From c70a13d014db6114fa2fc5b07d5cf381ad275c8a Mon Sep 17 00:00:00 2001 From: Dirk Date: Sat, 20 Feb 2016 21:46:17 +0100 Subject: [PATCH] - fix #296 (no recent regression as assumed) --- testssl.sh | 20 ++++++++++++-------- 1 file changed, 12 insertions(+), 8 deletions(-) diff --git a/testssl.sh b/testssl.sh index d3e9076..9174392 100755 --- a/testssl.sh +++ b/testssl.sh @@ -3404,7 +3404,7 @@ run_server_defaults() { # http://www.heise.de/security/artikel/Forward-Secrecy-testen-und-einrichten-1932806.html run_pfs() { local -i sclient_success - local -i pfs_offered=1 + local pfs_offered=false local tmpfile local dhlen local hexcode dash pfs_cipher sslvers kx auth enc mac @@ -3436,12 +3436,12 @@ run_pfs() { pr_brownln "Not OK: No ciphers supporting Forward Secrecy offered" fileout "pfs" "NOT OK" "(Perfect) Forward Secrecy : Not OK: No ciphers supporting Forward Secrecy offered" else - pfs_offered=0 + pfs_offered=true pfs_ciphers="" pr_litegreen " PFS is offered (OK)" fileout "pfs" "OK" "(Perfect) Forward Secrecy : PFS is offered (OK)" if $WIDE; then - outln ", ciphers follow (client/browser support is here specially important) \n" + outln ", ciphers follow (client/browser support is important here) \n" neat_header else out " " @@ -3451,7 +3451,8 @@ run_pfs() { $OPENSSL s_client -cipher $pfs_cipher $STARTTLS $BUGS -connect $NODEIP:$PORT $PROXY $SNI &>$tmpfile