Testing TLS/SSL encryption anywhere on any port. https://testssl.sh/
Go to file
Dirk eae1b2810f - check for CN wrt SNI / no SNI
- fix different responses for CACert
2014-12-23 09:59:03 +01:00
openssl-bins Update Readme.md 2014-11-24 16:43:11 +01:00
bash-heartbleed.changelog.txt - first try to commit here 2014-07-01 16:28:16 +02:00
bash-heartbleed.sh - increase first read buffer -- otherwise it's how up at hb reply and lead to false positives 2014-11-20 18:55:51 +01:00
ccs-injection.sh better documentation 2014-11-03 21:45:48 +01:00
CHANGELOG.txt 2014-07-16 19:06:26 +02:00
checkcert.sh - for clarification hint to license file 2014-10-07 11:15:05 +02:00
CREDITS.md @oparoz 2014-11-19 13:26:48 +01:00
LICENSE Initial commit 2014-07-01 13:55:26 +02:00
mapping-rfc.txt - stripping of leading 0 in testssl.sh needed to be reflected by this file 2014-11-18 11:04:57 +01:00
openssl-rfc.mappping.html TLS_FALLBACK_SCSV 2014-10-30 21:14:50 +01:00
Readme.md Update Readme.md 2014-12-19 15:52:05 +01:00
testssl.sh - check for CN wrt SNI / no SNI 2014-12-23 09:59:03 +01:00

Intro

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws. It's designed to provide clear output for a "is this good or bad" decision.

It is working on every Linux distribution out of the box with the limitations of disabled features from the openssl client. It also works on BSD and other Unices out of the box, supposed they have/bin/bash and standard tools like sed and awk installed. MacOS X and Windows (using MSYS2) work too.

On github you will find in the master branche development versions of the software -- with new features and maybe some bugs. For the stable version and a more thorough description of the software please see http://testssl.sh/ .

Contributions, feedback, also bug reports are welcome.