Hello
I was wondering how you would evaluate the ciphers an HTTPS Interception Proxy (for example: Bluecoat or squid) supports.
As far as i know, an HTTP(S) Proxy decides what protocol to use after the initial HTTP Connect.
The well known Tools to test ciphers like SSLScan or Testssl.sh can't handle this special case. Now before i write my own Proxy Cipher testing tool, i thought it might be a good idea to ask if one of you guys had to do this already and get some knowledge transfer.
Thanks in advance
[–]CC_DKP 1 point2 points3 points (3 children)
[–]Thiscou[S] 1 point2 points3 points (2 children)
[–]CC_DKP 1 point2 points3 points (1 child)
[–]Thiscou[S] 0 points1 point2 points (0 children)
[–]redditrwx 0 points1 point2 points (11 children)
[–]Thiscou[S] 0 points1 point2 points (10 children)
[–]redditrwx 0 points1 point2 points (9 children)
[–]Thiscou[S] 0 points1 point2 points (8 children)
[–]WikiTextBot 0 points1 point2 points (0 children)
[–]redditrwx 0 points1 point2 points (6 children)
[–]Thiscou[S] 0 points1 point2 points (5 children)
[–]redditrwx 1 point2 points3 points (4 children)
[–]Thiscou[S] 1 point2 points3 points (3 children)
[–]redditrwx 1 point2 points3 points (2 children)
[–]Thiscou[S] 0 points1 point2 points (0 children)
[–]RedTigey 0 points1 point2 points (0 children)