-
Notifications
You must be signed in to change notification settings - Fork 14
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
22 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
platform: Linux (Ubuntu 16.04) | ||
runner: trytls 0.2.0 (CPython 2.7.11+, OpenSSL 1.0.2g-fips) | ||
stub: 'lua5.1' 'stubs/lua5.1-luasec/run.lua' | ||
SKIP support for TLS server name indication (SNI) [accept badssl.com:443] | ||
SKIP expired certificate [reject expired.badssl.com:443] | ||
SKIP wrong hostname in certificate [reject wrong.host.badssl.com:443] | ||
SKIP self-signed certificate [reject self-signed.badssl.com:443] | ||
SKIP SHA-256 signature [accept sha256.badssl.com:443] | ||
SKIP 1000 subjectAltNames [accept 1000-sans.badssl.com:443] | ||
SKIP incomplete chain of trust [reject incomplete-chain.badssl.com:443] | ||
SKIP Superfish CA [reject superfish.badssl.com:443] | ||
SKIP eDellRoot CA [reject edellroot.badssl.com:443] | ||
SKIP DSDTestProvider CA [reject dsdtestprovider.badssl.com:443] | ||
SKIP protect against Apple's TLS vulnerability CVE-2014-1266 [reject www.ssllabs.com:10443] | ||
SKIP protect against the FREAK attack [reject www.ssllabs.com:10444] | ||
SKIP protect against the Logjam attack [reject www.ssllabs.com:10445] | ||
SKIP protect against FREAK attack (test server 1) [reject cve.freakattack.com:443] | ||
SKIP protect against FREAK attack (test server 2) [reject cve2.freakattack.com:443] | ||
PASS valid localhost certificate [accept localhost:38085] | ||
FAIL invalid localhost certificate [reject localhost:34955] | ||
PASS use only the given CA bundle, not system's [reject sha256.badssl.com:443] | ||
output: certificate verify failed |