-
Notifications
You must be signed in to change notification settings - Fork 392
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS 1.2 Cipher Suites not detected #292
Comments
What target host did you use? If we can reproduce this issue, then we
can likely fix it quickly. Thanks!
|
Hi,
How can I send it in private?
Thanks!
|
My e-mail address is: jtesta at-sign positronsecurity dot com
|
@jtesta fantastic work investigating and fixing this as always. It's amazing how many dodgy TLS implementations there out there, and the amount of hacky code needed to work around them... Do you know what the server was that's behaving in this weird way? |
@jtesta @rbsec Glad I could help. Thanks for fixing it. The software is https://www.stunnel.org stunnel 5.69 on x86_64-pc-linux-gnu platform Configured for mTLS. |
@jtesta @rbsec I'm interested if mentioned stunnel is doing something in non-standard way? Could it cause some clients to behave strangely and cause some problems with SSL/TLS connections? Like Android apps perhaps? The project is open source so I thought the author could use your valuable input if stunnel is doing something hacky. I'll be debugging soon some rare connection issues as I have "SSL_accept: ssl/statem/statem_srvr.c:1767: error:14209175:SSL routines:tls_early_post_process_client_hello:inappropriate fallback" problem. If I understand correctly it's connected with TLS_FALLBACK_SCSV. Not sure where problem lays now, maybe I'll discover more hacks. Otherwise the issue is fixed and we can close the ticket. Thanks! |
sslscan cannot detect correct Cipher Suites for TLS 1.2 even though it detects TLS 1.2 itself.
Version: 2.1.0 Windows 64-bit (Mingw)
OpenSSL 3.0.9 30 May 2023
SSL/TLS Protocols:
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 enabled
TLSv1.3 enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
TLS renegotiation:
Session renegotiation not supported
TLS Compression:
Compression disabled
Heartbleed:
TLSv1.3 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253
Server Key Exchange Group(s):
TLSv1.3 128 bits secp256r1 (NIST P-256)
TLSv1.3 192 bits secp384r1 (NIST P-384)
TLSv1.3 260 bits secp521r1 (NIST P-521)
TLSv1.3 128 bits x25519
TLSv1.3 224 bits x448
TLSv1.2 128 bits secp256r1 (NIST P-256)
TLSv1.2 192 bits secp384r1 (NIST P-384)
TLSv1.2 260 bits secp521r1 (NIST P-521)
TLSv1.2 128 bits x25519
TLSv1.2 224 bits x448
I also tested it with sslyze-5.1.3
Here are the results:
TLS 1.2 Cipher Suites:
Attempted to connect using 156 cipher suites.
TLS 1.3 Cipher Suites:
Attempted to connect using 5 cipher suites.
Ciphers on the server:
ciphers = ECDHE-RSA-AES128-GCM-SHA256:ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS:!RSA-AES-128-CBC-SHA256:!RS
A-AES-128-GCM-SHA256:!RSA-AES-256-CBC-SHA256:!RSA-AES-256-GCM-SHA384:!DHE-RSA-3DES-EDE-CBC-SHA:!ECDHE-RSA-3DES-EDE-CBC-SHA:!RSA-3DES-EDE-CBC-SHA:!RSA-AES-128-CBC-SHA256:!RSA-AES-128-GCM-SHA25
6:!RSA-AES-256-CBC-SHA:!RSA-AES-256-CBC-SHA256:!RSA-AES-256-GCM-SHA384:!DES:!3DES
The text was updated successfully, but these errors were encountered: