testssl.sh :verified:

Fled from the birdsite to a separate account.

Toots mostly in EN about testssl.sh and related stuff.

testssl.sh :verified:testssl@infosec.exchange
2025-06-15

Further development now takes place in the 3.3dev branch which was just created

github.com/testssl/testssl.sh/

testssl.sh :verified:testssl@infosec.exchange
2025-06-15

The last release of testssl.sh in the 3.0.10 branch was made which includes several bugfixes.

Get it from here: github.com/testssl/testssl.sh/

testssl.sh :verified:testssl@infosec.exchange
2025-06-13

(bugfix) version 3.2.1 of testssl.sh is out

Get it from here: github.com/testssl/testssl.sh/

🚀

testssl.sh :verified:testssl@infosec.exchange
2025-06-11

Does anybody has a solution for the problem that a #Github #action #badge shows also failed actions in a PR?

Help would be much appreciated.

Details here: github.com/testssl/testssl.sh/

Boosts appreciated

testssl.sh :verified: boosted:
daniel:// stenberg://bagder
2025-05-27

the single best resource for Open Source CRA info is this repo: github.com/orcwg/cra-hub

testssl.sh :verified:testssl@infosec.exchange
2025-05-26

I have some questions...

testssl.sh :verified:testssl@infosec.exchange
2025-05-20

Branch 3.2 has now also a github action running under MacOS which permits dealing with compatibility issue in the very beginning, i.e. when write a PR

And it has more badges now ;-) -- including the status of the Ubuntu and MacOS CI runner.

Badges in the Readme @ github, including the Github runners for Ubuntu and MacOS
testssl.sh :verified:testssl@infosec.exchange
2025-05-08

PR pending

Android 15 handshake simulation in testssl showing support for hydrid PQ KEM/kx X25519MLKEM768
testssl.sh :verified:testssl@infosec.exchange
2025-05-08

Also Android 15 supports the hybrid #PQ #KEM #X25519MLKEM768.

Will be soon added to the handshake simulation section

testssl.sh :verified:testssl@infosec.exchange
2025-05-08

Can someone assist writing a unit test for #github using a MacOS runner?

github.com/testssl/testssl.sh/

RTs welcome

Looks like the MacOS 14 runner is free: https://github.com/orgs/community/discussions/102846 for public repos.

Can somebody test a github runner for this repo?

Currently our Ubuntu runner with perl is here: https://github.com/testssl/testssl.sh/blob/3.2/.github/workflows/unit_tests.yml . Just one check with testssl.sh would suffice. It doesn't have to be perl. Anything which works is fine.
testssl.sh :verified: boosted:
Gareth Heyes :verified:gaz@infosec.exchange
2025-05-08

Unicode characters with a decomposition of 2+ ASCII characters and are registrable domains by _0x999

shazzer.co.uk/vectors/681bdfbc

testssl.sh :verified:testssl@infosec.exchange
2025-04-25

Here is a scan from testssl.net (which is at cloudflare and proxies testssl.sh) -- watch out for the #MLKEM(s)

#PQC

testssl.sh :verified:testssl@infosec.exchange
2025-04-10

Some browsers and also #OPenSSL 3.5.0 support already #PQ #KEMs for key exchange to to provide secure key establishment resistance.

The (real soon now) to be released testssl.sh 3.2 final will include handshake simulation, see last column:

testssl.sh :verified:testssl@infosec.exchange
2025-04-09

testssl.sh (3.2rc4) has now a client simulation for #OpenSSL 3.5.0:

showing a row of the client simulation output

OpenSSL 3.5.0 (git)          TLSv1.3   TLS_AES_128_GCM_SHA256            X25519MLKEM768
testssl.sh :verified:testssl@infosec.exchange
2025-04-08

#OpenSSL 3.5.0 LTS release with some #PQC algorithms, server side #QUIC support and more

testssl.sh :verified: boosted:
Linuxiaclinuxiac
2025-04-08

OpenSSL 3.5 introduces major crypto updates, including PQC support, server-side QUIC, and new TLS defaults.
linuxiac.com/openssl-3-5-bring

OpenSSL 3.5 introduces major crypto updates, including PQC support, server-side QUIC, and new TLS defaults.
testssl.sh :verified:testssl@infosec.exchange
2025-03-28

Ok, the final tuning to the supplied #openssl binary has taken place.

Recent patches see github.com/testssl/openssl-1.0

Private testing went good so far. Help testing would be much appreciated.

You can grab the binary from here testssl.sh/contributed_binarie (signature: testssl.sh/contributed_binarie) and let us SOON know of any problems.

testssl.sh :verified:testssl@infosec.exchange
2025-03-13

A few recent updates to testssl.sh 3.2rc4:
* Improved compatibility with > OpenSSL 3.5 (David)
* Check now for 6 instead of 3 KEMs (David)
* Sort TLS extensions (David)
* added some server side TLS extensions (Dirk)
* Banner changed (Dirk)
* faster startup (Dirk)
* make curve checks more reliable (David)
* Fix curves findings in TLS1.2 and prior versions (Riccardo)
* Fix rating (Magnus)
* Add more HTTP security headers and deprecate others (Dirk)
* Feature: Detection STARTTLS throtteling via code 421/SMTP (Dirk)
* Enhance ticketbleed testing (David)
* Improve NPN detection (David)
* EV cert addition (Brett)

testssl.sh :verified:testssl@infosec.exchange
2025-03-12

One of Google's intermediate CAs expired on March 9, fortunately this seems for chromecast devices only:

reddit.com/r/Chromecast/commen

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst