Testing TLS/SSL encryption anywhere on any port. https://testssl.sh/
Go to file
Jonas Schäfer 769837bdaf Force SNI to be the --xmpphost if passed
XMPP can be used with SNI in two contexts:

- Standard RFC 6120 STARTTLS-based connections; in that case, SNI
  is most likely to be ignored, as XMPP uses another way to signal
  the target domain name (via the @to attribute on the stream
  header, which is already set correctly by testssl.sh). However,
  setting SNI to a different value than the @to attribute may
  lead to confusion.

- XEP-0368 (XMPP-over-TLS) connections which omit the STARTTLS
  phase and go right for TLS (and inside that, XMPP). In that case,
  SNI is obviously required to be correct. XEP-0368 specifies that
  the SNI name MUST be the domain name of the service (not
  necessarily the host name of the endpoint, thanks to SRV
  records).

Hence, this patch forces the SNI name to be the --xmpphost value,
if --xmpphost is given. Note that it blatantly ignores whether
XMPP is used otherwise.
2020-10-15 21:54:38 +02:00
.github Update ISSUE_TEMPLATE.md 2020-03-03 21:18:09 +01:00
bin name is openssl.Linux.x86_64.krb now 2019-02-28 19:38:25 +01:00
doc Further robustness check to winshock (#1719) 2020-09-22 13:04:18 +02:00
etc Check for bad OCSP intermediate certificates 2020-07-15 11:56:20 -04:00
t Use test::diff so that errors are spotted better 2020-10-02 13:07:13 +02:00
utils remove jq and beautify last line 2020-02-15 12:09:33 +01:00
.gitignore add more filters 2020-02-24 14:21:28 +01:00
.travis.yml Change Travis/CI environment to bionic 2020-05-02 18:34:10 +02:00
CHANGELOG.md Merge pull request #1718 from drwetter/winshock 2020-09-08 22:11:36 +02:00
Coding_Convention.md Update documentation (ADDITIONAL_CA_FILES -> ADDTL_CA_FILES) 2020-04-23 11:20:46 +02:00
CONTRIBUTING.md More friendly phrased. Incl. soon to follow coding convention 2020-01-24 11:33:11 +01:00
CREDITS.md Updated changelog and credits 2020-09-08 15:34:30 +02:00
Dockerfile Better Dockerfile: doesn't require "git clone" 2020-05-09 13:17:02 +02:00
Dockerfile.md Housekeeping 2019-11-27 09:49:51 +01:00
LICENSE Initial commit 2014-07-01 13:55:26 +02:00
openssl-iana.mapping.html RFC --> IANA 2018-11-08 20:38:28 +01:00
Readme.md Add https://inspect.rapydblok.com 2020-08-13 20:58:15 +02:00
testssl.sh Force SNI to be the --xmpphost if passed 2020-10-15 21:54:38 +02:00

Intro

Travis CI Status Gitter License Docker

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.

Key features

  • Clear output: you can tell easily whether anything is good or bad.
  • Machine readable output (CSV, two JSON formats)
  • No need to install or to configure something. No gems, CPAN, pip or the like.
  • Works out of the box: Linux, OSX/Darwin, FreeBSD, NetBSD, MSYS2/Cygwin, WSL (bash on Windows). Only OpenBSD needs bash.
  • A Dockerfile is provided, there's also an offical container build @ dockerhub.
  • Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only web servers at port 443.
  • Toolbox: Several command line options help you to run your test and configure your output.
  • Reliability: features are tested thoroughly.
  • Privacy: It's only you who sees the result, not a third party.
  • Freedom: It's 100% open source. You can look at the code, see what's going on.
  • The development is open (github) and participation is welcome.

License

This software is free. You can use it under the terms of GPLv2, see LICENSE.

Attribution is important for the future of this project -- also in the internet. Thus if you're offering a scanner based on testssl.sh as a public and/or paid service in the internet you are strongly encouraged to mention to your audience that you're using this program and where to get this program from. That helps us to get bugfixes, other feedback and more contributions.

Compatibility

Testssl.sh is working on every Linux/BSD distribution out of the box. Latest by 2.9dev most of the limitations of disabled features from the openssl client are gone due to bash-socket-based checks. As a result you can also use e.g. LibreSSL or OpenSSL >= 1.1.1 . testssl.sh also works on other unixoid system out of the box, supposed they have /bin/bash >= version 3.2 and standard tools like sed and awk installed. An implicit (silent) check for binaries is done when you start testssl.sh . System V needs probably to have GNU grep installed. MacOS X and Windows (using MSYS2, Cygwin or WSL) work too.

Update notification here or @ twitter.

Installation

You can download testssl.sh branch 3.1dev just by cloning this git repository:

git clone --depth 1 https://github.com/drwetter/testssl.sh.git

Think of 3.1dev like a rolling release, see below. For the stable version help yourself by downloading the ZIP or tar.gz archive. Just cd to the directory created (=INSTALLDIR) and run it off there.

Docker

Testssl.sh has minimal requirements. As stated you don't have to install or build anything. You can just run it from the pulled/cloned directory. Still if you don't want to pull the github repo to your directory of choice you can pull a container from dockerhub and run it:

docker run --rm -ti  drwetter/testssl.sh:3.1dev <your_cmd_line>

Or if you have cloned this repo you also can just cd to the INSTALLDIR and run

docker build .

followed by docker run -ti <ID> <your_cmd_line> where ID is the identifier in the last line from the build command like

 ---> 889fa2f99933
Successfully built 889fa2f99933

Status

We're currently in the development phase, version 3.1dev. 3.1dev will eventually become 3.2. Bigger features are developed in a separate branch before merged into 3.1dev to avoid hiccups or inconsistencies. Albeit we try to keep 3.1dev as solid as possible things will certainly change in 3.1dev. So if you need stability the 3.0 branch is better for you. Think of the 3.1dev branch like a rolling release.

Support for 2.9.5 has been dropped. Supported is 3.0.x only.

Documentation

  • .. it is there for reading. Please do so :-) -- at least before asking questions. See man page in groff, html and markdown format in ~/doc/.
  • https://testssl.sh/ will help to get you started.
  • For the (older) version 2.8 will Hunt provides a longer, good description, including useful background info.

Contributing

Contributions are welcome! See CONTRIBUTING.md for details.

Bug reports

Bug reports are important. It makes this project more robust.

Please file bugs in the issue tracker @ github. Do not forget to provide detailed information, see template for issue, and further details @ https://github.com/drwetter/testssl.sh/wiki/Bug-reporting. Nobody can read your thoughts -- yet. And only agencies your screen ;-)

You can also debug yourself, see here.


External/related projects

Please address questions not specifically to the code of testssl.sh to the respective projects below.

Web frontend

Free to use Web frontend + commercial API

Mass scanner w parallel scans and elastic searching the results

Another ready-to-go docker image is at:

Privacy checker using testssl.sh

Nagios / Icinga Plugins

Brew package

Daemon for batch execution of testssl.sh command files

Daemon for batch processing of testssl.sh JSON result files for sending Slack alerts, reactive copying etc