The bridge from the fediverse is also here (https://bsky.app/profile/testssl.infosec.exchange.ap.brid.gy). But might cut postings due to size limitations of bspky .
github.com/testssl/test...
github.com/testssl/test...
Get it from here: github.com/testssl/test...
🚀
Get it from here: github.com/testssl/test...
🚀
Get it from here: github.com/testssl/test...
Get it from here: github.com/testssl/test...
And it has more badges now ;-) -- including the status of the Ubuntu and MacOS CI runner.
And it has more badges now ;-) -- including the status of the Ubuntu and MacOS CI runner.
Changelog see github.com/testssl/test...
Changelog see github.com/testssl/test...
Some browsers and also #OpenSSL 3.5.0 support already #PQ #KEMs for key exchange to to provide secure key establishment resistance.
The (real soon now) to be released testssl.sh 3.2 final will include handshake simulation, see last column:
Some browsers and also #OpenSSL 3.5.0 support already #PQ #KEMs for key exchange to to provide secure key establishment resistance.
The (real soon now) to be released testssl.sh 3.2 final will include handshake simulation, see last column:
Testing before it'll be merged to github would be appreciated.
If you find issues please report them here: github.com/testssl/test...
Testing before it'll be merged to github would be appreciated.
If you find issues please report them here: github.com/testssl/test...
It brings lots of fixes + improvements under the hood. The important new feature is support of some KEMs (key encapsulation mechanism), aka Post Quantum Hybrid Key Agreements - thanks to David.
Get it at github.com/testssl/test... or github.com/testssl/test...
It brings lots of fixes + improvements under the hood. The important new feature is support of some KEMs (key encapsulation mechanism), aka Post Quantum Hybrid Key Agreements - thanks to David.
Get it at github.com/testssl/test... or github.com/testssl/test...
Besides being a security issue, it slows down the entire TLS ecosystem.
Besides being a security issue, it slows down the entire TLS ecosystem.
The supplied openssl in the git repo had a few issues . The new Linux 64 Bit binary needs your help testing:
testssl.sh/openssl-1.0....
Please file issues in the repo. "Works ok" incl. Linux distro is fine here
The supplied openssl in the git repo had a few issues . The new Linux 64 Bit binary needs your help testing:
testssl.sh/openssl-1.0....
Please file issues in the repo. "Works ok" incl. Linux distro is fine here
Simply set the environment variable `SSLKEYLOGFILE=/path/to/file` 😅 Note: it also works for Firefox and Chrome
Extremely useful when combined with Wireshark 👍
Simply set the environment variable `SSLKEYLOGFILE=/path/to/file` 😅 Note: it also works for Firefox and Chrome
Extremely useful when combined with Wireshark 👍