Testing TLS/SSL encryption anywhere on any port. https://testssl.sh/
Go to file
Dirk Wetter fab42dd477 Backport HTTP 'Age' header field
See #2032 / #2067, kudos @Wahnes. This is a backport for 3.0

    Currently, when "HTTP clock skew" is calculated, this is taken to be the
    difference between the timestamp of the moment the HTTPS request was sent and
    the date given in the HTTP Date header. This does not yield valid results in
    case a HTTP cache is used, either on the client side or on the server side.
    According to the HTTP specs, the Date field will contain the timestamp the
    response was created, which may not be the timestamp the response was
    delivered.

    Consider the following example that queries the Varnish project's web server.
    Note that Varnish is a popular HTTP caching server, so HTTP caching will of
    course be used when serving HTTP responses from this project's web server.
    testssl.sh https://varnish-cache.org/ This will typically output a HTTP clock
    skew of some thousand seconds.

    The patch takes into account the HTTP Age header that caching servers add to
    the HTTP response to signal the response's freshness. As client-side caches
    normally do not cache HTTPS requests (except maybe for "enterprise" HTTP proxy
    caches that do MITM HTTPS proxying), this is mostly targeted to HTTPS websites
    that employ server side HTTP caching.

    Addtional polishing:

    * address my comments in #2032
    * add JSON field HTTP_headerAge if they exists
    * output HTTP_AGE if it was detected
    * do stripping of line feeds closer to where variables were set
2021-12-10 15:27:43 +01:00
.github Update ISSUE_TEMPLATE.md 2021-10-21 10:53:36 +02:00
bin name is openssl.Linux.x86_64.krb now 2019-02-28 19:38:25 +01:00
doc Typos found by codespell 2021-09-14 14:10:33 +02:00
etc Remove the expired DST Root CA X3 cert from all trust stores, and ensure Mozilla's is up to date (fixes ISRG X1 alternate path) 2021-10-02 08:24:46 +10:00
t Fix GHA (starttls nntp) 2021-09-09 23:21:08 +02:00
utils Typos found by codespell 2021-09-14 14:10:33 +02:00
.gitignore update 2016-11-07 21:05:21 +01:00
CHANGELOG.md Typos found by codespell 2021-09-14 14:10:33 +02:00
CONTRIBUTING.md Add CONTRIBUTING.md, docker changes in Readme.md 2019-08-08 18:34:14 +02:00
CREDITS.md last walk through the changelog 2020-01-20 12:50:31 +01:00
Dockerfile Upgrade to alpine 3.12 2021-07-30 17:23:51 +02:00
Dockerfile.git Add missing file 2021-08-09 11:45:33 +00:00
Dockerfile.md Update description 2021-07-30 17:33:08 +02:00
LICENSE Initial commit 2014-07-01 13:55:26 +02:00
openssl-iana.mapping.html whitespace alignment 2021-03-25 16:24:52 -04:00
Readme.md Fix typo / spelling error 2021-10-02 22:31:14 +02:00
testssl.sh Backport HTTP 'Age' header field 2021-12-10 15:27:43 +01:00

Intro

Build Status Gitter

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.

Key features

  • Clear output: you can tell easily whether anything is good or bad.
  • Machine readable output.
  • No installation needed: Linux, OSX/Darwin, FreeBSD, NetBSD, MSYS2/Cygwin, WSL work out of the box. Only OpenBSD needs bash. No need to install or to configure something. No gems, CPAN, pip or the like.
  • A Dockerfile is provided, there's also an official container @ dockerhub.
  • Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only web servers at port 443.
  • Toolbox: Several command line options help you to run your test and configure your output.
  • Reliability: features are tested thoroughly.
  • Privacy: It's only you who sees the result, not a third party.
  • Freedom: It's 100% open source. You can look at the code, see what's going on.
  • The development is open (github) and participation is welcome.

License

This software is free. You can use it under the terms of GPLv2, see LICENSE.

Attribution is important for the future of this project -- also in the internet. Thus if you're offering a scanner based on testssl.sh as a public and/or paid service in the internet you are strongly encouraged to mention to your audience that you're using this program and where to get this program from. That helps us to get bugfixes, other feedback and more contributions.

Compatibility

testssl.sh is working on every Linux/BSD distribution out of the box. Latest by 2.9dev most of the limitations of disabled features from the openssl client are gone due to bash-socket-based checks. As a result you can also use e.g. LibreSSL or OpenSSL 1.1.1 . testssl.sh also works on other unixoid systems out of the box, supposed they have /bin/bash >= version 3.2 and standard tools like sed and awk installed. An implicit (silent) check for binaries is done when you start testssl.sh . System V needs probably to have GNU grep installed. MacOS X and Windows (using MSYS2, Cygwin or WSL) work too.

Update notification here or @ twitter.

Installation

You can download testssl.sh by cloning this git repository:

git clone --depth 1 https://github.com/drwetter/testssl.sh.git --branch 3.0

For the stable version help yourself by downloading the ZIP or the latest testssl-3.0.X.tar.gz from https://testssl.sh archive. Just cd to the directory created (=INSTALLDIR) and run it off there.

Docker

Testssl.sh has minimal requirements. As stated you don't have to install or build anything. You can just run it from the pulled/cloned directory. Still if you don't want to pull the github repo to your directory of choice you can pull a container from dockerhub and run it:

docker run --rm -ti drwetter/testssl.sh:3.0 <your_cmd_line>

Or if you have cloned this repo you also can just cd to the INSTALLDIR (change to 3.0, do a git pull) and run

docker build . -t drfooimage && docker run --rm -t drfooimage example.com

For more please consult Dockerfile.md.

Status

This is the stable 3.0 version. That means you can and should use it for production and let us know if you encounter any additional bugs. Features implemented in 3.0 are listed in the Changelog. Support for 2.9.5 has been dropped.

The version 3.0 receives bugfixes, labeled as 3.0.1, 3.0.2 and so on. This will happen until 3.2 is released. Development is taking place in the 3.1dev branch which will eventually lead to version 3.2. We try to keep 3.1dev as solid as possible but things will certainly change in 3.1dev. Think of the 3.1dev branch like a rolling release.

Documentation

  • .. it is there for reading. Please do so :-) -- at least before asking questions. See man page in groff, html and markdown format in ~/doc/.
  • https://testssl.sh/ will help to get you started.
  • Albeit a bit older Will Hunt provides a longer, good description for the (older) version 2.8, including useful background info.

Contributing

Contributions are welcome! See CONTRIBUTING.md for details.

Bug reports

Bug reports are important. It makes this project more robust.

Please file bugs in the issue tracker @ github. Do not forget to provide detailed information, see template for issue, and further details @ https://github.com/drwetter/testssl.sh/wiki/Bug-reporting. Nobody can read your thoughts -- yet. And only agencies your screen ;-)

You can also debug yourself, see here.


External/related projects

Please address questions not specifically to the code of testssl.sh to the respective projects below.

Cool web frontend

Mass scanner w parallel scans and elastic searching the results

Another ready-to-go docker image is at:

Privacy checker using testssl.sh

Brew package

Daemon for batch execution of testssl.sh command files

Daemon for batch processing of testssl.sh JSON result files for sending Slack alerts, reactive copying etc