1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52
|
Source: testssl.sh
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: ChangZhuo Chen (陳昌倬) <czchen@debian.org>,
Unit 193 <unit193@debian.org>
Section: utils
Priority: optional
Build-Depends: debhelper-compat (= 12),
Rules-Requires-Root: no
Standards-Version: 4.5.1
Vcs-Browser: https://salsa.debian.org/pkg-security-team/testssl.sh
Vcs-Git: https://salsa.debian.org/pkg-security-team/testssl.sh.git
Homepage: https://testssl.sh/
Package: testssl.sh
Architecture: all
Multi-Arch: foreign
Depends: ${misc:Depends},
${shlibs:Depends},
openssl (>= 1),
bsdextrautils (>= 2.35.2-3) | bsdmainutils (<< 12.1.1~),
procps,
dnsutils
Recommends: libengine-gost-openssl1.1
Description: Command line tool to check TLS/SSL ciphers, protocols and cryptographic flaws
testssl.sh is a free command line tool which checks a server's service
on any port for the support of TLS/SSL ciphers, protocols as well as
recent cryptographic flaws and more.
.
Key features
.
* Clear output: you can tell easily whether anything is good or bad
.
* Ease of installation: It works for Linux, Darwin, FreeBSD and
MSYS2/Cygwin out of the box: no need to install or configure
something, no gems, CPAN, pip or the like.
.
* Flexibility: You can test any SSL/TLS enabled and STARTTLS service,
not only webservers at port 443
.
* Toolbox: Several command line options help you to run YOUR test and
configure YOUR output
.
* Reliability: features are tested thoroughly
.
* Verbosity: If a particular check cannot be performed because of a
missing capability on your client side, you'll get a warning
.
* Privacy: It's only you who sees the result, not a third party
.
* Freedom: It's 100% open source. You can look at the code, see what's
going on and you can change it. Heck, even the development is open
(github)
|