On Tue, Mar 10, 2020 at 9:56 PM Kaushal Shriyan <kaushalshri...@gmail.com> wrote:
> Hi, > > I have run the below tests > > ./testssl.sh gsmasslciphers.digitalapicraft.com >> ########################################################### >> testssl.sh 3.1dev from https://testssl.sh/dev/ >> (e0c83b2 2020-02-24 14:21:28 -- ) >> This program is free software. Distribution and >> modification under GPLv2 permitted. >> USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! >> Please file bugs @ https://testssl.sh/bugs/ >> ########################################################### >> Using "OpenSSL 1.0.2-chacha (1.0.2k-dev)" [~183 ciphers] >> on Kaushals-MacBook-Pro:./bin/openssl.Darwin.x86_64 >> (built: "Feb 22 09:55:43 2019", platform: "darwin64-x86_64-cc") >> >> Start 2020-03-10 21:50:25 -->> 13.234.216.57:443 ( >> gsmasslciphers.digitalapicraft.com) <<-- >> rDNS (13.234.216.57): -- >> Service detected: HTTP >> >> Testing protocols via sockets except NPN+ALPN >> SSLv2 not offered (OK) >> SSLv3 not offered (OK) >> TLS 1 not offered >> TLS 1.1 not offered >> TLS 1.2 offered (OK) >> TLS 1.3 not offered and downgraded to a weaker protocol >> NPN/SPDY h2, http/1.1 (advertised) >> ALPN/HTTP2 h2, http/1.1 (offered) >> Testing cipher categories >> NULL ciphers (no encryption) not offered (OK) >> Anonymous NULL Ciphers (no authentication) not offered (OK) >> Export ciphers (w/o ADH+NULL) not offered (OK) >> LOW: 64 Bit + DES, RC[2,4] (w/o export) not offered (OK) >> Triple DES Ciphers / IDEA not offered >> Obsolete: SEED + 128+256 Bit CBC cipher not offered >> Strong encryption (AEAD ciphers) offered (OK) >> >> Testing robust (perfect) forward secrecy, (P)FS -- omitting Null >> Authentication/Encryption, 3DES, RC4 >> PFS is offered (OK) ECDHE-RSA-AES256-GCM-SHA384 >> ECDHE-RSA-AES128-GCM-SHA256 >> Elliptic curves offered: secp256k1 prime256v1 secp384r1 secp521r1 >> >> Testing server preferences >> Has server cipher order? no (NOT ok) >> Negotiated protocol TLSv1.2 >> Negotiated cipher ECDHE-RSA-AES128-GCM-SHA256, 521 bit ECDH >> (P-521) -- inconclusive test, matching cipher in list missing, better see >> below >> Negotiated cipher per proto (matching cipher in list missing) >> ECDHE-RSA-AES256-GCM-SHA384: TLSv1.2 >> No further cipher order check has been done as order is determined by >> the client >> >> Testing server defaults (Server Hello) >> TLS extensions (standard) "server name/#0" "renegotiation >> info/#65281" "EC point formats/#11" "session ticket/#35" "heartbeat/#15" >> "next protocol/#13172" "application layer protocol negotiation/#16" >> Session Ticket RFC 5077 hint 86400 seconds, session tickets keys seems >> to be rotated < daily >> SSL Session ID support yes >> Session Resumption Tickets: yes, ID: yes >> TLS clock skew Random values, no fingerprinting possible >> Signature Algorithm SHA256 with RSA >> Server key size RSA 2048 bits >> Server key usage Digital Signature, Key Encipherment >> Server extended key usage TLS Web Server Authentication, TLS Web >> Client Authentication >> Serial / Fingerprints 03C871BF68E569B4330E4AFCFA7752AAB5D7 / SHA1 >> 8874D965CB96F4A4B8B4CCAE149B6F1999399BF8 >> SHA256 >> BB56659442E2ED18778F7BB210823F3A81DA88F3AF79D0EE2104CE82DBB03C65 >> Common Name (CN) gsmasslciphers.digitalapicraft.com >> subjectAltName (SAN) gsmasslciphers.digitalapicraft.com >> Issuer Let's Encrypt Authority X3 (Let's Encrypt >> from US) >> Trust (hostname) Ok via SAN (same w/o SNI) >> Chain of trust Ok >> EV cert (experimental) no >> ETS/"eTLS", visibility info not present >> Certificate Validity (UTC) 89 >= 30 days (2020-03-10 09:40 --> >> 2020-06-08 09:40) >> # of certificates provided 2 >> Certificate Revocation List -- >> OCSP URI http://ocsp.int-x3.letsencrypt.org >> OCSP stapling not offered >> OCSP must staple extension -- >> DNS CAA RR (experimental) not offered >> Certificate Transparency yes (certificate extension) >> >> Testing HTTP header response @ "/" >> HTTP Status Code 200 OK >> HTTP clock skew 0 sec from localtime >> Strict Transport Security 730 days=63072000 s, just this domain >> Public Key Pinning -- >> Server banner nginx/1.16.1 >> Application banner -- >> Cookie(s) (none issued at "/") >> Security headers -- >> Reverse Proxy banner -- >> >> Testing vulnerabilities >> Heartbleed (CVE-2014-0160) not vulnerable (OK), timed out >> CCS (CVE-2014-0224) not vulnerable (OK) >> Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK) >> ROBOT Server does not support any >> cipher suites that use RSA key transport >> Secure Renegotiation (RFC 5746) supported (OK) >> Secure Client-Initiated Renegotiation not vulnerable (OK) >> CRIME, TLS (CVE-2012-4929) not vulnerable (OK) >> BREACH (CVE-2013-3587) no HTTP compression (OK) - >> only supplied "/" tested >> POODLE, SSL (CVE-2014-3566) not vulnerable (OK), no SSLv3 >> support >> TLS_FALLBACK_SCSV (RFC 7507) No fallback possible (OK), no >> protocol below TLS 1.2 offered >> SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK) >> FREAK (CVE-2015-0204) not vulnerable (OK) >> DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host >> and port (OK) >> make sure you don't use this >> certificate elsewhere with SSLv2 enabled services >> >> https://censys.io/ipv4?q=BB56659442E2ED18778F7BB210823F3A81DA88F3AF79D0EE2104CE82DBB03C65 >> could help you to find out >> LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH >> EXPORT ciphers, no DH key detected with <= TLS 1.2 >> BEAST (CVE-2011-3389) not vulnerable (OK), no SSL3 >> or TLS1 >> LUCKY13 (CVE-2013-0169), experimental not vulnerable (OK) >> RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK) >> >> Testing 370 ciphers via OpenSSL plus sockets against the server, ordered >> by encryption strength >> Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits >> Cipher Suite Name (IANA/RFC) >> >> ----------------------------------------------------------------------------------------------------------------------------- >> xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 521 AESGCM 256 >> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 >> xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 521 AESGCM 128 >> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 >> >> Running client simulations (HTTP) via sockets >> Android 4.4.2 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 >> bit ECDH (P-521) >> Android 5.0.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 521 >> bit ECDH (P-521) >> Android 6.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Android 7.0 TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Android 8.1 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Android 9.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Android 10.0 (native) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Chrome 74 (Win 10) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Chrome 79 (Win 10) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Firefox 66 (Win 8.1/10) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Firefox 71 (Win 10) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> IE 6 XP No connection >> IE 8 Win 7 No connection >> IE 8 XP No connection >> IE 11 Win 7 No connection >> IE 11 Win 8.1 No connection >> IE 11 Win Phone 8.1 No connection >> IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Edge 15 Win 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Edge 17 (Win 10) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Opera 66 (Win 10) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Safari 9 iOS 9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Safari 9 OS X 10.11 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Safari 12.1 (iOS 12.2) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Safari 13.0 (macOS 10.14.6) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Java 6u45 No connection >> Java 7u25 No connection >> Java 8u161 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Java 11.0.2 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Java 12.0.1 (OpenJDK) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> OpenSSL 1.1.0l (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> OpenSSL 1.1.1d (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 >> bit ECDH (P-256) >> Thunderbird (68.3) TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 >> bit ECDH (P-256) >> Done 2020-03-10 21:52:13 [0130s] -->> 13.234.216.57:443 ( >> gsmasslciphers.digitalapicraft.com) <<-- > > > > I am not sure about the below explanation as seen in the above output. > > Testing server preferences >> Has server cipher order? no (NOT ok) >> Negotiated protocol TLSv1.2 >> Negotiated cipher ECDHE-RSA-AES128-GCM-SHA256, 521 bit ECDH >> (P-521) -- inconclusive test, matching cipher in list missing, better see >> below >> Negotiated cipher per proto (matching cipher in list missing) >> ECDHE-RSA-AES256-GCM-SHA384: TLSv1.2 >> No further cipher order check has been done as order is determined by >> the client > > > I will appreciate if someone can help me understand it. Does it mean there > is some issue? Thanks in advance and I look forward to hearing from you. > > Best Regards, > > Kaushal > > Hi, Checking in again if someone can pitch in for my earlier post to this mailing list. Thanks in advance and I look forward to hearing from you. Best Regards, Kaushal