Testing TLS/SSL encryption anywhere on any port. https://testssl.sh/
Go to file
Dirk b9bfd48871 - client based auth (see sclient_connect_successful() works now, see #206)
- careful regression tests for this, point open: speed
- test for more TLS extensions
- heartbleed() does now before a check whether heartbeat is available to save time
- breach simplyfied (and doesn't have to be killed in seldom cases)
- tmpfiles are only being erased after exit not after each function
- user agent is testssl -- unless --sneaky is chosen
- global host vars are now being resetted to prevent side effects
- tls version in record layer is now always 1
- used ERRFILE wherever possible
- smaller code cleanups
2015-10-11 23:07:16 +02:00
bin Update Readme.md 2015-10-05 09:22:02 +02:00
etc - NEW: chain of trust -- for openssl 1.0.2 only 2015-09-22 15:05:59 +02:00
utils - cleanup bin mess ;-), part 1 2015-09-03 12:39:03 +02:00
CHANGELOG.stable-releases.txt Rename old.CHANGELOG.txt to CHANGELOG.stable-releases.txt 2015-09-03 15:15:36 +02:00
CREDITS.md Update CREDITS.md 2015-10-01 13:19:15 +02:00
LICENSE Initial commit 2014-07-01 13:55:26 +02:00
mapping-rfc.txt - stripping of leading 0 in testssl.sh needed to be reflected by this file 2014-11-18 11:04:57 +01:00
openssl-rfc.mappping.html yet another GOST fine tuning thing 2015-07-20 20:49:31 +02:00
Readme.md Update Readme.md 2015-10-11 11:47:10 +02:00
testssl.sh - client based auth (see sclient_connect_successful() works now, see #206) 2015-10-11 23:07:16 +02:00

Intro

Gitter

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws. It's designed to provide clear output in any case.

It is working on every Linux distribution out of the box with some limitations of disabled features from the openssl client -- some workarounds are done with bash-socket-based checks. It also works on BSD and other Unices out of the box, supposed they have /bin/bash and standard tools like sed and awk installed. MacOS X and Windows (using MSYS2 or cygwin) work too. OpenSSL version >= 1 is a must. OpenSSL version >= 1.0.2 is needed for better LOGJAM checks and to display bit strengths for key exchanges.

On github you will find in the master branch the development version of the software -- with new features and maybe some bugs. For the stable version and a more thorough description of the software please see testssl.sh.

Planned features in the release 2.7dev/2.8 are:

https://github.com/drwetter/testssl.sh/milestones/2.7dev%20%282.8%29

Done so far:

  • Trust chain check against certificate stores from java, linux (system), microsoft, mozilla (works for openssl >=1.0.2)
  • IPv6 (status: 80% working, details see https://github.com/drwetter/testssl.sh/issues/11
  • Even more compatibilty improvements for FreeBSD and RH-ish systems

Contributions, feedback, also bug reports are welcome! For contributions please note: One patch per feature -- bug fix/improvement. Please test your changes thouroughly as reliability is important for this project.

Please file bug reports @ https://github.com/drwetter/testssl.sh/issues .

Update notification here or @ twitter.


External contributions

Please address questions not specifically to the code of testssl.sh to the respective projects

Docker

Docker images are available at: