Loading

How to Get All Ciphers Supported From An Endpoint

Publiceringsdatum: Jul 24, 2025
Steg

CONTENT

You would like to know of a way to find out all the ciphers supported from an endpoint.

STEPS TO FOLLOW

1. Please run the following command to download the cipher scan script from Github. This is a project maintained by Mozilla (link):
curl -o sc.sh https://raw.githubusercontent.com/mozilla/cipherscan/master/cipherscan

2. Change this file to be executable:
chmod +x sc.sh

3. Run the scan:
./sc.sh 10.1.0.20:6443

You should see results like this: 
[root@ip-10-1-0-20 ~]# ./sc.sh www.google.com:443
.............../sc.sh: line 1589: ./cscan.sh: No such file or directory

Target: www.google.com:443

prio  ciphersuite                    protocols              pubkey_size  signature_algoritm       trusted  ticket_hint  ocsp_staple  npn                   pfs                 curves  curves_orde
ring
1     ECDHE-ECDSA-AES128-GCM-SHA256  TLSv1.2                256          sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  ECDH,P-256,256bits  server
2     ECDHE-ECDSA-AES256-GCM-SHA384  TLSv1.2                256          sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  ECDH,P-256,256bits  server
3     ECDHE-ECDSA-AES128-SHA         TLSv1,TLSv1.1,TLSv1.2  256          sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  ECDH,P-256,256bits  server
4     ECDHE-ECDSA-AES256-SHA         TLSv1,TLSv1.1,TLSv1.2  256          sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  ECDH,P-256,256bits  server
5     ECDHE-RSA-AES128-GCM-SHA256    TLSv1.2                2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  ECDH,P-256,256bits  server
6     ECDHE-RSA-AES256-GCM-SHA384    TLSv1.2                2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  ECDH,P-256,256bits  server
7     ECDHE-RSA-AES128-SHA           TLSv1,TLSv1.1,TLSv1.2  2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  ECDH,P-256,256bits  server
8     ECDHE-RSA-AES256-SHA           TLSv1,TLSv1.1,TLSv1.2  2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  ECDH,P-256,256bits  server
9     AES128-GCM-SHA256              TLSv1.2                2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  None                None    server
10    AES256-GCM-SHA384              TLSv1.2                2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  None                None    server
11    AES128-SHA                     TLSv1,TLSv1.1,TLSv1.2  2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  None                None    server
12    AES256-SHA                     TLSv1,TLSv1.1,TLSv1.2  2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  None                None    server
13    DES-CBC3-SHA                   TLSv1,TLSv1.1,TLSv1.2  2048         sha256WithRSAEncryption  True     100800       False        grpc-exp,h2,http/1.1  None                None    server

OCSP stapling: not supported
Cipher ordering: server
Curves ordering: unknown - fallback: no
Server supports secure renegotiation
Server supported compression methods: NONE
TLS Tolerance: yes
An alternative method to do this is available at How to Scan Ciphers Supported by a TLS/SSL Endpoint
Knowledge-artikelnummer

001115814

 
Laddar
Salesforce Help | Article