diff --git a/testssl.sh b/testssl.sh index d3e9076..9174392 100755 --- a/testssl.sh +++ b/testssl.sh @@ -3404,7 +3404,7 @@ run_server_defaults() { # http://www.heise.de/security/artikel/Forward-Secrecy-testen-und-einrichten-1932806.html run_pfs() { local -i sclient_success - local -i pfs_offered=1 + local pfs_offered=false local tmpfile local dhlen local hexcode dash pfs_cipher sslvers kx auth enc mac @@ -3436,12 +3436,12 @@ run_pfs() { pr_brownln "Not OK: No ciphers supporting Forward Secrecy offered" fileout "pfs" "NOT OK" "(Perfect) Forward Secrecy : Not OK: No ciphers supporting Forward Secrecy offered" else - pfs_offered=0 + pfs_offered=true pfs_ciphers="" pr_litegreen " PFS is offered (OK)" fileout "pfs" "OK" "(Perfect) Forward Secrecy : PFS is offered (OK)" if $WIDE; then - outln ", ciphers follow (client/browser support is here specially important) \n" + outln ", ciphers follow (client/browser support is important here) \n" neat_header else out " " @@ -3451,7 +3451,8 @@ run_pfs() { $OPENSSL s_client -cipher $pfs_cipher $STARTTLS $BUGS -connect $NODEIP:$PORT $PROXY $SNI &>$tmpfile