Created
July 2, 2024 17:08
-
-
Save rajiv/465cf396ce9d8776646a6d72be7e157b to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
% testssl.sh --ip=one --full --phone-out --hints --cipher-per-proto --html --json-pretty https://www.akamai.com:443 | |
No engine or GOST support via engine with your /Users/rmanglan/homebrew/opt/openssl@3/bin/openssl | |
##################################################################### | |
testssl.sh version 3.0.9 from https://testssl.sh/ | |
This program is free software. Distribution and modification under | |
GPLv2 permitted. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK! | |
Please file bugs @ https://testssl.sh/bugs/ | |
##################################################################### | |
Using bash 3.2.57. OpenSSL 3.3.1 4 Jun 2024 (Library: OpenSSL 3.3.1 4 Jun 2024) [~69 ciphers] | |
on bos-mp2iv:/Users/rmanglan/homebrew/opt/openssl@3/bin/openssl | |
(built: Jun 4 12:53:04 2024, platform: darwin64-arm64-cc) | |
Start 2024-07-02 13:02:15 -->> 23.52.198.101:443 (www.akamai.com) <<-- | |
Further IP addresses: 2600:141b:1c00:2291::b63 2600:141b:1c00:2285::b63 | |
A record via: supplied IP "23.52.198.101" | |
rDNS (23.52.198.101): a23-52-198-101.deploy.static.akamaitechnologies.com. | |
Service detected: Couldn't determine what's running on port 443, assuming no HTTP service => skipping all HTTP checks | |
Testing protocols via sockets except NPN+ALPN | |
SSLv2 not offered (OK) | |
SSLv3 not offered (OK) | |
TLS 1 not offered | |
TLS 1.1 not offered | |
TLS 1.2 offered (OK) | |
TLS 1.3 offered (OK): final | |
NPN/SPDY not offered | |
ALPN/HTTP2 http/1.1 (offered) | |
Testing for server implementation bugs | |
No bugs found. | |
Testing cipher categories | |
NULL ciphers (no encryption) not offered (OK) | |
Anonymous NULL Ciphers (no authentication) not offered (OK) | |
Export ciphers (w/o ADH+NULL) not offered (OK) | |
LOW: 64 Bit + DES, RC[2,4] (w/o export) not offered (OK) | |
Triple DES Ciphers / IDEA not offered | |
Obsolete CBC ciphers (AES, ARIA etc.) not offered | |
Strong encryption (AEAD ciphers) offered (OK) | |
Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 | |
PFS is offered (OK) TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-GCM-SHA384 | |
ECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 TLS_AES_128_GCM_SHA256 ECDHE-RSA-AES128-GCM-SHA256 | |
ECDHE-ECDSA-AES128-GCM-SHA256 | |
Elliptic curves offered: prime256v1 X25519 | |
Testing server preferences | |
Has server cipher order? yes (OK) -- TLS 1.3 and below | |
Negotiated protocol TLSv1.3 | |
Negotiated cipher TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
Cipher order | |
TLSv1.2: ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 | |
ECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 | |
TLSv1.3: TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_GCM_SHA256 | |
Testing server defaults (Server Hello) | |
TLS extensions (standard) "renegotiation info/#65281" "server name/#0" "EC point formats/#11" "session ticket/#35" "status request/#5" | |
"next protocol/#13172" "supported versions/#43" "key share/#51" "supported_groups/#10" "max fragment length/#1" | |
"application layer protocol negotiation/#16" | |
Session Ticket RFC 5077 hint 83100 seconds, session tickets keys seems to be rotated < daily | |
SSL Session ID support yes | |
Session Resumption Tickets: yes, ID: yes | |
TLS clock skew Random values, no fingerprinting possible | |
Server Certificate #1 | |
Signature Algorithm SHA256 with RSA | |
Server key size RSA 2048 bits | |
Server key usage Digital Signature, Key Encipherment | |
Server extended key usage TLS Web Server Authentication, TLS Web Client Authentication | |
Serial 04639C0C4A237A59247C82520C40DBF8 (OK: length 16) | |
Fingerprints SHA1 68DFB08E8DD89B7A47D01799C641A6CB417B3649 | |
SHA256 7B99CC81EC1BA92EC193734C036EB31C1F11DFFD3C1C034F3971F5273FD7C961 | |
Common Name (CN) www.akamai.com | |
subjectAltName (SAN) www.akamai.com akamai.com | |
Issuer DigiCert TLS RSA SHA256 2020 CA1 (DigiCert Inc from US) | |
Trust (hostname) Ok via SAN (same w/o SNI) | |
Chain of trust Ok | |
EV cert (experimental) no | |
ETS/"eTLS", visibility info not present | |
Certificate Validity (UTC) 239 >= 60 days (2024-02-26 00:00 --> 2025-02-26 23:59) | |
# of certificates provided 2 | |
In pwnedkeys.com DB not in database | |
Certificate Revocation List http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl, not revoked | |
http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl, not revoked | |
OCSP URI http://ocsp.digicert.com, not revoked | |
OCSP stapling offered, not revoked | |
OCSP must staple extension -- | |
DNS CAA RR (experimental) not offered | |
Certificate Transparency yes (certificate extension) | |
Server Certificate #2 | |
Signature Algorithm SHA256 with RSA | |
Server key size EC 256 bits | |
Server key usage Digital Signature, Key Agreement | |
Server extended key usage TLS Web Server Authentication, TLS Web Client Authentication | |
Serial 0ED4B8D97F456B97DC4C95945B998E1E (OK: length 16) | |
Fingerprints SHA1 F9B5C6871091E900D77DB4EA750E3099312763FA | |
SHA256 A6D2D6CCE158760A609F9E3323429EE7CA9630DF72F199F16256289D95DF76F8 | |
Common Name (CN) www.akamai.com | |
subjectAltName (SAN) www.akamai.com akamai.com | |
Issuer DigiCert TLS RSA SHA256 2020 CA1 (DigiCert Inc from US) | |
Trust (hostname) Ok via SAN (same w/o SNI) | |
Chain of trust Ok | |
EV cert (experimental) no | |
ETS/"eTLS", visibility info not present | |
Certificate Validity (UTC) 239 >= 60 days (2024-02-26 00:00 --> 2025-02-26 23:59) | |
# of certificates provided 2 | |
In pwnedkeys.com DB not in database | |
Certificate Revocation List http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl, not revoked | |
http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl, not revoked | |
OCSP URI http://ocsp.digicert.com, not revoked | |
OCSP stapling offered, not revoked | |
OCSP must staple extension -- | |
DNS CAA RR (experimental) not offered | |
Certificate Transparency yes (certificate extension) | |
Testing vulnerabilities | |
Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension | |
CCS (CVE-2014-0224) not vulnerable (OK) | |
Ticketbleed (CVE-2016-9244), experiment. -- (applicable only for HTTPS) | |
ROBOT Server does not support any cipher suites that use RSA key transport | |
Secure Renegotiation (RFC 5746) supported (OK) | |
Secure Client-Initiated Renegotiation not vulnerable (OK) | |
CRIME, TLS (CVE-2012-4929) not vulnerable (OK) (not using HTTP anyway) | |
POODLE, SSL (CVE-2014-3566) not vulnerable (OK), no SSLv3 support | |
TLS_FALLBACK_SCSV (RFC 7507) No fallback possible (OK), no protocol below TLS 1.2 offered | |
SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK) | |
FREAK (CVE-2015-0204) not vulnerable (OK) | |
DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK) | |
make sure you don't use this certificate elsewhere with SSLv2 enabled services | |
https://search.censys.io/search?resource=hosts&virtual_hosts=INCLUDE&q=7B99CC81EC1BA92EC193734C036EB31C1F11DFFD3C1C034F3971F5273FD7C961 | |
LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected with <= TLS 1.2 | |
BEAST (CVE-2011-3389) not vulnerable (OK), no SSL3 or TLS1 | |
LUCKY13 (CVE-2013-0169), experimental not vulnerable (OK) | |
RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK) | |
Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength | |
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) | |
----------------------------------------------------------------------------------------------------------------------------- | |
SSLv2 | |
SSLv3 | |
TLS 1 | |
TLS 1.1 | |
TLS 1.2 | |
xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | |
xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 | |
xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | |
xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 | |
xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | |
xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | |
TLS 1.3 | |
x1302 TLS_AES_256_GCM_SHA384 ECDH 253 AESGCM 256 TLS_AES_256_GCM_SHA384 | |
x1303 TLS_CHACHA20_POLY1305_SHA256 ECDH 253 ChaCha20 256 TLS_CHACHA20_POLY1305_SHA256 | |
x1301 TLS_AES_128_GCM_SHA256 ECDH 253 AESGCM 128 TLS_AES_128_GCM_SHA256 | |
Could not determine the protocol, only simulating generic clients. | |
Running client simulations via sockets | |
Android 8.1 (native) TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Android 9.0 (native) TLSv1.3 TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
Android 10.0 (native) TLSv1.3 TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
Android 11 (native) TLSv1.3 TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
Android 12 (native) TLSv1.3 TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
Java 7u25 No connection | |
Java 8u161 TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
Java 11.0.2 (OpenJDK) TLSv1.3 TLS_AES_256_GCM_SHA384, 256 bit ECDH (P-256) | |
Java 17.0.3 (OpenJDK) TLSv1.3 TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
go 1.17.8 TLSv1.3 TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
LibreSSL 2.8.3 (Apple) TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 256 bit ECDH (P-256) | |
OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
OpenSSL 1.1.0l (Debian) TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit ECDH (P-256) | |
OpenSSL 1.1.1d (Debian) TLSv1.3 TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
OpenSSL 3.0.3 (git) TLSv1.3 TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) | |
Done 2024-07-02 13:04:23 [0137s] -->> 23.52.198.101:443 (www.akamai.com) <<-- |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment