2
0
mirror of https://github.com/mozilla/cipherscan.git synced 2024-11-05 07:23:42 +01:00
cipherscan/README.md

43 lines
1.8 KiB
Markdown
Raw Normal View History

2013-07-17 20:49:22 +02:00
CipherScan
==========
A very simple way to find out which SSL ciphersuites are supported by a target.
2013-08-07 16:40:03 +02:00
Run: ./CipherScan.sh www.google.com:443
2013-07-17 20:49:22 +02:00
And watch.
2013-07-17 21:06:34 +02:00
The newer your version of openssl, the better results you'll get. Older versions
of OpenSSL don't support TLS1.2 ciphers, elliptic curves, etc... Build Your Own!
2013-08-07 16:40:03 +02:00
Options
-------
Enable benchmarking by setting DOBENCHMARK to 1 at the top of the script.
Use '-v' to get more stuff to read.
Use '-a' to force openssl to test every single cipher it know.
2013-07-17 21:12:20 +02:00
Example
-------
```
2013-11-20 16:33:58 +01:00
prio ciphersuite protocols pfs_keysize
1 ECDHE-RSA-AES128-GCM-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
2 ECDHE-RSA-RC4-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
3 ECDHE-RSA-AES128-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
4 AES128-GCM-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2
5 RC4-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
6 RC4-MD5 SSLv3,TLSv1,TLSv1.1,TLSv1.2
7 ECDHE-RSA-AES256-GCM-SHA384 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
8 ECDHE-RSA-AES256-SHA384 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
9 ECDHE-RSA-AES256-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
10 AES256-GCM-SHA384 SSLv3,TLSv1,TLSv1.1,TLSv1.2
11 AES256-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2
12 AES256-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
13 ECDHE-RSA-DES-CBC3-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
14 DES-CBC3-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
15 ECDHE-RSA-AES128-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
16 AES128-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2
17 AES128-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
2013-07-17 21:12:20 +02:00
```