Skip to main content

Simulates multiple different client bahviors

Project description

Build Status Coverage Black

tlsmate_client_simul

Overview

This project provides a plugin for the tlsmate application. It allows to check the interoperability of the chosen TLS server with multiple popular and well known TLS clients. In case the simulated client can successfully connect to the server, the following information negotiated between the client and the server is provided:

  • TLS protocol version

  • cipher suite

  • the type of the key exchange including the key size or the supported group

  • the server authentication mechanism including the key size

By default the parameters mentioned above will be colored according to the chosen style.

Basically this plugin does the same than the client simulation by SSLAB’s SSL Server Test, and indeed this plugin uses the client date base from this site.

Installation

This package requires Python3.6 or higher. The recommended way installing this tlsmate plugin is using pip:

$ pip install tlsmate_client_simul

Note: If required, the tlsmate application will be installed as well.

After installation make sure the plugin is enabled. The most common way is to do this in the tlsmate ini-file. Make sure the file ~/.tlsmate.ini contains the following lines:

[tlsmate]
plugin = tlsmate_client_simul

For more details regarding other configuration options refer to the documentation here.

Basic usage

This plugin can be used in two different ways.

Using the client-simul subcommand

The plugin extends tlsmate by the new subcommand client-simul. This allows to perform this client simulation independently from any other scan options tlsmate provides.

Here is an example:

$ tlsmate client-simul --progress mytlsmatedomain.net

Some basic parameters from tlsmate’s scan command are supported, use the --help argument to display all the available command line options:

$ tlsmate client-simul --help

Extending a server scan

The plugin can also be used to extend a TLS server scan. To do so the argument --client-simul must be given to the scan subcommand:

$ tlsmate scan --progress --client-simul mytlsmatedomain.net

Note: In the examples above the domain name “mytlsmatedomain.net” is used, which is currently not registered. Replace it with the domain name you want to use.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tlsmate_client_simul-1.0.1.tar.gz (475.1 kB view hashes)

Uploaded Source

Built Distribution

tlsmate_client_simul-1.0.1-py3-none-any.whl (47.4 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page