Skip to main content

Verify SSL protocols and cipher suites in use on Puppet Enterprise nodes

Did this solve your problem?
3 out of 10 found this helpful

How can we improve this article?

3 comments

  • Bob Rapelje

    This document mentions it applies to both Linux and Windows.  Can you add instructions for verifying Windows?

    0
  • Suzanne Baunsgard

    Hi, that's a really good question. 

    I'm the technical writer for the team. I can't answer your question myself, but I'm going to have one of the team respond. 

    0
  • Permanently deleted user

    Bob,

    The SSLyze docs cover Windows installation, which is simply to download the Windows release as a zip from the repo and extract it: https://nabla-c0d3.github.io/sslyze/documentation/installation.html#using-the-windows-executable

    > A pre-compiled Windows executable is available in the Releases page of the GitHub project.

    > This executable only gives access to the command line interface and does not allow using SSLyze’s Python API.

    Since it's a standalone executable with no installer, and doesn't require any of the Python pre-requisites, you should be able to jump in directly to the "Verify SSL protocols and cipher suites" section of this article and run the command from wherever you extracted it.

    ```

    PS C:\Users\GG\Downloads\sslyze-3.0.8-exe> .\sslyze.exe --regular puppetmaster.lan:443

    CHECKING HOST(S) AVAILABILITY
    -----------------------------
    puppetmaster.lan:443 => 192.168.0.110

    SCAN RESULTS FOR PUPPETMASTER.LAN:443 - 192.168.0.110
    -----------------------------------------------

    ...

    ```

    0

Please sign in to leave a comment.