-
Notifications
You must be signed in to change notification settings - Fork 460
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"Not a valid TlsHandshakeTypeByte" when running --heartbleed #497
Comments
@wondex Could you send me the server that triggered this issue? Otherwise I won't be able to fix it. Thanks! |
Hi Alban, This is related to a Red Hat product, is there any debug option to send you the actual TlsHandshakeTypeByte value? |
Can you show the results of a full scan against this server? |
This is the full scan report (alterted the host information): CHECKING HOST(S) AVAILABILITY:443 => WARNING: Server requested optional client authentication SCAN RESULTS FOR :443 -
|
@nabla-c0d3 is the information enough? because the label "need more info" is still attached? Thanks for maintaining sslyze it's a great tool ;-) |
@wondex To be honest I might need a live server that I can connect to, in order to be able to debug this; it looks like the server doesn't "speak" TLS. Any idea on how I could access a server that behaves like this? |
Seems enough close to not open another issue.
Hope that can help you :) |
Describe the bug
or
To Reproduce
Install SSLyze using: pip
Run the following command: /opt/rh/rh-python38/root/usr/bin/python3.8 -m sslyze --regular
Expected behavior
Successful scan
Python environment (please complete the following information):
OS: Red Hat Enterprise Linux Server release 7.9 (Maipo)
Python version: 3.8
SSLyzeL: 4.0.2
The text was updated successfully, but these errors were encountered: