-
Notifications
You must be signed in to change notification settings - Fork 397
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Missing protocol and ciphers #294
Comments
Thanks for reporting this. If you can provide the target host to me,
then I can probably debug this quickly. My e-mail address is jtesta
at-sign positronsecurity dot com. Thanks!
|
@shemsargent-ch : I submitted PR #295 to address this problem. Thanks for getting me the target host, and thanks for reporting! |
Interesting that the server is detecting and rejecting this - which I suppose is fairly sensible behaviour on their part. Thanks as always. |
I suppose I'm surprised that most implementations didn't mind a
ClientHello with no session ID. I would have thought that is a
required field...
|
The word "required" seems to have a fairly loose meaning to most of the people who write TLS stacks. As does the word "standard"... |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I can connect to this server using TLS 1.0, but sslscan reports that protocol is not enabled. Nmap (report below) and Qualys SSL Labs show TLS 1.0 is enabled and return the same list of available ciphers. I can provide target server info privately on request.
Compare to
The text was updated successfully, but these errors were encountered: