-
Notifications
You must be signed in to change notification settings - Fork 458
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ssl3_read_bytes:unexpected record when running --reneg #483
Comments
Hello, @hafedh-trimeche , do you know what kind of server software triggered this issue ("pgfserver") ? Otherwise I won't be able to fix it. Thanks! |
Hello,
The Server uses an authentication mechanism (not with Client Certificate) witch disconnects any non verified RSA Token. Best regards. |
@hafedh-trimeche Thanks - any chance there's such a server online that I can use for troubleshooting? If yes can you email it to me? |
Thanks for all the information - I have pushed a fix just now. |
Fix released as part of v4.0.3. |
CHECKING HOST(S) AVAILABILITY
pgfserver:443 => 192.168.38.10 WARNING: Server requested optional client authentication
SCAN RESULTS FOR PGFSERVER:443 - 192.168.38.10
Downgrade Attacks:
TLS_FALLBACK_SCSV: OK - Supported
OpenSSL Heartbleed:
OK - Not vulnerable to Heartbleed
TLS 1.2 Session Resumption Support:
With Session IDs: OK - Supported (5 successful resumptions out of 5 attempts).
With TLS Tickets: OK - Supported.
Elliptic Curve Key Exchange:
Supported curves: sect283k1, prime256v1, sect283r1, secp384r1, sect409k1, secp521r1, sect409r1, sect571k1, sect571r1, secp256k1
Rejected curves: sect239k1, prime192v1, secp160k1, sect163r1, secp160r1, sect163r2, secp160r2, sect163k1, sect193r1, secp192k1, X25519, sect193r2, secp224k1, X448, sect233k1, secp224r1, sect233r1
Deflate Compression:
OK - Compression disabled
SSL 3.0 Cipher Suites:
Attempted to connect using 80 cipher suites; the server rejected all cipher suites.
TLS 1.3 Cipher Suites:
Attempted to connect using 5 cipher suites; the server rejected all cipher suites.
TLS 1.2 Cipher Suites:
Attempted to connect using 156 cipher suites.
The server accepted the following 7 cipher suites:
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256
TLS_RSA_WITH_AES_256_GCM_SHA384 256
TLS_RSA_WITH_AES_256_CBC_SHA256 256
TLS_RSA_WITH_AES_256_CBC_SHA 256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 ECDH: prime256v1 (256 bits)
The group of cipher suites supported by the server has the following properties:
Forward Secrecy OK - Supported
Legacy RC4 Algorithm OK - Not Supported
TLS 1.0 Cipher Suites:
Attempted to connect using 80 cipher suites; the server rejected all cipher suites.
TLS 1.1 Cipher Suites:
Attempted to connect using 80 cipher suites; the server rejected all cipher suites.
OpenSSL CCS Injection:
OK - Not vulnerable to OpenSSL CCS injection
ROBOT Attack:
OK - Not vulnerable.
SSL 2.0 Cipher Suites:
Attempted to connect using 7 cipher suites; the server rejected all cipher suites.
Certificates Information:
Hostname sent for SNI: pgfserver
Number of certificates detected: 1
Certificate #0 ( _RSAPublicKey )
SHA1 Fingerprint: 739556e5329a18a9d0d078d18861ff3f7faa6eb4
Common Name: Strong Data Services
Issuer: Strong Data Services
Serial Number: 1791252245
Not Before: 2021-01-30
Not After: 2086-01-14
Public Key Algorithm: _RSAPublicKey
Signature Algorithm: sha256
Key Size: 1024
Exponent: 65537
DNS Subject Alternative Names: []
Certificate #0 - Trust
Hostname Validation: FAILED - Certificate does NOT match server hostname
Android CA Store (9.0.0_r9): FAILED - Certificate is NOT Trusted: self signed certificate
Apple CA Store (iOS 14, iPadOS 14, macOS 11, watchOS 7, and tvOS 14):FAILED - Certificate is NOT Trusted: self signed certificate
Java CA Store (jdk-13.0.2): FAILED - Certificate is NOT Trusted: self signed certificate
Mozilla CA Store (2021-01-24): FAILED - Certificate is NOT Trusted: self signed certificate
Windows CA Store (2021-01-24): FAILED - Certificate is NOT Trusted: self signed certificate
Symantec 2018 Deprecation: ERROR - Could not build verified chain (certificate untrusted?)
Received Chain: Strong Data Services --> Strong Data Services
Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
Received Chain Order: OK - Order is valid
Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
Certificate #0 - Extensions
OCSP Must-Staple: NOT SUPPORTED - Extension not found
Certificate Transparency: NOT SUPPORTED - Extension not found
Certificate #0 - OCSP Stapling
NOT SUPPORTED - Server did not send back an OCSP response
Error when running --reneg:
You can open an issue at https://github.com/nabla-c0d3/sslyze/issues with the following information:
The text was updated successfully, but these errors were encountered: