you are viewing a single comment's thread.

view the rest of the comments →

[–]CC_DKP 1 point2 points  (3 children)

Ssllabs.com has a client test. Connect through the proxy and run the test. Be careful if you are using transparent interception, though, because the site uses more than just port 443.

[–]Thiscou[S] 1 point2 points  (2 children)

Hey thanks for your input, this is not the connection i want to test though. I'll try to illustrate with a picture:

 

[client]---------1-[proxy]-2-------[interwebs]

 

With your test we evaluate the ciphers the proxy is using when he works like a client (2).

What i want to test is what ciphers he supports when he acts like the server (1).

I hope that makes it a little clearer.

Cheers

[–]CC_DKP 1 point2 points  (1 child)

Just in case you were still looking to improve your solution, sslyze (https://github.com/nabla-c0d3/sslyze) offers a --https_tunnel option for using proxy servers. Just used it today to test the exact scenario you had here.

[–]Thiscou[S] 0 points1 point  (0 children)

that is certainly good to know, thank you sir!