#2 sslyze [4]
$ apt install python-pip
$ pip install --upgrade setuptools
$ pip install --upgrade sslyze
$ python -m sslyze --regular 10.253.194.151:443

 AVAILABLE PLUGINS
 -----------------

  OpenSslCcsInjectionPlugin
  CompressionPlugin
  HeartbleedPlugin
  OpenSslCipherSuitesPlugin
  SessionRenegotiationPlugin
  FallbackScsvPlugin
  SessionResumptionPlugin
  HttpHeadersPlugin
  RobotPlugin
  CertificateInfoPlugin


 CHECKING HOST(S) AVAILABILITY
 -----------------------------

   10.253.194.151:443                       => 10.253.194.151



 SCAN RESULTS FOR 10.253.194.151:443 - 10.253.194.151
 ----------------------------------------------------

 * OpenSSL CCS Injection:
                                          OK - Not vulnerable to OpenSSL CCS 
injection

 * Session Renegotiation:
       Client-initiated Renegotiation:    OK - Rejected
       Secure Renegotiation:              OK - Supported

 * OpenSSL Heartbleed:
                                          OK - Not vulnerable to Heartbleed

 * Resumption Support:
      With Session IDs:                  OK - Supported (5 successful, 0 
failed, 0 errors, 5 total attempts).
      With TLS Tickets:                  NOT SUPPORTED - TLS ticket not 
assigned.

 * SSLV3 Cipher Suites:
      Server rejected all cipher suites.

 * TLSV1 Cipher Suites:
      Server rejected all cipher suites.

 * SSLV2 Cipher Suites:
      Server rejected all cipher suites.

 * TLSV1_3 Cipher Suites:
      Server rejected all cipher suites.

 * Downgrade Attacks:
       TLS_FALLBACK_SCSV:                 OK - Supported

 * TLSV1_2 Cipher Suites:
       Forward Secrecy                    OK - Supported
       RC4                                OK - Not Supported

     Preferred:
        TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384             ECDH-256 bits  256 
bits      HTTP 200 OK                                                 
     Accepted:
        TLS_DHE_RSA_WITH_AES_256_CBC_SHA256               DH-2048 bits   256 
bits      HTTP 200 OK                                                 
        TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA                ECDH-256 bits  256 
bits      HTTP 200 OK                                                 
        TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384             ECDH-256 bits  256 
bits      HTTP 200 OK                                                 
        DHE_RSA_WITH_AES_256_CCM_8                        -              256 
bits      HTTP 200 OK                                                 
        TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384             ECDH-256 bits  256 
bits      HTTP 200 OK                                                 
        TLS_DHE_RSA_WITH_AES_256_GCM_SHA384               DH-2048 bits   256 
bits      HTTP 200 OK                                                 
        TLS_DHE_RSA_WITH_AES_256_CBC_SHA                  DH-2048 bits   256 
bits      HTTP 200 OK                                                 
        TLS_DHE_RSA_WITH_AES_256_CCM                      -              256 
bits      HTTP 200 OK                                                 
        TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256             ECDH-256 bits  128 
bits      HTTP 200 OK                                                 
        TLS_DHE_RSA_WITH_AES_128_GCM_SHA256               DH-2048 bits   128 
bits      HTTP 200 OK                                                 

 * ROBOT Attack:
                                          OK - Not vulnerable, RSA cipher 
suites not supported

 * Deflate Compression:
                                          OK - Compression disabled

 * TLSV1_1 Cipher Suites:
      Server rejected all cipher suites.

 * Certificate Information:
     Content
       SHA1 Fingerprint:                  
79af5ab28acdf6c880cf5bd9da2a6acb4dfc46bf
       Common Name:                       10.253.194.151
       Issuer:                            10.253.194.151
       Serial Number:                     
56128595917874360689874067407377294145249645142
       Not Before:                        2019-07-15 06:08:16
       Not After:                         2020-07-14 06:08:16
       Signature Algorithm:               sha256
       Public Key Algorithm:              RSA
       Key Size:                          2048
       Exponent:                          65537 (0x10001)
       DNS Subject Alternative Names:     []

     Trust
       Hostname Validation:               OK - Certificate matches 
10.253.194.151
       Android CA Store (8.1.0_r9):       FAILED - Certificate is NOT Trusted: 
self signed certificate
       iOS CA Store (11):                 FAILED - Certificate is NOT Trusted: 
self signed certificate
       Java CA Store (jre-10.0.2):        FAILED - Certificate is NOT Trusted: 
self signed certificate
       macOS CA Store (High Sierra):      FAILED - Certificate is NOT Trusted: 
self signed certificate
       Mozilla CA Store (2018-04-12):     FAILED - Certificate is NOT Trusted: 
self signed certificate
       Windows CA Store (2018-06-30):     FAILED - Certificate is NOT Trusted: 
self signed certificate
       Symantec 2018 Deprecation:         OK - Not a Symantec-issued certificate
       Received Chain:                    10.253.194.151
       Verified Chain:                    ERROR - Could not build verified 
chain (certificate untrusted?)
       Received Chain Contains Anchor:    ERROR - Could not build verified 
chain (certificate untrusted?)
       Received Chain Order:              OK - Order is valid
       Verified Chain contains SHA1:      ERROR - Could not build verified 
chain (certificate untrusted?)

     Extensions
       OCSP Must-Staple:                  NOT SUPPORTED - Extension not found
       Certificate Transparency:          NOT SUPPORTED - Extension not found

     OCSP Stapling
                                          NOT SUPPORTED - Server did not send 
back an OCSP response


 SCAN COMPLETED IN 0.47 S

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3555

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-3389

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4929

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0169

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2566

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3587

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0224

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3566

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-0204

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-2808

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-4000

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0703

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0800

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-2183

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6329

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-9244

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836329

Title:
  Regression running ssllabs.com/ssltest causes 2 apache process to eat
  up 100% cpu, easy DoS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1836329/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to