disabled
TLSv1.3 not enabled
TLS Fallback SCSV:
Server does not support TLS Fallback SCSV
......@@ -21,7 +21,7 @@ Server does not support TLS Fallback SCSV
Compression enabled (CRIME)
Heartbleed:
TLS 1.0 not vulnerable to heartbleed
TLSv1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
......
......@@ -4,12 +4,12 @@
Testing SSL server 127.0.0.1 on port 4443 using SNI name 127.0.0.1
SSL/TLS Protocols:
SSLv2 is not enabled
SSLv3 is not enabled
TLSv1.0 is not enabled
TLSv1.1 is not enabled
TLSv1.2 is enabled
TLSv1.3 is not enabled
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 enabled
TLSv1.3 not enabled
Supported Server Cipher(s):
Preferred 200 OK TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305  Curve 25519 DHE 253
......
......@@ -3948,7 +3948,7 @@ int main(int argc, char *argv[])
}
while ((hostString[tempInt] != 0) && ((squareBrackets == true && hostString[tempInt] != ']')
|| (squareBrackets == false && hostString[tempInt] != ':')))
|| (squareBrackets == false && hostString[tempInt] != ':' && hostString[tempInt] != '/')))
{
tempInt++;
}
......@@ -3956,7 +3956,7 @@ int main(int argc, char *argv[])
if (squareBrackets == true && hostString[tempInt] == ']')
{
hostString[tempInt] = 0;
if (tempInt < maxSize && hostString[tempInt + 1] == ':')
if (tempInt < maxSize && (hostString[tempInt + 1] == ':' || hostString[tempInt + 1] == '/'))
{
tempInt++;
hostString[tempInt] = 0;
......@@ -3982,7 +3982,7 @@ int main(int argc, char *argv[])
options.port = strtol((hostString + tempInt), NULL, 10);
if (options.port < 1 || options.port > 65535)
{
printf("\n%sInvalid port specified%s\n\n", COL_RED, RESET);
printf("\n%sInvalid target specified%s\n\n", COL_RED, RESET);
exit(1);
}
}
......