In this post we’ll look at how to test whether a server supports a certain cipher suite when using TLS.
Below we have the SSLScan results of
github.com. Let’s see how to manually verify if a certain cipher is valid.
Testing Ciphers for TLSv1.2 & Below
1 openssl s_client -connect github.com:443 -tls1_2 -cipher AES128-SHA256
Testing Other TLS Versions
If we want to test ciphers for other versions of TLS such as v1.0 & v1.1, we need to replace
-tls1_2 in the above command with
Testing TLSv1.3 Ciphers
1 openssl s_client -connect github.com:443 -ciphersuites TLS_AES_128_GCM_SHA256
When testing a TLSv1.3 cipher the version flag shouldn’t be required. However, if the wrong version is being used we can specify TLSv1.3 by using the
- Make sure to specific a port number at the end of the host name.
- Depending on the version of OpenSSL installed, certain ciphers may or may not be supported.