Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS13 Cipher Enumeration #70

Open
Mzack9999 opened this issue Aug 8, 2022 · 1 comment
Open

TLS13 Cipher Enumeration #70

Mzack9999 opened this issue Aug 8, 2022 · 1 comment
Labels
Investigation Something to Investigate Type: Enhancement Most issues will probably ask for additions or changes.

Comments

@Mzack9999
Copy link
Member

Please describe your feature request:

Investigate the feasibility of enumerations for TLS1.3 (cipher selection is automatic - ref #20 (comment))

Describe the use case of this feature:

Cipher enumeration for TLS 1.3

@Mzack9999 Mzack9999 added Type: Enhancement Most issues will probably ask for additions or changes. Investigation Something to Investigate labels Aug 8, 2022
@JaneX8
Copy link

JaneX8 commented Nov 20, 2024

I'm not sure if this is related but I have Tlsx outputting

    "version_enum": [
      "tls13",
      "tls12"
    ],
    "cipher_enum": [
      {
        "version": "tls13",
        "ciphers": {}
      },

While Qualys SSLLabs lists:

# TLS 1.3 (server has no preference)
TLS_AES_128_GCM_SHA256 (0x1301)   ECDH x25519 (eq. 3072 bits RSA)   FS | 128
TLS_AES_256_GCM_SHA384 (0x1302)   ECDH x25519 (eq. 3072 bits RSA)   FS | 256
TLS_CHACHA20_POLY1305_SHA256 (0x1303)   ECDH x25519 (eq. 3072 bits RSA)   FS | 256

So, Tlsx is missing ciphers in the list.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Investigation Something to Investigate Type: Enhancement Most issues will probably ask for additions or changes.
Projects
None yet
Development

No branches or pull requests

2 participants