1
|
|
|
#!/usr/bin/env php |
|
|
|
|
2
|
|
|
<?php |
3
|
|
|
|
4
|
|
|
class Tls12Checker |
5
|
|
|
{ |
6
|
|
|
const API_URI = 'api.escemo.com'; |
7
|
|
|
|
8
|
|
|
public function allowedCiphers() |
9
|
|
|
{ |
10
|
|
|
return [ |
11
|
|
|
'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA', |
12
|
|
|
'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256', |
13
|
|
|
'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA', |
14
|
|
|
'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384', |
15
|
|
|
'TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256', |
16
|
|
|
'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA', |
17
|
|
|
'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256', |
18
|
|
|
'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA', |
19
|
|
|
'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384', |
20
|
|
|
'TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256', |
21
|
|
|
]; |
22
|
|
|
} |
23
|
|
|
|
24
|
|
|
/** |
25
|
|
|
* @return array |
26
|
|
|
* @throws \Exception |
27
|
|
|
*/ |
28
|
|
|
private function getSupportedCiphers() |
29
|
|
|
{ |
30
|
|
|
$ch = curl_init(); |
31
|
|
|
curl_setopt($ch, CURLOPT_URL, "https://www.howsmyssl.com/a/check"); |
32
|
|
|
curl_setopt($ch, CURLOPT_SSLVERSION, 6); |
33
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); |
34
|
|
|
$response = curl_exec($ch); |
35
|
|
|
curl_close($ch); |
36
|
|
|
$tlsInfo = json_decode($response, true); |
37
|
|
|
|
38
|
|
|
if ($response === false) { |
39
|
|
|
throw new \Exception('Connection not connect using TLS 1.2', 1); |
40
|
|
|
} |
41
|
|
|
|
42
|
|
|
return isset($tlsInfo['given_cipher_suites']) ? $tlsInfo['given_cipher_suites'] : []; |
43
|
|
|
} |
44
|
|
|
|
45
|
|
|
/** |
46
|
|
|
* @throws \Exception |
47
|
|
|
*/ |
48
|
|
|
private function checkCiphers() |
49
|
|
|
{ |
50
|
|
|
$supportedCiphers = $this->getSupportedCiphers(); |
51
|
|
|
$allowedCiphers = $this->allowedCiphers(); |
52
|
|
|
|
53
|
|
|
$diff = array_diff($allowedCiphers, $supportedCiphers); |
54
|
|
|
|
55
|
|
|
if (count($diff) < count($allowedCiphers)) { |
56
|
|
|
return; |
57
|
|
|
}; |
58
|
|
|
throw new \Exception('None of the allowed cipher suites are supported by curl: ' . implode(', ', $allowedCiphers), 1); |
59
|
|
|
} |
60
|
|
|
|
61
|
|
|
/** |
62
|
|
|
* @throws \Exception |
63
|
|
|
*/ |
64
|
|
|
private function checkApiConnection($cipher = null) |
65
|
|
|
{ |
66
|
|
|
$ch = curl_init(); |
67
|
|
|
curl_setopt($ch, CURLOPT_URL, 'https://' . self::API_URI); |
68
|
|
|
curl_setopt($ch, CURLOPT_SSLVERSION, 6); |
69
|
|
|
if (!is_null($cipher)) { |
70
|
|
|
curl_setopt($ch, CURLOPT_SSL_CIPHER_LIST, $cipher); |
71
|
|
|
} |
72
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); |
73
|
|
|
$response = curl_exec($ch); |
74
|
|
|
curl_close($ch); |
75
|
|
|
|
76
|
|
|
if ($response == false) { |
77
|
|
|
throw new \Exception('Could not connect not connect to API using TLS 1.2' . (is_null($cipher) ? '' : ' with cipher ' . $cipher), 1); |
78
|
|
|
} |
79
|
|
|
} |
80
|
|
|
|
81
|
|
|
private function checkCurlVersion() |
82
|
|
|
{ |
83
|
|
|
$curlVersion = curl_version(); |
84
|
|
|
$supportsTLS12 = true; |
85
|
|
|
if (version_compare(curl_version()['version'], '7.34.0', '<')) { |
86
|
|
|
$supportsTLS12 = false; |
87
|
|
|
} |
88
|
|
|
echo 'Curl version: ' . ($supportsTLS12 ? "\033[32m" : "\033[31m") . curl_version()['version'] . "\033[0m" . ($supportsTLS12 ? '' : '(TLS 1.2 not supported)') . PHP_EOL; |
89
|
|
|
|
90
|
|
|
if (isset($curlVersion['ssl_version'])) { |
91
|
|
|
echo 'Curl SSL Library: ' . curl_version()['ssl_version'] . PHP_EOL; |
92
|
|
|
} |
93
|
|
|
} |
94
|
|
|
|
95
|
|
|
/** |
96
|
|
|
* @return int |
97
|
|
|
*/ |
98
|
|
|
public function check() |
99
|
|
|
{ |
100
|
|
|
$this->checkCurlVersion(); |
101
|
|
|
|
102
|
|
|
echo "Checking TLS 1.2 connection ... "; |
103
|
|
|
try { |
104
|
|
|
$this->checkCiphers(); |
105
|
|
|
$this->checkApiConnection(); |
106
|
|
|
} catch (\Exception $exception) { |
107
|
|
|
echo "\033[31mFailed\033[0m" . PHP_EOL; |
108
|
|
|
echo $exception->getMessage() . PHP_EOL; |
109
|
|
|
return (int)$exception->getCode(); |
110
|
|
|
} |
111
|
|
|
|
112
|
|
|
echo "\033[32mOK\033[0m" . PHP_EOL; |
113
|
|
|
|
114
|
|
|
return 0; |
115
|
|
|
} |
116
|
|
|
|
117
|
|
|
private function availableCiphers() |
118
|
|
|
{ |
119
|
|
|
$localCiphers = explode(' ', exec('openssl ciphers \'ALL:eNULL\' | tr \':\' \' \'')); |
120
|
|
|
$allowedCiphers = []; |
121
|
|
|
foreach ($localCiphers as $localCipher) { |
122
|
|
|
exec('echo -n | openssl s_client -connect ' . self::API_URI . ':443 -cipher ' . $localCipher . ' -tls1_2 2>&1', $dummy, $status); |
123
|
|
|
if ($status === 0) { |
124
|
|
|
$allowedCiphers[] = $localCipher; |
125
|
|
|
} |
126
|
|
|
} |
127
|
|
|
|
128
|
|
|
return $allowedCiphers; |
129
|
|
|
} |
130
|
|
|
|
131
|
|
|
private function checkAvailableCiphers() |
|
|
|
|
132
|
|
|
{ |
133
|
|
|
$availableCiphers = $this->availableCiphers(); |
134
|
|
|
foreach ($availableCiphers as $cipher) { |
135
|
|
|
echo 'Testing ' . $cipher . '...'; |
136
|
|
|
try { |
137
|
|
|
$this->checkApiConnection($cipher); |
138
|
|
|
echo "\033[32mOK\033[0m" . PHP_EOL; |
139
|
|
|
} catch (\Exception $exception) { |
140
|
|
|
echo "\033[31mFailed\033[0m" . PHP_EOL; |
141
|
|
|
} |
142
|
|
|
} |
143
|
|
|
} |
144
|
|
|
} |
145
|
|
|
|
146
|
|
|
$checker = new Tls12Checker(); |
147
|
|
|
exit($checker->check()); |
148
|
|
|
|
The PSR-1: Basic Coding Standard recommends that a file should either introduce new symbols, that is classes, functions, constants or similar, or have side effects. Side effects are anything that executes logic, like for example printing output, changing ini settings or writing to a file.
The idea behind this recommendation is that merely auto-loading a class should not change the state of an application. It also promotes a cleaner style of programming and makes your code less prone to errors, because the logic is not spread out all over the place.
To learn more about the PSR-1, please see the PHP-FIG site on the PSR-1.