Verify SSL protocols and cipher suites in use on Puppet Enterprise nodes
Did this solve your problem?
3 out of 10 found this helpful
Due to regulatory compliance or other requirements, you might need to verify which SSL protocols and cipher suites SSL-enabled PE services use when communicating with other PE components. Verify wh...
Comments
3 comments
This document mentions it applies to both Linux and Windows. Can you add instructions for verifying Windows?
Hi, that's a really good question.
I'm the technical writer for the team. I can't answer your question myself, but I'm going to have one of the team respond.
Bob,
The SSLyze docs cover Windows installation, which is simply to download the Windows release as a zip from the repo and extract it: https://nabla-c0d3.github.io/sslyze/documentation/installation.html#using-the-windows-executable
> A pre-compiled Windows executable is available in the Releases page of the GitHub project.
> This executable only gives access to the command line interface and does not allow using SSLyze’s Python API.
Since it's a standalone executable with no installer, and doesn't require any of the Python pre-requisites, you should be able to jump in directly to the "Verify SSL protocols and cipher suites" section of this article and run the command from wherever you extracted it.
```
PS C:\Users\GG\Downloads\sslyze-3.0.8-exe> .\sslyze.exe --regular puppetmaster.lan:443
CHECKING HOST(S) AVAILABILITY
-----------------------------
puppetmaster.lan:443 => 192.168.0.110
SCAN RESULTS FOR PUPPETMASTER.LAN:443 - 192.168.0.110
-----------------------------------------------
...
```
Please sign in to leave a comment.