Hi,

I have run the below tests

./testssl.sh gsmasslciphers.digitalapicraft.com
> ###########################################################
>     testssl.sh       3.1dev from https://testssl.sh/dev/
>     (e0c83b2 2020-02-24 14:21:28 -- )
>       This program is free software. Distribution and
>              modification under GPLv2 permitted.
>       USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
>        Please file bugs @ https://testssl.sh/bugs/
> ###########################################################
>  Using "OpenSSL 1.0.2-chacha (1.0.2k-dev)" [~183 ciphers]
>  on Kaushals-MacBook-Pro:./bin/openssl.Darwin.x86_64
>  (built: "Feb 22 09:55:43 2019", platform: "darwin64-x86_64-cc")
>
>  Start 2020-03-10 21:50:25        -->> 13.234.216.57:443 (
> gsmasslciphers.digitalapicraft.com) <<--
>  rDNS (13.234.216.57):   --
>  Service detected:       HTTP
>
>  Testing protocols via sockets except NPN+ALPN
>  SSLv2      not offered (OK)
>  SSLv3      not offered (OK)
>  TLS 1      not offered
>  TLS 1.1    not offered
>  TLS 1.2    offered (OK)
>  TLS 1.3    not offered and downgraded to a weaker protocol
>  NPN/SPDY   h2, http/1.1 (advertised)
>  ALPN/HTTP2 h2, http/1.1 (offered)
>  Testing cipher categories
>  NULL ciphers (no encryption)                  not offered (OK)
>  Anonymous NULL Ciphers (no authentication)    not offered (OK)
>  Export ciphers (w/o ADH+NULL)                 not offered (OK)
>  LOW: 64 Bit + DES, RC[2,4] (w/o export)       not offered (OK)
>  Triple DES Ciphers / IDEA                     not offered
>  Obsolete: SEED + 128+256 Bit CBC cipher       not offered
>  Strong encryption (AEAD ciphers)              offered (OK)
>
>  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null
> Authentication/Encryption, 3DES, RC4
>  PFS is offered (OK)          ECDHE-RSA-AES256-GCM-SHA384
> ECDHE-RSA-AES128-GCM-SHA256
>  Elliptic curves offered:     secp256k1 prime256v1 secp384r1 secp521r1
>
>  Testing server preferences
>  Has server cipher order?     no (NOT ok)
>  Negotiated protocol          TLSv1.2
>  Negotiated cipher            ECDHE-RSA-AES128-GCM-SHA256, 521 bit ECDH
> (P-521) -- inconclusive test, matching cipher in list missing, better see
> below
>  Negotiated cipher per proto  (matching cipher in list missing)
>      ECDHE-RSA-AES256-GCM-SHA384:   TLSv1.2
>  No further cipher order check has been done as order is determined by the
> client
>
>  Testing server defaults (Server Hello)
>  TLS extensions (standard)    "server name/#0" "renegotiation info/#65281"
> "EC point formats/#11" "session ticket/#35" "heartbeat/#15" "next
> protocol/#13172" "application layer protocol negotiation/#16"
>  Session Ticket RFC 5077 hint 86400 seconds, session tickets keys seems to
> be rotated < daily
>  SSL Session ID support       yes
>  Session Resumption           Tickets: yes, ID: yes
>  TLS clock skew               Random values, no fingerprinting possible
>  Signature Algorithm          SHA256 with RSA
>  Server key size              RSA 2048 bits
>  Server key usage             Digital Signature, Key Encipherment
>  Server extended key usage    TLS Web Server Authentication, TLS Web
> Client Authentication
>  Serial / Fingerprints        03C871BF68E569B4330E4AFCFA7752AAB5D7 / SHA1
> 8874D965CB96F4A4B8B4CCAE149B6F1999399BF8
>                               SHA256
> BB56659442E2ED18778F7BB210823F3A81DA88F3AF79D0EE2104CE82DBB03C65
>  Common Name (CN)             gsmasslciphers.digitalapicraft.com
>  subjectAltName (SAN)         gsmasslciphers.digitalapicraft.com
>  Issuer                       Let's Encrypt Authority X3 (Let's Encrypt
> from US)
>  Trust (hostname)             Ok via SAN (same w/o SNI)
>  Chain of trust               Ok
>  EV cert (experimental)       no
>  ETS/"eTLS", visibility info  not present
>  Certificate Validity (UTC)   89 >= 30 days (2020-03-10 09:40 -->
> 2020-06-08 09:40)
>  # of certificates provided   2
>  Certificate Revocation List  --
>  OCSP URI                     http://ocsp.int-x3.letsencrypt.org
>  OCSP stapling                not offered
>  OCSP must staple extension   --
>  DNS CAA RR (experimental)    not offered
>  Certificate Transparency     yes (certificate extension)
>
>  Testing HTTP header response @ "/"
>  HTTP Status Code             200 OK
>  HTTP clock skew              0 sec from localtime
>  Strict Transport Security    730 days=63072000 s, just this domain
>  Public Key Pinning           --
>  Server banner                nginx/1.16.1
>  Application banner           --
>  Cookie(s)                    (none issued at "/")
>  Security headers             --
>  Reverse Proxy banner         --
>
>  Testing vulnerabilities
>  Heartbleed (CVE-2014-0160)                not vulnerable (OK), timed out
>  CCS (CVE-2014-0224)                       not vulnerable (OK)
>  Ticketbleed (CVE-2016-9244), experiment.  not vulnerable (OK)
>  ROBOT                                     Server does not support any
> cipher suites that use RSA key transport
>  Secure Renegotiation (RFC 5746)           supported (OK)
>  Secure Client-Initiated Renegotiation     not vulnerable (OK)
>  CRIME, TLS (CVE-2012-4929)                not vulnerable (OK)
>  BREACH (CVE-2013-3587)                    no HTTP compression (OK)  -
> only supplied "/" tested
>  POODLE, SSL (CVE-2014-3566)               not vulnerable (OK), no SSLv3
> support
>  TLS_FALLBACK_SCSV (RFC 7507)              No fallback possible (OK), no
> protocol below TLS 1.2 offered
>  SWEET32 (CVE-2016-2183, CVE-2016-6329)    not vulnerable (OK)
>  FREAK (CVE-2015-0204)                     not vulnerable (OK)
>  DROWN (CVE-2016-0800, CVE-2016-0703)      not vulnerable on this host and
> port (OK)
>                                            make sure you don't use this
> certificate elsewhere with SSLv2 enabled services
>
> https://censys.io/ipv4?q=BB56659442E2ED18778F7BB210823F3A81DA88F3AF79D0EE2104CE82DBB03C65
> could help you to find out
>  LOGJAM (CVE-2015-4000), experimental      not vulnerable (OK): no DH
> EXPORT ciphers, no DH key detected with <= TLS 1.2
>  BEAST (CVE-2011-3389)                     not vulnerable (OK), no SSL3 or
> TLS1
>  LUCKY13 (CVE-2013-0169), experimental     not vulnerable (OK)
>  RC4 (CVE-2013-2566, CVE-2015-2808)        no RC4 ciphers detected (OK)
>
>  Testing 370 ciphers via OpenSSL plus sockets against the server, ordered
> by encryption strength
> Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits
> Cipher Suite Name (IANA/RFC)
>
> -----------------------------------------------------------------------------------------------------------------------------
>  xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 521   AESGCM      256
>  TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
>  xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 521   AESGCM      128
>  TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
>
>  Running client simulations (HTTP) via sockets
>  Android 4.4.2                TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 521 bit
> ECDH (P-521)
>  Android 5.0.0                TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 521 bit
> ECDH (P-521)
>  Android 6.0                  TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Android 7.0                  TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Android 8.1 (native)         TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Android 9.0 (native)         TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Android 10.0 (native)        TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Chrome 74 (Win 10)           TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Chrome 79 (Win 10)           TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Firefox 66 (Win 8.1/10)      TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Firefox 71 (Win 10)          TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  IE 6 XP                      No connection
>  IE 8 Win 7                   No connection
>  IE 8 XP                      No connection
>  IE 11 Win 7                  No connection
>  IE 11 Win 8.1                No connection
>  IE 11 Win Phone 8.1          No connection
>  IE 11 Win 10                 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Edge 15 Win 10               TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Edge 17 (Win 10)             TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Opera 66 (Win 10)            TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Safari 9 iOS 9               TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Safari 9 OS X 10.11          TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Safari 10 OS X 10.12         TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Safari 12.1 (iOS 12.2)       TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Safari 13.0 (macOS 10.14.6)  TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Apple ATS 9 iOS 9            TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Java 6u45                    No connection
>  Java 7u25                    No connection
>  Java 8u161                   TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Java 11.0.2 (OpenJDK)        TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Java 12.0.1 (OpenJDK)        TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  OpenSSL 1.0.2e               TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  OpenSSL 1.1.0l (Debian)      TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  OpenSSL 1.1.1d (Debian)      TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 256 bit
> ECDH (P-256)
>  Thunderbird (68.3)           TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256, 256 bit
> ECDH (P-256)
>  Done 2020-03-10 21:52:13 [0130s] -->> 13.234.216.57:443 (
> gsmasslciphers.digitalapicraft.com) <<--



I am not sure about the below explanation as seen in the above output.

Testing server preferences
>  Has server cipher order?     no (NOT ok)
>  Negotiated protocol          TLSv1.2
>  Negotiated cipher            ECDHE-RSA-AES128-GCM-SHA256, 521 bit ECDH
> (P-521) -- inconclusive test, matching cipher in list missing, better see
> below
>  Negotiated cipher per proto  (matching cipher in list missing)
>      ECDHE-RSA-AES256-GCM-SHA384:   TLSv1.2
>  No further cipher order check has been done as order is determined by the
> client


I will appreciate if someone can help me understand it. Does it mean there
is some issue? Thanks in advance and I look forward to hearing from you.

Best Regards,

Kaushal

Reply via email to