> Look at
> https://testssl.sh/
> That is an openssl wrapper which enumerates ciphers and protocols ( and a
> whole lot more)
Nice tool, I didn’t know it yet. I was already recommended to me by Michael
Wojcik in his first reply, but thanks nevertheless for the link.
Matthias
smime.p7s
De
Look at https://testssl.sh/
That is an openssl wrapper which enumerates ciphers and protocols ( and
a whole lot more)
Hexcode Cipher Suite Name
(OpenSSL) KeyExch. Encryption Bits Cipher Suite Name
(IANA/RFC)-
On Monday, 6 December 2021 15:52:30 CET, Dr. Matthias St. Pierre wrote:
"Comparable elegant" is underspecified.
(I guess, "Comparably elegant" would have been grammatically more correct.)
Perhaps try testssl.sh (https://testssl.sh/)? It has various
options for reducing the number and types
> From: Dr. Matthias St. Pierre
> Sent: Monday, 6 December, 2021 07:53
> To: Michael Wojcik ; openssl-
>
>
> > "Comparable elegant" is underspecified.
>
> (I guess, "Comparably elegant" would have been grammatically more
> correct.)
I just meant that elegance is in the eye of the beholder.
Ma
> "Comparable elegant" is underspecified.
(I guess, "Comparably elegant" would have been grammatically more correct.)
> Perhaps try testssl.sh (https://testssl.sh/)? It has various options for
> reducing the number and types of tests it runs. We've used it for
> profiling internal TLS-enabled
From: openssl-users On Behalf Of Dr.
Matthias St. Pierre
Sent: Monday, 6 December, 2021 07:12
> today I learned that nmap has a nice feature to enumerate the protocol
> versions and cipher
> suites supported by the peer (see below).
> Is there a comparable elegant way to obtain the same result
Hi all,
today I learned that nmap has a nice feature to enumerate the protocol versions
and cipher suites supported by the peer (see below).
Is there a comparable elegant way to obtain the same results using the `openssl
s_client` tool?
Matthias
--
$ nmap -script ssl-enum-ciphers -p 443 www.