You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There's another issue why I believe in general the result maybe not reliable: for some cipher suites you would need to provide TLS extensions or specific values in those extensions, otherwise the server won't possibly accept the ClientHello, see e.g. drwetter/testssl.sh#1207 (comment)
Yes, we are aware about that.
This is a general issue with targets using TLS 1.3. We know about targets where our tool bails out with errors. So depends on what you exactly mean with "reliability":
checking all ciphers (fuzzing), yes
warning the user, if something fails: yes
detecting all ciphers allways: depends
Currently (2024) we have not seen many targets where the tool returns errors.
Before going into details, can you please explain what you want to achieve?
May be you consult the documentation first. If grep is not your favorite, you can query the docs in o-saft.tcl's Help window ;-)
Hi.
source: drwetter/testssl.sh#2526 (comment)
Did you know that ? Is it automatically managed by O-Saft when checking the full range of cipher suites ?
The text was updated successfully, but these errors were encountered: