Testing the PostQuantum Readiness of CyberStorm.mu's Servers
In order to investigate the Post Quantum readiness of CyberStorm.mu's Servers, i used OpenSSL and analyzed the output to determine what type of key exchanges were used to create a secure connection with my machine and their servers and what type of certificates they were using.
To perform this test, i used the OpenSSL, but what is OpenSSL?
OpenSSL can be defined as : " ... open-source software library and command-line tool used to implement SSL and TLS protocols for secure communications...." -ssldragon.com/blog/what-is-openssl/
Methodology:
Using a terminal open on my linux machine,i type in the command: "openssl s_client cyberstorm.mu:443 > <filename>".
Now, Lets breakdown that command:
Using openssl with the option s_client, which allows us to established a transparent connection to a remote server, in this case cyberstorm.mu's servers. Secondly, :443 at the end of cyberstorm.mu:443 specifies which port needs to be used in order to establish the connection. Finally, the result of this command is the redirected into a file called TestResults just for convenience.
Here is the result after the execution of the command.
Here we are have the results from our commands and we have information on the type of connection we have, we can see the authentication certificate..etc.What we are interested with is the "Server Temp Key"
Comments
Post a Comment