sslscan icon indicating copy to clipboard operation
sslscan copied to clipboard

Scan for all TLS ciphersuites, not only the ones supported by the system's OpenSSL library

Open tyll opened this issue 11 years ago • 1 comments

To determine which TLS ciphersuites are supported by a server, it is not needed to do a full TLS handshake and therefore to actually be able to support the ciphersuite. It is enough to send a ClientHello packet and analyse the received ServerHello packet. I wrote some proof-of-concept code in https://github.com/tyll/cipher-scanner/ to show this. Also it is not needed to send one ClientHello per cipher, but only as much ClientHello packets as there are different ciphersuites supported by the server, since the server always selects a cipher from the list of sent ciphers, if the server supports one of them. This allows to reduce the time to scan a host.

tyll avatar Sep 14 '14 07:09 tyll

I like your idea, but in a first step I think it might be much easier to add these features to a pure python sslscanner. That's why I have created two new issues for pySSLScan.

phibos avatar Sep 21 '14 21:09 phibos