While digging into Amazon AWS documentation for HTTPS or SSL setup, I bumped onto the following services from Qualys SSL Labs . Because I wanted to test how secure is the SSL being implemented on my webserver.
It does exactly what it says. Verify and grading the implementation of SSL on webserver.
Here is the output.
Not bad. Thanks to CloudFlare.
References:
1. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/SSL-on-an-instance.html
ocal Options hash (VER=V4): ‘3a33122d’
192.168.0.238:4987 TLS: Initial packet from 192.168.0.238:4987, sid=c3af5dde a883362d
: 192.168.0.238:4957 TLS Error: TLS handshake failed
192.168.0.238:4957 SIGUSR1[soft,tls-error] received, client-instance restarting
: MULTI: multi_create_instance called
192.168.0.238:4988 Re-using SSL/TLS context
192.168.0.238:4988 LZO compression initialized
192.168.0.238:4988 Control Channel MTU parms [ L:1538 D:138 EF:38 EB:0 ET:0 EL:0 ]
please any one help on this
ocal Options hash (VER=V4): ‘3a33122d’
192.168.0.238:4987 TLS: Initial packet from 192.168.0.238:4987, sid=c3af5dde a883362d
: 192.168.0.238:4957 TLS Error: TLS handshake failed
192.168.0.238:4957 SIGUSR1[soft,tls-error] received, client-instance restarting
: MULTI: multi_create_instance called
192.168.0.238:4988 Re-using SSL/TLS context
192.168.0.238:4988 LZO compression initialized
192.168.0.238:4988 Control Channel MTU parms [ L:1538 D:138 EF:38 EB:0 ET:0 EL:0 ]
check TLS auth setting at server. shall be only server side to auth.
Thank you for posting this awesome article. I search since a long time an answer
to this subject and I have finally found it on your site.
I subscribed to your blog and shared it on my Facebook.
Thanks again for this great post!