telnet is working.
openssl “censored” output:
CONNECTED(00000003)
depth=1 C = DE, ST = Berlin, L = Berlin, O = <Company>, CN = <Company> RSA Certification Authority
verify error:num=19:self-signed certificate in certificate chain
verify return:1
depth=1 C = DE, ST = Berlin, L = Berlin, O = <Company>, CN = <Company> RSA Certification Authority
verify return:1
depth=0 C = DE, ST = Berlin, L = Berlin, O = <Company>, OU = IT, CN = openldap-test.internal
verify return:1
---
Certificate chain
0 s:C = DE, ST = Berlin, L = Berlin, O = <Company>, OU = IT, CN = openldap-test.internal
i:C = DE, ST = Berlin, L = Berlin, O = <Company>, CN = <Company> RSA Certification Authority
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Oct 22 13:10:07 2024 GMT; NotAfter: Nov 21 13:10:07 2024 GMT
1 s:C = DE, ST = Berlin, L = Berlin, O = <Company>, CN = <Company> RSA Certification Authority
i:C = DE, ST = Berlin, L = Berlin, O = <Company>, CN = <Company> RSA Certification Authority
a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA384
v:NotBefore: Oct 20 13:23:52 2017 GMT; NotAfter: Oct 18 13:23:52 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
<...>
-----END CERTIFICATE-----
subject=C = DE, ST = Berlin, L = Berlin, O = <Company>, OU = IT, CN = openldap-test.internal
issuer=C = DE, ST = Berlin, L = Berlin, O = <Company>, CN = <Company> RSA Certification Authority
---
No client certificate CA names sent
---
SSL handshake has read 2934 bytes and written 651 bytes
Verification error: self-signed certificate in certificate chain
---
New, TLSv1.2, Cipher is AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : AES256-GCM-SHA384
Session-ID: E5F743EF73ACB1F620C5C4E4943BC9ADC0C2092C0CA5FC6A52293A3ED8753E0A
Session-ID-ctx:
Master-Key: 967142E1CAC1665174A35D6FC4F14A886232F3720B778F54B88B141EC671780D6F582601BC6BBDCFF7CD1C96363CA5AD
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1729686237
Timeout : 7200 (sec)
Verify return code: 19 (self-signed certificate in certificate chain)
Extended master secret: yes
---
and testssl:
Testing protocols via sockets except NPN+ALPN
SSLv2 not offered (OK)
SSLv3 not offered (OK)
TLS 1 offered (deprecated)
TLS 1.1 offered (deprecated)
TLS 1.2 offered (OK)
TLS 1.3 not offered and downgraded to a weaker protocol
NPN/SPDY not offered
ALPN/HTTP2 not offered
Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4
No ciphers supporting Forward Secrecy offered
Testing server preferences
Has server cipher order? no (NOT ok)
Negotiated protocol TLSv1.2
Negotiated cipher AES128-GCM-SHA256 -- inconclusive test, matching cipher in list missing, better see below
Negotiated cipher per proto (matching cipher in list missing)
AES256-SHA: TLSv1, TLSv1.1
AES256-GCM-SHA384: TLSv1.2
No further cipher order check has been done as order is determined by the client
Testing server defaults (Server Hello)
TLS extensions (standard) "renegotiation info/#65281" "encrypt-then-mac/#22" "extended master secret/#23" "max fragment length/#1"
Session Ticket RFC 5077 hint no -- no lifetime advertised
SSL Session ID support yes
Session Resumption Tickets no, ID: no
TLS clock skew Random values, no fingerprinting possible
Signature Algorithm SHA256 with RSA
Server key size RSA 2048 bits
Server key usage Key Encipherment, Data Encipherment
Server extended key usage TLS Web Server Authentication
Serial xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx (OK: length 20)
Fingerprints SHA1 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
SHA256 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Common Name (CN) openldap-test.internal
subjectAltName (SAN) missing -- no SAN is deprecated
Issuer Company RSA Certification Authority
Trust (hostname) certificate does not match supplied URI (same w/o SNI)
Chain of trust NOT ok (self signed CA in chain)
EV cert (experimental) no
ETS/"eTLS", visibility info not present
Certificate Validity (UTC) expires < 30 days (29) (2024-10-22 13:10 --> 2024-11-21 13:10)
# of certificates provided 2
Certificate Revocation List --
OCSP URI --
NOT ok -- neither CRL nor OCSP URI provided
OCSP stapling not offered
OCSP must staple extension --
DNS CAA RR (experimental) not offered
Certificate Transparency N/A
Testing 370 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM
x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM
x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA