Skip to content

[possible BUG] Testing usgodae.org:443 only succeeded using testssl.sh-3.2.2/bin/openssl.Linux.x86_64 / bash sockets needed #2959

@gregoryR

Description

@gregoryR

Before you open an issue please check which version you are running and whether it is the latest in stable / dev branch

I am running version testssl.sh version 3.2.2 from https://testssl.sh/

Before you open an issue please whether this is a known problem by searching the issues

couldn't find anything

Command line / docker command to reproduce

testssl.sh -S usgodae.org:443

Expected behavior

No warning shown

Your system (please complete the following information):

  • OS: Debian GNU/Linux 10 (buster)
  • Platform: Linux 4.19.0-27-amd64 x86_64
  • OpenSSL + bash: Using OpenSSL 1.0.2-bad (Mar 28 2025) [~179 ciphers] / Using bash 5.0.3

Additional context

A warning asking for report is shown on usgodae.org:443

This shouldn't happen (pls report): Testing usgodae.org:443 only succeeded using /usr/local/src/testssl.sh-3.2.2/bin/openssl.Linux.x86_64.
But testssl.sh also needs bash sockets to perform its checks correctly.

I can see a pre-test bug

128 cipher limit bug

Can you reproduce ?

The complete test

$ testssl.sh -S usgodae.org:443

#####################################################################
  testssl.sh version 3.2.2 from https://testssl.sh/

  This program is free software. Distribution and modification under
  GPLv2 permitted. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!

  Please file bugs @ https://testssl.sh/bugs/
#####################################################################

  Using OpenSSL 1.0.2-bad (Mar 28 2025)  [~179 ciphers]
  on lucie:/usr/local/src/testssl.sh-3.2.2/bin/openssl.Linux.x86_64

 Start 2025-12-05 06:48:51        -->> 199.9.2.160:443 (usgodae.org) <<--

 rDNS (199.9.2.160):     nrlgodae1.nrlmry.navy.mil.
This shouldn't happen (pls report): Testing usgodae.org:443 only succeeded using /usr/local/src/testssl.sh-3.2.2/bin/openssl.Linux.x86_64.
But testssl.sh also needs bash sockets to perform its checks correctly.

You can try to continue using the --ssl-native option but the results are likely not complete.
Or you can restart using --ssl-native with another openssl version (--openssl <PATH>).
 Type "yes" to proceed and accept false negatives or positives --> yes
 Service detected:       HTTP
 Pre-test: 128 cipher limit bug

 Testing server defaults (Server Hello) 

 TLS extensions (standard)    "server name/#0" "EC point formats/#11" "extended master secret/#23" "renegotiation info/#65281"
 Session Ticket RFC 5077 hint no -- no lifetime advertised
 SSL Session ID support       yes
 Session Resumption           Tickets no, ID: yes
 TLS clock skew               Random values, no fingerprinting possible 
 Client Authentication        none
 Signature Algorithm          SHA384 with RSA
 Server key size              RSA 2048 bits (exponent is 65537)
 Server key usage             Digital Signature, Key Encipherment
 Server extended key usage    TLS Web Server Authentication, TLS Web Client Authentication
 Serial                       37FAE004371A1EA0B04672928980F6D5 (OK: length 16)
 Fingerprints                 SHA1 EC256F5B690BF7C9DF869D81DE0CEBEF05531491
                              SHA256 4409F94A15C8D8B27477057F0B50F4B360AF744411B5117357DBF4E59DE66873
 Common Name (CN)             usgodae.org 
 subjectAltName (SAN)         usgodae.org www.usgodae.org 
 Trust (hostname)             Ok via SAN and CN (same w/o SNI)
 Chain of trust               NOT ok (chain incomplete)
 EV cert (experimental)       no 
 Certificate Validity (UTC)   110 >= 60 days (2025-03-25 00:00 --> 2026-03-25 23:59)
 ETS/"eTLS", visibility info  not present
 Certificate Revocation List  http://crl.sectigo.com/EntrustOVTLSIssuingRSACA2.crl
 OCSP URI                     http://ocsp.sectigo.com
 OCSP stapling                not offered
 OCSP must staple extension   --
 DNS CAA RR (experimental)    not offered
 Certificate Transparency     yes (certificate extension)
 Certificates provided        1
 Issuer                       Entrust OV TLS Issuing RSA CA 2 (Entrust Limited from CA)
 Intermediate Bad OCSP (exp.) Ok



 Done 2025-12-05 06:51:30 [ 166s] -->> 199.9.2.160:443 (usgodae.org) <<--

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions