1. <nobr id="easjo"><address id="easjo"></address></nobr>

      <track id="easjo"><source id="easjo"></source></track>
      1. 
        

      2. <bdo id="easjo"><optgroup id="easjo"></optgroup></bdo>
      3. <track id="easjo"><source id="easjo"><em id="easjo"></em></source></track><option id="easjo"><span id="easjo"><em id="easjo"></em></span></option>
          貴州做網站公司
          貴州做網站公司~專業!靠譜!
          10年網站模板開發經驗,熟悉國內外開源網站程序,包括DEDECMS,WordPress,ZBlog,Discuz! 等網站程序,可為您提供網站建設,網站克隆,仿站,網頁設計,網站制作,網站推廣優化等服務。我們專注高端營銷型網站,企業官網,集團官網,自適應網站,手機網站,網絡營銷,網站優化,網站服務器環境搭建以及托管運維等。為客戶提供一站式網站解決方案?。?!

          SSL-TLS加密檢測腳本testssl.sh

          來源:互聯網轉載 時間:2024-01-29 08:28:16

          以前SSL檢測常用工具就是ssllabs的:https://www.ssllabs.com/ssltest/?以及國內的https://myssl.com/.

          檢測方法很簡單,輸入在線檢測即可。

          今天在網上有發現一款好用的SSL檢測腳本:testssl.sh:https://testssl.sh/

          檢測方法就是下載源碼,運行:

          git clone --depth 1 https://github.com/drwetter/testssl.sh.git

          1

          git clone --depth 1 https://github.com/drwetter/testssl.sh.git

          然后進入目錄:

          運行:幫助shuom

          testssl.sh --help

          1

          testssl.sh --help

          運行檢測:

          ./testssl.sh yourdomain.com

          1

          ./testssl.sh yourdomain.com

          檢測結果類型如下:

          ########################################################### testssl.sh 3.0beta from https://testssl.sh/dev/ (470f8b6 2018-04-28 22:38:53 -- ) This program is free software. Distribution and modification under GPLv2 permitted. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! Please file bugs @ https://testssl.sh/bugs/########################################################### Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers] on VM_122_230_centos:./bin/openssl.Linux.x86_64 (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64") Start 2018-04-29 23:25:20 -->> 119.28.6.33:443 (zach.xin) <<-- rDNS (119.28.6.33): -- Service detected: HTTP Testing protocols via sockets except NPN+ALPN  SSLv2??????not offered (OK) SSLv3??????not offered (OK) TLS 1 offered TLS 1.1 offered TLS 1.2 offered (OK) TLS 1.3 not offered NPN/SPDY?? h2, http/1.1 (advertised) ALPN/HTTP2 h2, http/1.1 (offered) Testing cipher categories  NULL ciphers (no encryption) not offered (OK) Anonymous NULL Ciphers (no authentication) not offered (OK) Export ciphers (w/o ADH+NULL) not offered (OK) LOW: 64 Bit + DES encryption (w/o export) not offered (OK) Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK) Triple DES Ciphers (Medium) not offered (OK) High encryption (AES+Camellia, no AEAD) offered (OK) Strong encryption (AEAD ciphers) offered (OK) Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4  PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-CHACHA20-POLY1305 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA  Elliptic curves offered: prime256v1 secp384r1 secp521r1 X25519  Testing server preferences  Has server cipher order? yes (OK) Negotiated protocol??????????TLSv1.2 Negotiated cipher????????????ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Cipher order TLSv1: ECDHE-RSA-AES128-SHA AES128-SHA ECDHE-RSA-AES256-SHA AES256-SHA  TLSv1.1: ECDHE-RSA-AES128-SHA AES128-SHA ECDHE-RSA-AES256-SHA AES256-SHA  TLSv1.2: ECDHE-RSA-CHACHA20-POLY1305 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA AES128-GCM-SHA256 AES128-CCM8 AES128-CCM AES128-SHA256 AES128-SHA ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA AES256-GCM-SHA384 AES256-CCM8 AES256-CCM AES256-SHA256 AES256-SHA  Testing server defaults (Server Hello)  TLS extensions (standard) "renegotiation info/#65281" "EC point formats/#11" "session ticket/#35" "status request/#5" "next protocol/#13172" "max fragment length/#1" "application layer protocol negotiation/#16" "encrypt-then-mac/#22" "extended master secret/#23" Session Ticket RFC 5077 hint 600 seconds, session tickets keys seems to be rotated < daily SSL Session ID support?????? yes Session Resumption?????????? Tickets: yes, ID: yes TLS clock skew?????????????? Random values, no fingerprinting possible  Signature Algorithm??????????SHA256 with RSA Server key size??????????????RSA 2048 bits Server key usage???????????? Digital Signature, Key Encipherment Server extended key usage????TLS Web Server Authentication, TLS Web Client Authentication Serial / Fingerprints 049CA937F746C261709C994D3484D78B958A / SHA1 C654AA97C778B10F79B05E12F679146255984AC8 SHA256 F1137B78E829E1AEC2F238F931835A0090DBCF01C6F57B48F5CF16C2295B0EB4 Common Name (CN) zach.xin subjectAltName (SAN) www.zach.xin zach.xin  Issuer?????????????????????? Let's Encrypt Authority X3 (Let's Encrypt from US) Trust (hostname) Ok via SAN and CN (same w/o SNI) Chain of trust?????????????? Ok??  EV cert (experimental) no  Certificate Validity (UTC) 78 >= 30 days (2018-04-18 19:06 --> 2018-07-17 19:06) # of certificates provided?? 2 Certificate Revocation List -- OCSP URI???????????????????? http://ocsp.int-x3.letsencrypt.org OCSP stapling????????????????offered OCSP must staple extension -- DNS CAA RR (experimental) not offered Certificate Transparency???? yes (certificate extension) Testing HTTP header response @ "/"  HTTP Status Code 403 Forbidden HTTP clock skew 0 sec from localtime Strict Transport Security????not offered Public Key Pinning -- Server banner????????????????nginx Application banner -- Cookie(s) (none issued at "/") -- maybe better try target URL of 30x Security headers -- Reverse Proxy banner -- Testing vulnerabilities  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension CCS (CVE-2014-0224) not vulnerable (OK) Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK) ROBOT???????????????????????????????????? not vulnerable (OK) Secure Renegotiation (CVE-2009-3555) not vulnerable (OK) Secure Client-Initiated Renegotiation???? not vulnerable (OK) CRIME, TLS (CVE-2012-4929) not vulnerable (OK) BREACH (CVE-2013-3587) no HTTP compression (OK) - only supplied "/" tested POODLE, SSL (CVE-2014-3566) not vulnerable (OK) TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK) SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK) FREAK (CVE-2015-0204) not vulnerable (OK) DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK) make sure you don't use this certificate elsewhere with SSLv2 enabled services https://censys.io/ipv4?q=F1137B78E829E1AEC2F238F931835A0090DBCF01C6F57B48F5CF16C2295B0EB4 could help you to find out LOGJAM (CVE-2015-4000), experimental??????not vulnerable (OK): no DH EXPORT ciphers, no DH key detected BEAST (CVE-2011-3389) TLS1: ECDHE-RSA-AES128-SHA AES128-SHA ECDHE-RSA-AES256-SHA AES256-SHA  VULNERABLE -- but also supports higher protocols??TLSv1.1 TLSv1.2 (likely mitigated) LUCKY13 (CVE-2013-0169), experimental???? potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS. Check patches RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK) Testing 364 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode??Cipher Suite Name (OpenSSL) KeyExch. Encryption??Bits???? Cipher Suite Name (RFC)----------------------------------------------------------------------------------------------------------------------------- xc030?? ECDHE-RSA-AES256-GCM-SHA384?????? ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384?????????????? xc028?? ECDHE-RSA-AES256-SHA384?????????? ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384?????????????? xc014?? ECDHE-RSA-AES256-SHA??????????????ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA????????????????  xcca8?? ECDHE-RSA-CHACHA20-POLY1305?????? ECDH 253 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256???????? x9d???? AES256-GCM-SHA384???????????????? RSA????????AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384???????????????????? xc0a1?? AES256-CCM8?????????????????????? RSA????????AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8????????????????????????  xc09d?? AES256-CCM????????????????????????RSA????????AESCCM 256 TLS_RSA_WITH_AES_256_CCM??????????????????????????  x3d???? AES256-SHA256???????????????????? RSA????????AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256???????????????????? x35???? AES256-SHA????????????????????????RSA????????AES 256 TLS_RSA_WITH_AES_256_CBC_SHA??????????????????????  xc02f?? ECDHE-RSA-AES128-GCM-SHA256?????? ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256?????????????? xc027?? ECDHE-RSA-AES128-SHA256?????????? ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256?????????????? xc013?? ECDHE-RSA-AES128-SHA??????????????ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA????????????????  xc0a0?? AES128-CCM8?????????????????????? RSA????????AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8????????????????????????  xc09c?? AES128-CCM????????????????????????RSA????????AESCCM 128 TLS_RSA_WITH_AES_128_CCM??????????????????????????  x9c???? AES128-GCM-SHA256???????????????? RSA????????AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256???????????????????? x3c???? AES128-SHA256???????????????????? RSA????????AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256???????????????????? x2f???? AES128-SHA????????????????????????RSA????????AES 128 TLS_RSA_WITH_AES_128_CBC_SHA??????????????????????  Running client simulations via sockets  Android 4.2.2 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) Android 4.4.2 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Android 6.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Android 7.0 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 253 bit ECDH (X25519) Chrome 57 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 253 bit ECDH (X25519) Chrome 65 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 253 bit ECDH (X25519) Firefox 53 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 253 bit ECDH (X25519) Firefox 59 Win 7 TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 253 bit ECDH (X25519) IE 6 XP??????????????????????No connection IE 7 Vista?????????????????? TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) IE 8 XP??????????????????????No connection IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256) IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256) IE 11 Win Phone 8.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256) IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Edge 15 Win 10 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 253 bit ECDH (X25519) Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 256 bit ECDH (P-256) Safari 9 iOS 9 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Safari 9 OS X 10.11 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Tor 17.0.9 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) Java 6u45 TLSv1.0 AES128-SHA Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256) Java 8u161 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Java 9.0.4 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256) Done 2018-04-29 23:27:55 [ 158s] -->> 119.28.6.33:443 (zach.xin) <<--

          原創文章轉載請注明

          標簽:SSL檢測-

          網絡推廣與網站優化公司(網絡優化與推廣專家)作為數字營銷領域的核心服務提供方,其價值在于通過技術手段與策略規劃幫助企業提升線上曝光度、用戶轉化率及品牌影響力。這...

          在當今數字化時代,公司網站已成為企業展示形象、傳遞信息和開展業務的重要平臺。然而,對于許多公司來說,網站建設的價格是一個關鍵考量因素。本文將圍繞“公司網站建設價...

          在當今的數字化時代,企業網站已成為企業展示形象、吸引客戶和開展業務的重要平臺。然而,對于許多中小企業來說,高昂的網站建設費用可能會成為其發展的瓶頸。幸運的是,隨...

          汽車的dynamic模式是什么意思?奧迪的動態模式意味著汽車處于動態轉向模式。奧迪RS 6首次采用DRC動態平順性控制的創新懸掛理念。它包括一個沒有電子控制的特殊減震系統,以避免車身側翻。當轉向或彎道時,阻尼系統可以大大抵消汽車繞縱軸(橫滾)的振動。在加速或制動時,動態行駛控制(DRC–動態行駛控制)還可以防止車輛繞橫軸振動。dynamic是什么意思?表示動態或移動模式。動態(動態或運動)模式相當...

          怎么樣把群聊歸類在一組?群聊咋分組管理1是需要我們打開主頁點擊先打開通訊錄。在頂端你會看見了標簽這個。2然后點擊標簽,右上角有一個空白文檔功能。直接點擊新建項功能3先打開剛建功能之后會再次出現你的好友列表。4在看見了好友列表之后,你會見到每個好友后面會有一個是可以復選框的正方形格子。5可以找到你必須分組的好友,在后面正方形格子里面打勾。對勾完成后,在右上角會再次出現一個可以確定,點擊確認之后在橫線...

          石家莊新百廣場是什么區?是橋西區。石家莊新百廣場在橋西區。地址:河北省石家莊市中山西路139號(近中華街)。穿過新百廣場(東)(西三室內繪畫館)的線路:1號、1號、6號、11號、30號、34號、61號、68號、108號、118號、317號、326號、368號..途經新百廣場(西)的線路:1路、快車1路、游客1路、游客5路、6路、11路、30路、34路、61路、93路、快車107路、192路、317...

          TOP
          国产初高中生视频在线观看|亚洲一区中文|久久亚洲欧美国产精品|黄色网站入口免费进人
          1. <nobr id="easjo"><address id="easjo"></address></nobr>

              <track id="easjo"><source id="easjo"></source></track>
              1. 
                

              2. <bdo id="easjo"><optgroup id="easjo"></optgroup></bdo>
              3. <track id="easjo"><source id="easjo"><em id="easjo"></em></source></track><option id="easjo"><span id="easjo"><em id="easjo"></em></span></option>