mirror of
https://github.com/mozilla/cipherscan.git
synced 2024-10-06 02:53:42 +02:00
43 lines
1.5 KiB
Markdown
43 lines
1.5 KiB
Markdown
CipherScan
|
|
==========
|
|
A very simple way to find out which SSL ciphersuites are supported by a target.
|
|
|
|
Run: ./CipherScan.sh www.google.com:443 -v
|
|
And watch.
|
|
|
|
Edit the script if you need more (disable benchmarking by setting DOBENCHMARK to 0).
|
|
|
|
The newer your version of openssl, the better results you'll get. Older versions
|
|
of OpenSSL don't support TLS1.2 ciphers, elliptic curves, etc... Build Your Own!
|
|
|
|
|
|
|
|
Example
|
|
-------
|
|
|
|
```
|
|
$ ./CiphersScan.sh www.google.com:443
|
|
|
|
|
|
Ciphersuites sorted by server preference
|
|
1 ) ECDHE-RSA-AES128-GCM-SHA256 avg_handshake= 502 ms
|
|
2 ) ECDHE-RSA-RC4-SHA avg_handshake= 482 ms
|
|
3 ) ECDHE-RSA-AES128-SHA avg_handshake= 462 ms
|
|
4 ) AES128-GCM-SHA256 avg_handshake= 495 ms
|
|
5 ) RC4-SHA avg_handshake= 495 ms
|
|
6 ) RC4-MD5 avg_handshake= 517 ms
|
|
7 ) ECDHE-RSA-AES256-GCM-SHA384 avg_handshake= 503 ms
|
|
8 ) ECDHE-RSA-AES256-SHA384 avg_handshake= 476 ms
|
|
9 ) ECDHE-RSA-AES256-SHA avg_handshake= 466 ms
|
|
10) AES256-GCM-SHA384 avg_handshake= 476 ms
|
|
11) AES256-SHA256 avg_handshake= 534 ms
|
|
12) AES256-SHA avg_handshake= 464 ms
|
|
13) ECDHE-RSA-DES-CBC3-SHA avg_handshake= 560 ms
|
|
14) DES-CBC3-SHA avg_handshake= 496 ms
|
|
15) ECDHE-RSA-AES128-SHA256 avg_handshake= 489 ms
|
|
16) AES128-SHA256 avg_handshake= 522 ms
|
|
17) AES128-SHA avg_handshake= 464 ms
|
|
|
|
Secure Renegotiation IS supported
|
|
```
|