Verify SSL protocols and cipher suites in use on Puppet Enterprise nodes

Comments

3 comments

  • Avatar
    Bob Rapelje

    This document mentions it applies to both Linux and Windows.  Can you add instructions for verifying Windows?

    0
    Comment actions Permalink
  • Avatar
    Suzie Baunsgard

    Hi, that's a really good question. 

    I'm the technical writer for the team. I can't answer your question myself, but I'm going to have one of the team respond. 

    0
    Comment actions Permalink
  • Avatar
    Garrett Guillotte

    Bob,

    The SSLyze docs cover Windows installation, which is simply to download the Windows release as a zip from the repo and extract it: https://nabla-c0d3.github.io/sslyze/documentation/installation.html#using-the-windows-executable

    > A pre-compiled Windows executable is available in the Releases page of the GitHub project.

    > This executable only gives access to the command line interface and does not allow using SSLyze’s Python API.

    Since it's a standalone executable with no installer, and doesn't require any of the Python pre-requisites, you should be able to jump in directly to the "Verify SSL protocols and cipher suites" section of this article and run the command from wherever you extracted it.

    ```

    PS C:\Users\GG\Downloads\sslyze-3.0.8-exe> .\sslyze.exe --regular puppetmaster.lan:443

    CHECKING HOST(S) AVAILABILITY
    -----------------------------
    puppetmaster.lan:443 => 192.168.0.110

    SCAN RESULTS FOR PUPPETMASTER.LAN:443 - 192.168.0.110
    -----------------------------------------------

    ...

    ```

    0
    Comment actions Permalink

Please sign in to leave a comment.