Nmap Development mailing list archives
RE: ssl-enum-ciphers not returning all ciphers
From: "Lemons, Terry" <Terry.Lemons () dell com>
Date: Tue, 25 Jun 2019 21:00:49 +0000
Also, here is a '-dd' run, showing more diagnostic information. My untrained eye doesn't see a problem: # nmap -p 5671 -dd --script ssl-enum-ciphers 10.7.110.234 Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-25 14:51 MDT Fetchfile found /usr/bin/../share/nmap/nmap-services Fetchfile found /usr/bin/../share/nmap/nmap.xsl The max # of sockets we are using is: 0 --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Using Lua 5.3. Fetchfile found /usr/bin/../share/nmap/nse_main.lua Fetchfile found /usr/bin/../share/nmap/nselib/lpeg-utility.lua Fetchfile found /usr/bin/../share/nmap/nselib/stdnse.lua Fetchfile found /usr/bin/../share/nmap/nselib/strict.lua Fetchfile found /usr/bin/../share/nmap/scripts/script.db NSE: Arguments from CLI: Fetchfile found /usr/bin/../share/nmap/scripts/ssl-enum-ciphers.nse NSE: Script ssl-enum-ciphers.nse was selected by name. Fetchfile found /usr/bin/../share/nmap/nselib/comm.lua Fetchfile found /usr/bin/../share/nmap/nselib/shortport.lua Fetchfile found /usr/bin/../share/nmap/nselib/unittest.lua Fetchfile found /usr/bin/../share/nmap/nselib/nsedebug.lua Fetchfile found /usr/bin/../share/nmap/nselib/listop.lua Fetchfile found /usr/bin/../share/nmap/nselib/sslcert.lua Fetchfile found /usr/bin/../share/nmap/nselib/asn1.lua Fetchfile found /usr/bin/../share/nmap/nselib/bin.lua Fetchfile found /usr/bin/../share/nmap/nselib/ftp.lua Fetchfile found /usr/bin/../share/nmap/nselib/ipOps.lua Fetchfile found /usr/bin/../share/nmap/nselib/ldap.lua Fetchfile found /usr/bin/../share/nmap/nselib/match.lua Fetchfile found /usr/bin/../share/nmap/nselib/mssql.lua Fetchfile found /usr/bin/../share/nmap/nselib/bit.lua Fetchfile found /usr/bin/../share/nmap/nselib/smb.lua Fetchfile found /usr/bin/../share/nmap/nselib/netbios.lua Fetchfile found /usr/bin/../share/nmap/nselib/dns.lua Fetchfile found /usr/bin/../share/nmap/nselib/base32.lua Fetchfile found /usr/bin/../share/nmap/nselib/smbauth.lua Fetchfile found /usr/bin/../share/nmap/nselib/unicode.lua Fetchfile found /usr/bin/../share/nmap/nselib/smb2.lua Fetchfile found /usr/bin/../share/nmap/nselib/strbuf.lua Fetchfile found /usr/bin/../share/nmap/nselib/smtp.lua Fetchfile found /usr/bin/../share/nmap/nselib/base64.lua Fetchfile found /usr/bin/../share/nmap/nselib/sasl.lua Fetchfile found /usr/bin/../share/nmap/nselib/tls.lua Fetchfile found /usr/bin/../share/nmap/nselib/vnc.lua Fetchfile found /usr/bin/../share/nmap/nselib/bits.lua Fetchfile found /usr/bin/../share/nmap/nselib/xmpp.lua NSE: Loaded 1 scripts for scanning. NSE: Loaded '/usr/bin/../share/nmap/scripts/ssl-enum-ciphers.nse'. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 14:51 Completed NSE at 14:51, 0.00s elapsed Fetchfile found /usr/bin/../share/nmap/nmap-payloads Initiating Ping Scan at 14:51 Scanning 10.7.110.234 [4 ports] Packet capture filter (device eth0): dst host 10.7.93.141 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 10.7.110.234))) We got a ping packet back from 10.7.110.234: id = 29846 seq = 0 checksum = 35689 ultrascan_host_probe_update called for machine 10.7.110.234 state UNKNOWN -> HOST_UP (trynum 0 time: 930) Changing ping technique for 10.7.110.234 to icmp type 8 code 0 Changing global ping host to 10.7.110.234. Completed Ping Scan at 14:51, 0.00s elapsed (1 total hosts) Overall sending rates: 1291.16 packets / s, 49063.91 bytes / s. mass_rdns: Using DNS server 10.7.93.100 NSOCK INFO [0.4190s] nsock_iod_new2(): nsock_iod_new (IOD #1) NSOCK INFO [0.4190s] nsock_connect_udp(): UDP connection requested to 10.7.93.100:53 (IOD #1) EID 8 NSOCK INFO [0.4200s] nsock_read(): Read request from IOD #1 [10.7.93.100:53] (timeout: -1ms) EID 18 Initiating Parallel DNS resolution of 1 host. at 14:51 NSOCK INFO [0.4200s] nsock_write(): Write request for 43 bytes to IOD #1 EID 27 [10.7.93.100:53] NSOCK INFO [0.4200s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [10.7.93.100:53] NSOCK INFO [0.4200s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 27 [10.7.93.100:53] NSOCK INFO [0.4210s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 18 [10.7.93.100:53] (109 bytes) NSOCK INFO [0.4210s] nsock_read(): Read request from IOD #1 [10.7.93.100:53] (timeout: -1ms) EID 34 NSOCK INFO [0.4210s] nsock_iod_delete(): nsock_iod_delete (IOD #1) NSOCK INFO [0.4210s] nevent_delete(): nevent_delete on event #34 (type READ) mass_rdns: 0.00s 0/1 [#: 1, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1] Completed Parallel DNS resolution of 1 host. at 14:51, 0.00s elapsed DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 14:51 10.7.110.234 pingprobe type ICMP is inappropriate for this scan type; resetting. Scanning 10.7.110.234 [1 port] Packet capture filter (device eth0): dst host 10.7.93.141 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 10.7.110.234))) Discovered open port 5671/tcp on 10.7.110.234 Changing ping technique for 10.7.110.234 to tcp to port 5671; flags: S Changing global ping host to 10.7.110.234. Completed SYN Stealth Scan at 14:51, 0.00s elapsed (1 total ports) Overall sending rates: 457.46 packets / s, 20128.09 bytes / s. NSE: Script scanning 10.7.110.234. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 14:51 NSOCK INFO [0.4210s] nsock_iod_new2(): nsock_iod_new (IOD #1) NSOCK INFO [0.4250s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #1) EID 8 NSOCK INFO [0.4260s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [10.7.110.234:5671] NSOCK INFO [0.4260s] nsock_write(): Write request for 110 bytes to IOD #1 EID 19 [10.7.110.234:5671] NSOCK INFO [0.4260s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 19 [10.7.110.234:5671] NSOCK INFO [0.4260s] nsock_read(): Read request from IOD #1 [10.7.110.234:5671] (timeout: 7000ms) EID 26 NSOCK INFO [0.4310s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 26 [10.7.110.234:5671] (3115 bytes) NSOCK INFO [0.4310s] nsock_iod_delete(): nsock_iod_delete (IOD #1) NSE: Starting ssl-enum-ciphers M:24bfb38 against 10.7.110.234:5671. NSE: [ssl-enum-ciphers M:24bfb38 10.7.110.234:5671] Trying protocol TLSv1.0. NSE: ssl-enum-ciphers M:24bfb38 spawning new thread (thread: 0x2bdfa58). NSE: [ssl-enum-ciphers M:24bfb38 10.7.110.234:5671] Trying protocol TLSv1.2. NSE: ssl-enum-ciphers M:24bfb38 spawning new thread (thread: 0x2c89908). NSE: [ssl-enum-ciphers M:24bfb38 10.7.110.234:5671] Trying protocol SSLv3. NSE: ssl-enum-ciphers M:24bfb38 spawning new thread (thread: 0x29ab888). NSE: [ssl-enum-ciphers M:24bfb38 10.7.110.234:5671] Trying protocol TLSv1.1. NSE: ssl-enum-ciphers M:24bfb38 spawning new thread (thread: 0x2b2f288). NSOCK INFO [0.4330s] nsock_iod_new2(): nsock_iod_new (IOD #2) NSOCK INFO [0.4330s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #2) EID 32 NSOCK INFO [0.4330s] nsock_iod_new2(): nsock_iod_new (IOD #3) NSOCK INFO [0.4340s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #3) EID 40 NSOCK INFO [0.4340s] nsock_iod_new2(): nsock_iod_new (IOD #4) NSOCK INFO [0.4350s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #4) EID 48 NSOCK INFO [0.4350s] nsock_iod_new2(): nsock_iod_new (IOD #5) NSOCK INFO [0.4360s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #5) EID 56 NSOCK INFO [0.4360s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 32 [10.7.110.234:5671] NSOCK INFO [0.4360s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 40 [10.7.110.234:5671] NSOCK INFO [0.4360s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 48 [10.7.110.234:5671] NSOCK INFO [0.4370s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 56 [10.7.110.234:5671] NSOCK INFO [0.4370s] nsock_write(): Write request for 224 bytes to IOD #2 EID 67 [10.7.110.234:5671] NSOCK INFO [0.4370s] nsock_write(): Write request for 192 bytes to IOD #3 EID 75 [10.7.110.234:5671] NSOCK INFO [0.4380s] nsock_write(): Write request for 176 bytes to IOD #4 EID 83 [10.7.110.234:5671] NSOCK INFO [0.4380s] nsock_write(): Write request for 192 bytes to IOD #5 EID 91 [10.7.110.234:5671] NSOCK INFO [0.4380s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 67 [10.7.110.234:5671] NSOCK INFO [0.4380s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 75 [10.7.110.234:5671] NSOCK INFO [0.4380s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 83 [10.7.110.234:5671] NSOCK INFO [0.4380s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 91 [10.7.110.234:5671] NSOCK INFO [0.4390s] nsock_readbytes(): Read request for 5 bytes from IOD #2 [10.7.110.234:5671] EID 98 NSOCK INFO [0.4390s] nsock_readbytes(): Read request for 5 bytes from IOD #3 [10.7.110.234:5671] EID 106 NSOCK INFO [0.4390s] nsock_readbytes(): Read request for 5 bytes from IOD #4 [10.7.110.234:5671] EID 114 NSOCK INFO [0.4390s] nsock_readbytes(): Read request for 5 bytes from IOD #5 [10.7.110.234:5671] EID 122 NSOCK INFO [0.4410s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 98 [10.7.110.234:5671] (7 bytes): ......( NSOCK INFO [0.4410s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 106 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4420s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 114 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4420s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 122 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4420s] nsock_iod_delete(): nsock_iod_delete (IOD #2) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Got alert: handshake_failure NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) 64 ciphers rejected. NSOCK INFO [0.4420s] nsock_iod_new2(): nsock_iod_new (IOD #6) NSOCK INFO [0.4430s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #6) EID 128 NSOCK INFO [0.4430s] nsock_iod_delete(): nsock_iod_delete (IOD #3) NSE: [ssl-enum-ciphers W:2bdfa58 10.7.110.234:5671] (TLSv1.0) Got alert: protocol_version NSOCK INFO [0.4430s] nsock_iod_new2(): nsock_iod_new (IOD #7) NSOCK INFO [0.4430s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #7) EID 136 NSOCK INFO [0.4430s] nsock_iod_delete(): nsock_iod_delete (IOD #4) NSE: [ssl-enum-ciphers W:29ab888 10.7.110.234:5671] (SSLv3) Got alert: protocol_version NSOCK INFO [0.4430s] nsock_iod_new2(): nsock_iod_new (IOD #8) NSOCK INFO [0.4440s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #8) EID 144 NSOCK INFO [0.4440s] nsock_iod_delete(): nsock_iod_delete (IOD #5) NSE: [ssl-enum-ciphers W:2b2f288 10.7.110.234:5671] (TLSv1.1) Got alert: protocol_version NSOCK INFO [0.4440s] nsock_iod_new2(): nsock_iod_new (IOD #9) NSOCK INFO [0.4450s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #9) EID 152 NSOCK INFO [0.4450s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 128 [10.7.110.234:5671] NSOCK INFO [0.4450s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 136 [10.7.110.234:5671] NSOCK INFO [0.4450s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 144 [10.7.110.234:5671] NSOCK INFO [0.4450s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 152 [10.7.110.234:5671] NSOCK INFO [0.4460s] nsock_write(): Write request for 224 bytes to IOD #6 EID 163 [10.7.110.234:5671] NSOCK INFO [0.4460s] nsock_write(): Write request for 192 bytes to IOD #7 EID 171 [10.7.110.234:5671] NSOCK INFO [0.4460s] nsock_write(): Write request for 176 bytes to IOD #8 EID 179 [10.7.110.234:5671] NSOCK INFO [0.4470s] nsock_write(): Write request for 192 bytes to IOD #9 EID 187 [10.7.110.234:5671] NSOCK INFO [0.4470s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 163 [10.7.110.234:5671] NSOCK INFO [0.4470s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 171 [10.7.110.234:5671] NSOCK INFO [0.4470s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 179 [10.7.110.234:5671] NSOCK INFO [0.4470s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 187 [10.7.110.234:5671] NSOCK INFO [0.4470s] nsock_readbytes(): Read request for 5 bytes from IOD #6 [10.7.110.234:5671] EID 194 NSOCK INFO [0.4470s] nsock_readbytes(): Read request for 5 bytes from IOD #7 [10.7.110.234:5671] EID 202 NSOCK INFO [0.4480s] nsock_readbytes(): Read request for 5 bytes from IOD #8 [10.7.110.234:5671] EID 210 NSOCK INFO [0.4480s] nsock_readbytes(): Read request for 5 bytes from IOD #9 [10.7.110.234:5671] EID 218 NSOCK INFO [0.4680s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 202 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4680s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 210 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4690s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 218 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4700s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 194 [10.7.110.234:5671] (7 bytes): ......( NSOCK INFO [0.4700s] nsock_iod_delete(): nsock_iod_delete (IOD #6) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Got alert: handshake_failure NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) 64 ciphers rejected. NSOCK INFO [0.4700s] nsock_iod_new2(): nsock_iod_new (IOD #10) NSOCK INFO [0.4710s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #10) EID 224 NSOCK INFO [0.4710s] nsock_iod_delete(): nsock_iod_delete (IOD #7) NSE: [ssl-enum-ciphers W:2bdfa58 10.7.110.234:5671] (TLSv1.0) Got alert: protocol_version NSOCK INFO [0.4710s] nsock_iod_new2(): nsock_iod_new (IOD #11) NSOCK INFO [0.4710s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #11) EID 232 NSOCK INFO [0.4710s] nsock_iod_delete(): nsock_iod_delete (IOD #8) NSE: [ssl-enum-ciphers W:29ab888 10.7.110.234:5671] (SSLv3) Got alert: protocol_version NSOCK INFO [0.4710s] nsock_iod_new2(): nsock_iod_new (IOD #12) NSOCK INFO [0.4720s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #12) EID 240 NSOCK INFO [0.4720s] nsock_iod_delete(): nsock_iod_delete (IOD #9) NSE: [ssl-enum-ciphers W:2b2f288 10.7.110.234:5671] (TLSv1.1) Got alert: protocol_version NSOCK INFO [0.4720s] nsock_iod_new2(): nsock_iod_new (IOD #13) NSOCK INFO [0.4730s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #13) EID 248 NSOCK INFO [0.4730s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 224 [10.7.110.234:5671] NSOCK INFO [0.4730s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 232 [10.7.110.234:5671] NSOCK INFO [0.4730s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 240 [10.7.110.234:5671] NSOCK INFO [0.4730s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 248 [10.7.110.234:5671] NSOCK INFO [0.4740s] nsock_write(): Write request for 224 bytes to IOD #10 EID 259 [10.7.110.234:5671] NSOCK INFO [0.4740s] nsock_write(): Write request for 192 bytes to IOD #11 EID 267 [10.7.110.234:5671] NSOCK INFO [0.4740s] nsock_write(): Write request for 176 bytes to IOD #12 EID 275 [10.7.110.234:5671] NSOCK INFO [0.4750s] nsock_write(): Write request for 192 bytes to IOD #13 EID 283 [10.7.110.234:5671] NSOCK INFO [0.4750s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 259 [10.7.110.234:5671] NSOCK INFO [0.4750s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 267 [10.7.110.234:5671] NSOCK INFO [0.4750s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 275 [10.7.110.234:5671] NSOCK INFO [0.4750s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 283 [10.7.110.234:5671] NSOCK INFO [0.4750s] nsock_readbytes(): Read request for 5 bytes from IOD #10 [10.7.110.234:5671] EID 290 NSOCK INFO [0.4750s] nsock_readbytes(): Read request for 5 bytes from IOD #11 [10.7.110.234:5671] EID 298 NSOCK INFO [0.4760s] nsock_readbytes(): Read request for 5 bytes from IOD #12 [10.7.110.234:5671] EID 306 NSOCK INFO [0.4760s] nsock_readbytes(): Read request for 5 bytes from IOD #13 [10.7.110.234:5671] EID 314 NSOCK INFO [0.4760s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 298 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4760s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 306 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4770s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 314 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4770s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 290 [10.7.110.234:5671] (7 bytes): ......( NSOCK INFO [0.4770s] nsock_iod_delete(): nsock_iod_delete (IOD #10) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Got alert: handshake_failure NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) 64 ciphers rejected. NSOCK INFO [0.4770s] nsock_iod_new2(): nsock_iod_new (IOD #14) NSOCK INFO [0.4780s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #14) EID 320 NSOCK INFO [0.4780s] nsock_iod_delete(): nsock_iod_delete (IOD #11) NSE: [ssl-enum-ciphers W:2bdfa58 10.7.110.234:5671] (TLSv1.0) Got alert: protocol_version NSOCK INFO [0.4780s] nsock_iod_new2(): nsock_iod_new (IOD #15) NSOCK INFO [0.4780s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #15) EID 328 NSOCK INFO [0.4780s] nsock_iod_delete(): nsock_iod_delete (IOD #12) NSE: [ssl-enum-ciphers W:29ab888 10.7.110.234:5671] (SSLv3) Got alert: protocol_version NSOCK INFO [0.4780s] nsock_iod_new2(): nsock_iod_new (IOD #16) NSOCK INFO [0.4790s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #16) EID 336 NSOCK INFO [0.4790s] nsock_iod_delete(): nsock_iod_delete (IOD #13) NSE: [ssl-enum-ciphers W:2b2f288 10.7.110.234:5671] (TLSv1.1) Got alert: protocol_version NSOCK INFO [0.4790s] nsock_iod_new2(): nsock_iod_new (IOD #17) NSOCK INFO [0.4800s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #17) EID 344 NSOCK INFO [0.4800s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 320 [10.7.110.234:5671] NSOCK INFO [0.4800s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 328 [10.7.110.234:5671] NSOCK INFO [0.4800s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 336 [10.7.110.234:5671] NSOCK INFO [0.4800s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 344 [10.7.110.234:5671] NSOCK INFO [0.4810s] nsock_write(): Write request for 224 bytes to IOD #14 EID 355 [10.7.110.234:5671] NSOCK INFO [0.4810s] nsock_write(): Write request for 192 bytes to IOD #15 EID 363 [10.7.110.234:5671] NSOCK INFO [0.4810s] nsock_write(): Write request for 176 bytes to IOD #16 EID 371 [10.7.110.234:5671] NSOCK INFO [0.4810s] nsock_write(): Write request for 192 bytes to IOD #17 EID 379 [10.7.110.234:5671] NSOCK INFO [0.4820s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 355 [10.7.110.234:5671] NSOCK INFO [0.4820s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 363 [10.7.110.234:5671] NSOCK INFO [0.4820s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 371 [10.7.110.234:5671] NSOCK INFO [0.4820s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 379 [10.7.110.234:5671] NSOCK INFO [0.4820s] nsock_readbytes(): Read request for 5 bytes from IOD #14 [10.7.110.234:5671] EID 386 NSOCK INFO [0.4820s] nsock_readbytes(): Read request for 5 bytes from IOD #15 [10.7.110.234:5671] EID 394 NSOCK INFO [0.4820s] nsock_readbytes(): Read request for 5 bytes from IOD #16 [10.7.110.234:5671] EID 402 NSOCK INFO [0.4830s] nsock_readbytes(): Read request for 5 bytes from IOD #17 [10.7.110.234:5671] EID 410 NSOCK INFO [0.4830s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 386 [10.7.110.234:5671] (7 bytes): ......G NSOCK INFO [0.4830s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 394 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4830s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 402 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4830s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 410 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4840s] nsock_iod_delete(): nsock_iod_delete (IOD #14) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Got alert: insufficient_security NSOCK INFO [0.4840s] nsock_iod_new2(): nsock_iod_new (IOD #18) NSOCK INFO [0.4840s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #18) EID 416 NSOCK INFO [0.4840s] nsock_iod_delete(): nsock_iod_delete (IOD #15) NSE: [ssl-enum-ciphers W:2bdfa58 10.7.110.234:5671] (TLSv1.0) Got alert: protocol_version NSOCK INFO [0.4840s] nsock_iod_new2(): nsock_iod_new (IOD #19) NSOCK INFO [0.4850s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #19) EID 424 NSOCK INFO [0.4850s] nsock_iod_delete(): nsock_iod_delete (IOD #16) NSE: [ssl-enum-ciphers W:29ab888 10.7.110.234:5671] (SSLv3) Got alert: protocol_version NSOCK INFO [0.4850s] nsock_iod_new2(): nsock_iod_new (IOD #20) NSOCK INFO [0.4850s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #20) EID 432 NSOCK INFO [0.4850s] nsock_iod_delete(): nsock_iod_delete (IOD #17) NSE: [ssl-enum-ciphers W:2b2f288 10.7.110.234:5671] (TLSv1.1) Got alert: protocol_version NSOCK INFO [0.4850s] nsock_iod_new2(): nsock_iod_new (IOD #21) NSOCK INFO [0.4860s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #21) EID 440 NSOCK INFO [0.4860s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 416 [10.7.110.234:5671] NSOCK INFO [0.4860s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 424 [10.7.110.234:5671] NSOCK INFO [0.4860s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 432 [10.7.110.234:5671] NSOCK INFO [0.4870s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 440 [10.7.110.234:5671] NSOCK INFO [0.4870s] nsock_write(): Write request for 224 bytes to IOD #18 EID 451 [10.7.110.234:5671] NSOCK INFO [0.4870s] nsock_write(): Write request for 192 bytes to IOD #19 EID 459 [10.7.110.234:5671] NSOCK INFO [0.4870s] nsock_write(): Write request for 176 bytes to IOD #20 EID 467 [10.7.110.234:5671] NSOCK INFO [0.4880s] nsock_write(): Write request for 192 bytes to IOD #21 EID 475 [10.7.110.234:5671] NSOCK INFO [0.4880s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 451 [10.7.110.234:5671] NSOCK INFO [0.4880s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 459 [10.7.110.234:5671] NSOCK INFO [0.4880s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 467 [10.7.110.234:5671] NSOCK INFO [0.4880s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 475 [10.7.110.234:5671] NSOCK INFO [0.4890s] nsock_readbytes(): Read request for 5 bytes from IOD #18 [10.7.110.234:5671] EID 482 NSOCK INFO [0.4890s] nsock_readbytes(): Read request for 5 bytes from IOD #19 [10.7.110.234:5671] EID 490 NSOCK INFO [0.4890s] nsock_readbytes(): Read request for 5 bytes from IOD #20 [10.7.110.234:5671] EID 498 NSOCK INFO [0.4890s] nsock_readbytes(): Read request for 5 bytes from IOD #21 [10.7.110.234:5671] EID 506 NSOCK INFO [0.4890s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 482 [10.7.110.234:5671] (7 bytes): ......G NSOCK INFO [0.4890s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 490 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4890s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 498 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4890s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 506 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4900s] nsock_iod_delete(): nsock_iod_delete (IOD #18) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Got alert: insufficient_security NSOCK INFO [0.4900s] nsock_iod_new2(): nsock_iod_new (IOD #22) NSOCK INFO [0.4900s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #22) EID 512 NSOCK INFO [0.4900s] nsock_iod_delete(): nsock_iod_delete (IOD #19) NSE: [ssl-enum-ciphers W:2bdfa58 10.7.110.234:5671] (TLSv1.0) Got alert: protocol_version NSOCK INFO [0.4900s] nsock_iod_new2(): nsock_iod_new (IOD #23) NSOCK INFO [0.4910s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #23) EID 520 NSOCK INFO [0.4910s] nsock_iod_delete(): nsock_iod_delete (IOD #20) NSE: [ssl-enum-ciphers W:29ab888 10.7.110.234:5671] (SSLv3) Got alert: protocol_version NSOCK INFO [0.4910s] nsock_iod_new2(): nsock_iod_new (IOD #24) NSOCK INFO [0.4910s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #24) EID 528 NSOCK INFO [0.4910s] nsock_iod_delete(): nsock_iod_delete (IOD #21) NSE: [ssl-enum-ciphers W:2b2f288 10.7.110.234:5671] (TLSv1.1) Got alert: protocol_version NSOCK INFO [0.4910s] nsock_iod_new2(): nsock_iod_new (IOD #25) NSOCK INFO [0.4910s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #25) EID 536 NSOCK INFO [0.4910s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 512 [10.7.110.234:5671] NSOCK INFO [0.4910s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 520 [10.7.110.234:5671] NSOCK INFO [0.4920s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 528 [10.7.110.234:5671] NSOCK INFO [0.4920s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 536 [10.7.110.234:5671] NSOCK INFO [0.4920s] nsock_write(): Write request for 210 bytes to IOD #22 EID 547 [10.7.110.234:5671] NSOCK INFO [0.4930s] nsock_write(): Write request for 178 bytes to IOD #23 EID 555 [10.7.110.234:5671] NSOCK INFO [0.4930s] nsock_write(): Write request for 162 bytes to IOD #24 EID 563 [10.7.110.234:5671] NSOCK INFO [0.4930s] nsock_write(): Write request for 178 bytes to IOD #25 EID 571 [10.7.110.234:5671] NSOCK INFO [0.4930s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 547 [10.7.110.234:5671] NSOCK INFO [0.4930s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 555 [10.7.110.234:5671] NSOCK INFO [0.4930s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 563 [10.7.110.234:5671] NSOCK INFO [0.4930s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 571 [10.7.110.234:5671] NSOCK INFO [0.4940s] nsock_readbytes(): Read request for 5 bytes from IOD #22 [10.7.110.234:5671] EID 578 NSOCK INFO [0.4940s] nsock_readbytes(): Read request for 5 bytes from IOD #23 [10.7.110.234:5671] EID 586 NSOCK INFO [0.4940s] nsock_readbytes(): Read request for 5 bytes from IOD #24 [10.7.110.234:5671] EID 594 NSOCK INFO [0.4950s] nsock_readbytes(): Read request for 5 bytes from IOD #25 [10.7.110.234:5671] EID 602 NSOCK INFO [0.4950s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 586 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4950s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 594 [10.7.110.234:5671] (7 bytes): ......F NSOCK INFO [0.4950s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 578 [10.7.110.234:5671] (2320 bytes) NSOCK INFO [0.4950s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 602 [10.7.110.234:5671] (7 bytes): ......F NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: certificate_request NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: server_hello_done NSOCK INFO [0.4960s] nsock_iod_delete(): nsock_iod_delete (IOD #22) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Cipher TLS_RSA_WITH_AES_128_GCM_SHA256 chosen. NSOCK INFO [0.4960s] nsock_iod_new2(): nsock_iod_new (IOD #26) NSOCK INFO [0.4970s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #26) EID 608 NSOCK INFO [0.4970s] nsock_iod_delete(): nsock_iod_delete (IOD #23) NSE: [ssl-enum-ciphers W:2bdfa58 10.7.110.234:5671] (TLSv1.0) Got alert: protocol_version NSE: Finished ssl-enum-ciphers W:2bdfa58 against 10.7.110.234:5671. NSOCK INFO [0.4970s] nsock_iod_delete(): nsock_iod_delete (IOD #24) NSE: [ssl-enum-ciphers W:29ab888 10.7.110.234:5671] (SSLv3) Got alert: protocol_version NSE: Finished ssl-enum-ciphers W:29ab888 against 10.7.110.234:5671. NSOCK INFO [0.4970s] nsock_iod_delete(): nsock_iod_delete (IOD #25) NSE: [ssl-enum-ciphers W:2b2f288 10.7.110.234:5671] (TLSv1.1) Got alert: protocol_version NSE: Finished ssl-enum-ciphers W:2b2f288 against 10.7.110.234:5671. NSOCK INFO [0.4990s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 608 [10.7.110.234:5671] NSOCK INFO [0.4990s] nsock_write(): Write request for 208 bytes to IOD #26 EID 619 [10.7.110.234:5671] NSOCK INFO [0.4990s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 619 [10.7.110.234:5671] NSOCK INFO [0.4990s] nsock_readbytes(): Read request for 5 bytes from IOD #26 [10.7.110.234:5671] EID 626 NSOCK INFO [0.5000s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 626 [10.7.110.234:5671] (1424 bytes) NSOCK INFO [0.5010s] nsock_readbytes(): Read request for 721 bytes from IOD #26 [10.7.110.234:5671] EID 634 NSOCK INFO [0.5010s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 634 [10.7.110.234:5671] (896 bytes) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: certificate_request NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: server_hello_done NSOCK INFO [0.5010s] nsock_iod_delete(): nsock_iod_delete (IOD #26) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Cipher TLS_RSA_WITH_AES_256_GCM_SHA384 chosen. NSOCK INFO [0.5010s] nsock_iod_new2(): nsock_iod_new (IOD #27) NSOCK INFO [0.5020s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #27) EID 640 NSOCK INFO [0.5020s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 640 [10.7.110.234:5671] NSOCK INFO [0.5030s] nsock_write(): Write request for 206 bytes to IOD #27 EID 651 [10.7.110.234:5671] NSOCK INFO [0.5030s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 651 [10.7.110.234:5671] NSOCK INFO [0.5030s] nsock_readbytes(): Read request for 5 bytes from IOD #27 [10.7.110.234:5671] EID 658 NSOCK INFO [0.5030s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 658 [10.7.110.234:5671] (7 bytes): ......G NSOCK INFO [0.5040s] nsock_iod_delete(): nsock_iod_delete (IOD #27) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Got alert: insufficient_security NSOCK INFO [0.5040s] nsock_iod_new2(): nsock_iod_new (IOD #28) NSOCK INFO [0.5040s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #28) EID 664 NSOCK INFO [0.5050s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 664 [10.7.110.234:5671] NSOCK INFO [0.5050s] nsock_write(): Write request for 102 bytes to IOD #28 EID 675 [10.7.110.234:5671] NSOCK INFO [0.5050s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 675 [10.7.110.234:5671] NSOCK INFO [0.5050s] nsock_readbytes(): Read request for 5 bytes from IOD #28 [10.7.110.234:5671] EID 682 NSOCK INFO [0.5060s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 682 [10.7.110.234:5671] (2320 bytes) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: certificate_request NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: server_hello_done NSOCK INFO [0.5070s] nsock_iod_delete(): nsock_iod_delete (IOD #28) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Compressor NULL chosen. NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) Comparing TLS_RSA_WITH_AES_128_GCM_SHA256 to TLS_RSA_WITH_AES_256_GCM_SHA384 NSOCK INFO [0.5070s] nsock_iod_new2(): nsock_iod_new (IOD #29) NSOCK INFO [0.5080s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #29) EID 688 NSOCK INFO [0.5080s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 688 [10.7.110.234:5671] NSOCK INFO [0.5080s] nsock_write(): Write request for 100 bytes to IOD #29 EID 699 [10.7.110.234:5671] NSOCK INFO [0.5090s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 699 [10.7.110.234:5671] NSOCK INFO [0.5090s] nsock_readbytes(): Read request for 5 bytes from IOD #29 [10.7.110.234:5671] EID 706 NSOCK INFO [0.5100s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 706 [10.7.110.234:5671] (1424 bytes) NSOCK INFO [0.5100s] nsock_readbytes(): Read request for 721 bytes from IOD #29 [10.7.110.234:5671] EID 714 NSOCK INFO [0.5100s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 714 [10.7.110.234:5671] (896 bytes) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: certificate_request NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: server_hello_done NSOCK INFO [0.5100s] nsock_iod_delete(): nsock_iod_delete (IOD #29) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) compare TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_256_GCM_SHA384 -> TLS_RSA_WITH_AES_128_GCM_SHA256 NSOCK INFO [0.5100s] nsock_iod_new2(): nsock_iod_new (IOD #30) NSOCK INFO [0.5110s] nsock_connect_tcp(): TCP connection requested to 10.7.110.234:5671 (IOD #30) EID 720 NSOCK INFO [0.5120s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 720 [10.7.110.234:5671] NSOCK INFO [0.5120s] nsock_write(): Write request for 100 bytes to IOD #30 EID 731 [10.7.110.234:5671] NSOCK INFO [0.5120s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 731 [10.7.110.234:5671] NSOCK INFO [0.5120s] nsock_readbytes(): Read request for 5 bytes from IOD #30 [10.7.110.234:5671] EID 738 NSOCK INFO [0.5130s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 738 [10.7.110.234:5671] (2320 bytes) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: certificate_request NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] Unknown handshake message type: server_hello_done NSOCK INFO [0.5140s] nsock_iod_delete(): nsock_iod_delete (IOD #30) NSE: [ssl-enum-ciphers W:2c89908 10.7.110.234:5671] (TLSv1.2) compare TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_128_GCM_SHA256 -> TLS_RSA_WITH_AES_256_GCM_SHA384 NSE: Finished ssl-enum-ciphers W:2c89908 against 10.7.110.234:5671. NSE: Finished ssl-enum-ciphers M:24bfb38 against 10.7.110.234:5671. Completed NSE at 14:51, 0.09s elapsed Nmap scan report for 10.7.110.234 Host is up, received echo-reply ttl 62 (0.00069s latency). Scanned at 2019-06-25 14:51:01 MDT for 0s PORT STATE SERVICE REASON 5671/tcp open amqps syn-ack ttl 62 | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A Final times for host: srtt: 693 rttvar: 3833 to: 100000 NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 14:51 Completed NSE at 14:51, 0.00s elapsed Read from /usr/bin/../share/nmap: nmap-payloads nmap-services. Nmap done: 1 IP address (1 host up) scanned in 0.52 seconds Raw packets sent: 5 (196B) | Rcvd: 2 (72B) From: Lemons, Terry Sent: Tuesday, June 25, 2019 3:28 PM To: 'Matthew.Snyder () mt com'; dev () nmap org Subject: RE: ssl-enum-ciphers not returning all ciphers Hi Matt Thanks very much for the help! Thanks for pointing out that I was wrong in identifying the two ciphers shown in nmap; that makes the results make more sense. I ran the openssl command you suggested; stripping out some of the possibly-sensitive information; here is the output: lava93141:/tmp # openssl s_client -connect 10.7.110.234:5671 -cipher DHE-RSA-AES256-GCM-SHA384 CONNECTED(00000003) . . . verify error:num=19:self signed certificate in certificate chain 139674829317776:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 139674829317776:error:140790E5:SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177: --- Certificate chain . . . --- Server certificate -----BEGIN CERTIFICATE----- . . . -----END CERTIFICATE----- subject=... issuer=... --- Acceptable client certificate CA names . . . Client Certificate Types: ECDSA sign, RSA sign, DSA sign Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:ECDSA+SHA224:RSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1 Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:ECDSA+SHA224:RSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1 Peer signing digest: SHA512 Server Temp Key: DH, 2048 bits --- SSL handshake has read 3122 bytes and written 330 bytes --- New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : DHE-RSA-AES256-GCM-SHA384 Session-ID: xxxxxx Session-ID-ctx: Master-Key: xxxxxxx Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None Start Time: 1561490298 Timeout : 300 (sec) Verify return code: 19 (self signed certificate in certificate chain) --- # Thoughts? Thanks tl From: Matthew.Snyder () mt com<mailto:Matthew.Snyder () mt com> <Matthew.Snyder () mt com<mailto:Matthew.Snyder () mt com>> Sent: Tuesday, June 25, 2019 3:14 PM To: Lemons, Terry; dev () nmap org<mailto:dev () nmap org> Subject: RE: ssl-enum-ciphers not returning all ciphers [EXTERNAL EMAIL] I actually see this pushing only the first two (RSA-only, non-ephemeral, non-Diffie-Hellman ---- follow highlights). But that's not really the issue being questioned. Can you confirm, is there a different result if you were to use "openssl s_client -connect 10.7.110.234:5671 -cipher DHE-RSA-AES256-GCM-SHA384"??? If by running an example that we are not seeing in NMAP, we get an incomplete handshake, it's likely that NMAP is accurate in its result. Regards, Matt From: dev <dev-bounces () nmap org<mailto:dev-bounces () nmap org>> On Behalf Of Lemons, Terry Sent: Tuesday, June 25, 2019 2:47 PM To: dev () nmap org<mailto:dev () nmap org> Subject: ssl-enum-ciphers not returning all ciphers Hi I'm using nmap 7.70 on a Linux system to probe a different Linux system that is using RabbitMQ/Erlang. The cipher list, specified in the RabbitMQ-specific format, is: ssl_options.ciphers.1 = AES128-GCM-SHA256 ssl_options.ciphers.2 = AES256-GCM-SHA384 ssl_options.ciphers.3 = DHE-RSA-AES256-GCM-SHA384 ssl_options.ciphers.4 = DHE-RSA-AES128-GCM-SHA256 ssl_options.ciphers.5 = DHE-RSA-AES256-SHA256 ssl_options.ciphers.6 = DHE-RSA-AES128-SHA256 ssl_options.ciphers.7 = DHE-RSA-AES256-SHA ssl_options.ciphers.8 = DHE-RSA-AES128-SHA ssl_options.ciphers.9 = ECDHE-RSA-AES128-GCM-SHA256 ssl_options.ciphers.10 = ECDHE-RSA-AES256-SHA384 ssl_options.ciphers.11 = ECDHE-RSA-AES128-GCM-SHA256 ssl_options.ciphers.12 = ECDHE-RSA-AES128-SHA256 ssl_options.ciphers.13 = ECDHE-RSA-AES256-SHA ssl_options.ciphers.14 = ECDHE-RSA-AES128-SHA When I run nmap (with -d option, below), it returns only the third and fourth cipher: nmap -sV -p 5671 -d --script ssl-enum-ciphers 10.7.110.234 Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-25 12:36 MDT --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Using Lua 5.3. NSE: Arguments from CLI: NSE: Loaded 44 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 12:36 Completed NSE at 12:36, 0.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 12:36 Completed NSE at 12:36, 0.00s elapsed Initiating Ping Scan at 12:36 Scanning 10.7.110.234 [4 ports] Packet capture filter (device eth0): dst host 10.7.93.141 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 10.7.110.234))) We got a ping packet back from 10.7.110.234: id = 48554 seq = 0 checksum = 16981 Completed Ping Scan at 12:36, 0.00s elapsed (1 total hosts) Overall sending rates: 1114.21 packets / s, 42339.83 bytes / s. mass_rdns: Using DNS server 10.7.93.100 Initiating Parallel DNS resolution of 1 host. at 12:36 mass_rdns: 13.00s 0/1 [#: 1, OK: 0, NX: 0, DR: 0, SF: 0, TR: 3] Completed Parallel DNS resolution of 1 host. at 12:37, 13.00s elapsed DNS resolution of 1 IPs took 13.00s. Mode: Async [#: 1, OK: 0, NX: 0, DR: 1, SF: 0, TR: 3, CN: 0] Initiating SYN Stealth Scan at 12:37 Scanning 10.7.110.234 [1 port] Packet capture filter (device eth0): dst host 10.7.93.141 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 10.7.110.234))) Discovered open port 5671/tcp on 10.7.110.234 Completed SYN Stealth Scan at 12:37, 0.00s elapsed (1 total ports) Overall sending rates: 354.99 packets / s, 15619.45 bytes / s. Initiating Service scan at 12:37 Scanning 1 service on 10.7.110.234 Got nsock CONNECT response with status ERROR - aborting this service Completed Service scan at 12:37, 5.05s elapsed (1 service on 1 host) NSE: Script scanning 10.7.110.234. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 12:37 NSE: Starting ssl-enum-ciphers against 10.7.110.234:5671. NSE: [ssl-enum-ciphers 10.7.110.234:5671] Trying protocol TLSv1.1. NSE: [ssl-enum-ciphers 10.7.110.234:5671] Trying protocol SSLv3. NSE: [ssl-enum-ciphers 10.7.110.234:5671] Trying protocol TLSv1.2. NSE: [ssl-enum-ciphers 10.7.110.234:5671] Trying protocol TLSv1.0. NSE: Finished ssl-enum-ciphers against 10.7.110.234:5671. NSE: Finished ssl-enum-ciphers against 10.7.110.234:5671. NSE: Finished ssl-enum-ciphers against 10.7.110.234:5671. NSE: [ssl-enum-ciphers 10.7.110.234:5671] (TLSv1.2) Comparing TLS_RSA_WITH_AES_128_GCM_SHA256 to TLS_RSA_WITH_AES_256_GCM_SHA384 NSE: Finished ssl-enum-ciphers against 10.7.110.234:5671. NSE: Finished ssl-enum-ciphers against 10.7.110.234:5671. Completed NSE at 12:37, 0.07s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 12:37 NSE: Starting rpc-grind against 10.7.110.234:5671. NSE: [rpc-grind 10.7.110.234:5671] isRPC didn't receive response. NSE: [rpc-grind 10.7.110.234:5671] Target port 5671 is not a RPC port. NSE: Finished rpc-grind against 10.7.110.234:5671. Completed NSE at 12:37, 0.01s elapsed Nmap scan report for 10.7.110.234 Host is up, received echo-reply ttl 62 (0.0013s latency). Scanned at 2019-06-25 12:36:49 MDT for 18s PORT STATE SERVICE REASON VERSION 5671/tcp open ssl/amqps? syn-ack ttl 62 | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A Final times for host: srtt: 1292 rttvar: 3833 to: 100000 NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 12:37 Completed NSE at 12:37, 0.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 12:37 Completed NSE at 12:37, 0.00s elapsed Read from /usr/bin/../share/nmap: nmap-payloads nmap-service-probes nmap-services. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 18.80 seconds Raw packets sent: 5 (196B) | Rcvd: 2 (72B) # Is this a known problem? Should I be running nmap with different options? I tried '-T1' but it didn't change the behavior. Thanks! tl Terry Lemons [DellEMC_Logo_Hz_Blue_rgb_10percent] Data Protection Division 176 South Street, MS 2/B-34 Hopkinton MA 01748 terry.lemons () dell com<mailto:terry.lemons () dell com>
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- ssl-enum-ciphers not returning all ciphers Lemons, Terry (Jun 25)
- RE: ssl-enum-ciphers not returning all ciphers Matthew.Snyder (Jun 25)
- RE: ssl-enum-ciphers not returning all ciphers Lemons, Terry (Jun 25)
- RE: ssl-enum-ciphers not returning all ciphers Lemons, Terry (Jun 25)
- Re: ssl-enum-ciphers not returning all ciphers Daniel Miller (Jun 25)
- RE: ssl-enum-ciphers not returning all ciphers Lemons, Terry (Jun 26)
- RE: ssl-enum-ciphers not returning all ciphers Lemons, Terry (Jun 25)
- RE: ssl-enum-ciphers not returning all ciphers Matthew.Snyder (Jun 25)