Source: testssl.sh Maintainer: Debian Security Tools Uploaders: ChangZhuo Chen (陳昌倬) , Unit 193 Section: utils Priority: optional Build-Depends: debhelper-compat (= 13), Rules-Requires-Root: no Standards-Version: 4.6.1 Vcs-Browser: https://salsa.debian.org/pkg-security-team/testssl.sh Vcs-Git: https://salsa.debian.org/pkg-security-team/testssl.sh.git Homepage: https://testssl.sh/ Package: testssl.sh Architecture: all Multi-Arch: foreign Depends: ${misc:Depends}, ${shlibs:Depends}, openssl (>= 1), bsdextrautils (>= 2.35.2-3) | bsdmainutils (<< 12.1.1~), procps, dnsutils Recommends: libengine-gost-openssl1.1 Description: Command line tool to check TLS/SSL ciphers, protocols and cryptographic flaws testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more. . Key features . * Clear output: you can tell easily whether anything is good or bad . * Ease of installation: It works for Linux, Darwin, FreeBSD and MSYS2/Cygwin out of the box: no need to install or configure something, no gems, CPAN, pip or the like. . * Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only webservers at port 443 . * Toolbox: Several command line options help you to run YOUR test and configure YOUR output . * Reliability: features are tested thoroughly . * Verbosity: If a particular check cannot be performed because of a missing capability on your client side, you'll get a warning . * Privacy: It's only you who sees the result, not a third party . * Freedom: It's 100% open source. You can look at the code, see what's going on and you can change it. Heck, even the development is open (github)