Home OpenSSL Testing a Cipher Suite
Post
Cancel

OpenSSL Testing a Cipher Suite

In this post we’ll look at how to test whether a server supports a certain cipher suite when using TLS.

  1. Testing Ciphers for TLSv1.2 & Below
  2. Testing TLSv1.3 Ciphers

Below we have the SSLScan results of github.com. Let’s see how to manually verify if a certain cipher is valid.

Testing Ciphers for TLSv1.2 & Below

1
openssl s_client -connect github.com:443 -tls1_2 -cipher AES128-SHA256

Testing Other TLS Versions

If we want to test ciphers for other versions of TLS such as v1.0 & v1.1, we need to replace -tls1_2 in the above command with -tls1 and -tls1_1 respectively.


Testing TLSv1.3 Ciphers

1
openssl s_client -connect github.com:443 -ciphersuites TLS_AES_128_GCM_SHA256

When testing a TLSv1.3 cipher the version flag shouldn’t be required. However, if the wrong version is being used we can specify TLSv1.3 by using the -tls1_3 flag.

Notes

  • Make sure to specific a port number at the end of the host name.
  • Depending on the version of OpenSSL installed, certain ciphers may or may not be supported.
This post is licensed under CC BY 4.0 by the author.