Update Readme.md

This commit is contained in:
Dirk Wetter 2016-10-28 22:07:53 +02:00 committed by GitHub
parent b540d362b9
commit 4c8369eabb

View File

@ -26,14 +26,16 @@ cryptographic flaws.
going on and you can change it.
* Heck, even the development is open (github)
#### General
#### Status
Here in the master branch you find the development version of the software
Here in the 2.9dev branch you find the development version of the software
-- with new features and maybe some bugs. For the stable version and **a
more thorough description of the command line options** please see
more thorough description of the command line options** please see the master branch or
[testssl.sh](https://testssl.sh/ "Go to the site with the stable version
and more documentation").
#### General
testssl.sh is working on every Linux/BSD distribution out of the box with
some limitations of disabled features from the openssl client -- some
workarounds are done with bash-socket-based checks. It also works on other
@ -45,30 +47,17 @@ exchanges.
#### Current Development
Planned features in the release 2.7dev/2.8 are:
Planned features in the release 2.9dev are:
https://github.com/drwetter/testssl.sh/milestone/4
https://github.com/drwetter/testssl.sh/milestones/2.7dev%20%282.8%29
Done so far:
* Trust chain check against certificate stores from Apple (OS), Linux (OS),
Microsoft (OS), Mozilla (Firefox Browser), works for openssl >=1.0.1
* IPv6 (status: 80% working, details see
https://github.com/drwetter/testssl.sh/issues/11
* works on servers requiring a x509 certificate for authentication
* SSL Session ID check
* Avahi/mDNS based name resolution
* HTTP2/ALPN protocol check
* Logging to a file / dir
* Logging to JSON + CSV
* Check for multiple server certificates
* Browser cipher simulation
* Assistance for color-blind users
* Even more compatibility improvements for FreeBSD, NetBSD, Gentoo, RH-ish, F5 and Cisco systems
* Considerable speed improvements for each cipher runs (-e/-E)
* More robust socket interface
* OpenSSL 1.1.0 compliant
* Whole number of bugs squashed
* TLS 1.2 is now done via sickets too
* more sockets optimizations
* timeout -- if available -- will cut off connect calls at a defined time
* -n / --nodns switch avoid (reserve) DNS lookups
Update notification here or @ [twitter](https://twitter.com/drwetter).