Provided by: sslscan_1.11.5-rbsec-1.1_amd64 bug

NAME

       sslscan - Fast SSL/TLS scanner

SYNOPSIS

       sslscan [options] [host:port | host]

DESCRIPTION

       This manual page documents briefly the sslscan command

       sslscan  queries  SSL/TLS  services, such as HTTPS, in order to determine the ciphers that
       are supported.

       SSLScan is designed to be easy, lean and fast. The output includes  preferred  ciphers  of
       the  SSL/TLS  service,  and text and XML output formats are supported. It is TLS SNI aware
       when used with a supported version of OpenSSL.

       Output is colour coded to indicate security issues. Colours are as follows:

       Red Background  NULL cipher (no encryption)
       Red             Broken cipher (<= 40 bit), broken protocol  (SSLv2  or  SSLv3)  or  broken
       certificate signing algorithm (MD5)
       Yellow           Weak  cipher  (<=  56  bit  or RC4) or weak certificate signing algorithm
       (SHA-1)
       Purple          Anonymous cipher (ADH or AECDH)

OPTIONS

       --help
              Show summary of options

       --version
              Show version of program

       --targets=<file>
              A file containing a list of hosts to check. Hosts can be supplied with ports  (i.e.
              host:port). One target per line

       --ipv4
              Force  IPv4  DNS  resolution.   Default is to try IPv4, and if that fails then fall
              back to IPv6.

       --ipv6
              Force IPv6 DNS resolution.  Default is to try IPv4, and if  that  fails  then  fall
              back to IPv6.

       --show-certificate
              Display certificate information.

       --no-check-certificate
              Don't flag certificates signed with weak algorithms (MD5 and SHA-1) or short (<2048
              bit) RSA keys

       --show-client-cas
              Show a list of CAs that the server allows for client authentication. Will be  blank
              for IIS/Schannel servers.

       --show-ciphers
              Show a complete list of ciphers supported by sslscan

       --show-cipher-ids
              Print the hexadecimal cipher IDs

       --show-times
              Show  the  time  taken  for each handshake in milliseconds. Note that only a single
              request is made with each cipher, and that the  size  of  the  ClientHello  is  not
              constant,  so  this  should  not  be  used  for  proper benchmarking or performance
              testing.

              You might want to also use --no-cipher-details to make the output a bit clearer.

       --ssl2
              Only check SSLv2 ciphers
              Note that this option may not be available  if  system  OpenSSL  does  not  support
              SSLv2.  Either  build  OpenSSL statically or rebuild your system OpenSSL with SSLv2
              support. See the readme for further details.

       --ssl3
              Only check SSLv3 ciphers
              Note that this option may not be available  if  system  OpenSSL  does  not  support
              SSLv3.  Either  build  OpenSSL statically or rebuild your system OpenSSL with SSLv3
              support. See the readme for further details.

       --tls10
              Only check TLS 1.0 ciphers

       --tls11
              Only check TLS 1.1 ciphers

       --tls12
              Only check TLS 1.2 ciphers

       --tlsall
              Only check TLS ciphers (versions 1.0, 1.1 and 1.2)

       --ocsp
              Display OCSP status

       --pk=<file>
              A file  containing  the  private  key  or  a  PKCS#12  file  containing  a  private
              key/certificate pair (as produced by MSIE and Netscape)

       --pkpass=<password>
              The password for the private key or PKCS#12 file

       --certs=<file>
              A file containing PEM/ASN1 formatted client certificates

       --no-ciphersuites
              Do not scan for supported ciphersuites.

       --no-renegotiation
              Do not check for secure TLS renegotiation

       --no-compression
              Do not check for TLS compression (CRIME)

       --no-heartbleed
              Do not check for OpenSSL Heartbleed (CVE-2014-0160)

       --starttls-ftp
              STARTTLS setup for FTP

       --starttls-irc
              STARTTLS setup for IRC

       --starttls-imap
              STARTTLS setup for IMAP

       --starttls-pop3
              STARTTLS setup for POP3

       --starttls-smtp
              STARTTLS setup for SMTP
              Note  that some servers hang when we try to use SSLv3 ciphers over STARTTLS. If you
              scan hangs, try using the --tlsall option.

       --starttls-psql
              STARTTLS setup for PostgreSQL

       --starttls-xmpp
              STARTTLS setup for XMPP

       --xmpp-server
              Perform a server-to-server XMPP connection. Try this if --starttls-xmpp is failing.

       --rdp
              Send RDP preamble before starting scan.

       --http
              Makes a HTTP request after a successful connection and returns the server  response
              code

       --no-cipher-details
              Hide  NIST  EC  curve name and EDH/RSA key length. Requires OpenSSL >= 1.0.2 (so if
              you distro doesn't ship this, you'll need to statically build sslscan).

       --bugs
              Enables workarounds for SSL bugs

       --timeout=<sec>
              Set socket timeout. Useful for hosts that fail to respond  to  ciphers  they  don't
              understand. Default is 3s.

       --sleep=<msec>
              Pause  between  connections.  Useful  on  STARTTLS  SMTP services, or anything else
              that's performing rate limiting. Default is disabled.

       --xml=<file>
              Output results to an XML file

       --no-colour
              Disable coloured output.

EXAMPLES

       Scan a local HTTPS server
              sslscan localhost
              sslscan 127.0.0.1
              sslscan 127.0.0.1:443
              sslscan [::1]
              sslscan [::1]:443

AUTHOR

       sslscan was originally written by Ian Ventura-Whiting <fizz@titania.co.uk>.
       sslscan was extended by Jacob Appelbaum <jacob@appelbaum.net>.
       sslscan was extended by rbsec <robin@rbsec.net>.
       This manual page was originally written by Marvin Stark <marv@der-marv.de>.

                                        December 30, 2013                              SSLSCAN(1)