I am using Ubuntu 16.04 on my client (laptop) and it seems that SSL v3 is not present on my system to test the remote server (zmap.io in this example).
Related questions
There are several questions mentioning how to test if a server still serves SSL v3:
- How do I use "openssl s_client" to test for (absence of) SSLv3 support?
- How can I verify that SSLv3 protocol is disabled?
Tests that did NOT work
curl:
$ curl --sslv3 https://zmap.io/ curl: (35) gnutls_handshake() failed: Handshake failed
I expect
SSLv3, TLS handshake, Client hello
in the output.openssl
$ openssl s_client -ssl3 -connect zmap.io:443 140396574262936:error:140A90C4:SSL routines:SSL_CTX_new:null ssl method passed:ssl_lib.c:1878:
I expect
routines:SSL3_READ_BYTES:sslv3 alert handshake
in the output.nmap
$ nmap --script ssl-enum-ciphers -p 443 zmap.io Starting Nmap 7.01 ( https://nmap.org ) at 2016-09-20 17:19 CEST Nmap scan report for zmap.io (141.212.120.90) Host is up (0.12s latency). PORT STATE SERVICE 443/tcp open https | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 10.57 seconds
I expect
**SSLv3: No supported ciphers found**
in the output.
What to do?
Does anyone know a way to test SSLv3 with Ubuntu 16.04 (or other Linux distros without SSLv3 enabled in openssl)?
My server under test is not available from the public internet, meaning that an online service is not fulfilling my needs.