--- /dev/null
+www.cduniverse.com
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ SSL_RSA_WITH_DES_CBC_MD5
+ root: RSA Secure Server CA
+ resumable session via sslViewer? yes
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ SSL_RSA_WITH_RC4_128_SHA
+ SSL_RSA_WITH_DES_CBC_SHA
+ root: RSA Secure Server CA
+ pass root cert? NO
+ send close alert? NO
+ resumable session via sslViewer? yes
+ resumable session via URLAccess? sometimes
+
+ TLSv1? yes
+
+www.amazon.com 208.216.182.15
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ SSL_RSA_WITH_DES_CBC_MD5
+ root: RSA Secure Server CA
+ resumable session via sslViewer? yes
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
+ domestic: SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ SSL_RSA_WITH_RC4_128_SHA
+ SSL_RSA_WITH_DES_CBC_SHA
+ root: RSA Secure Server CA
+ pass root cert? NO
+ send close alert? YES
+ resumable session via sslViewer? yes
+ resumable session via URLAccess? unknown
+
+ TLSv1? yes
+
+store.apple.com 17.254.3.41
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA
+ resumable session via sslViewer? yes
+ resumable session via URLAccess? unknown
+
+ v3: none - only does V2
+ export: n/a
+ domestic: n/a
+ root: n/a
+ pass root cert? n/a
+ send close alert? n/a
+
+ TLSv1? no
+
+www.dvdexpress.com 208.228.126.81
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA
+ pass root cert? NO
+ send close alert? NO
+
+www.xdss.com 204.33.235.33
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: old RSA Secure Server CA, expires 12/99
+ pass root cert? YES
+ send close alert? YES
+ resumable session via sslViewer? NO - MAC errors (Triple DES OK)
+
+ TLSv1? no
+
+accounts2.keybank.com 156.77.100.194
+ v2 :
+ export: ?
+ domestic: ?
+ root: VeriSign International Server CA - Class 3
+ (note this isn't a known root!)
+ Note this server can't be verified in SSL2 mode
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: Verisign Class 3 Public Primary CA
+ pass root cert? NO
+ send close alert? NO
+ resumable session via sslViewer? yes
+ resumable session via URLAccess? no, not attempted
+
+ TLSv1? yes
+
+cdnow.com 209.83.166.2
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ Note: no server key exchange message!
+ domestic: SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ root: RSA Secure Server CA
+ pass root cert? NO
+ send close alert?
+ resumable session via URLAccess? TBD
+
+ TLSv1? yes as of 5/1/02
+
+www.proteron.com 206.132.170.39
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: Thawte Server CA
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ root: Thawte Server CA
+ pass root cert? NO
+ send close alert? YES
+ resumable session via sslViewer? yes
+ resumable session via URLAccess? no, not attempted
+
+ TLSv1? yes
+
+www.starnine.com
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: Equifax Secure E-Business CA-2, UNKNOWN
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ root: Thawte Server CA (verifier Equifax Secure E-Business CA-2)
+ -- end-of-chain expired Jul 10, 2001
+ pass root cert? NO
+ send close alert? NO
+
+config.puretec.de
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: Thawte Server CA
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ root: Thawte Server CA
+ pass root cert? NO
+ send close alert? NO
+ resumable session via sslViewer? no
+
+ TLSv1? yes
+
+comhome.comdirect.de /de/comhome/login/index_login.html
+ v2 :
+ export: ?
+ domestic: ?
+ root: VeriSign International Server CA - Class 3 - UNKNOWN
+
+ v3:
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: Verisign Class 3 Public Primary Certification Authority
+ pass root cert? NO
+ send close alert? NO
+ resumable session via sslViewer? no
+
+www.yellownet.ch
+ v2 :
+ export: ?
+ domestic: ?
+ root: VeriSign International Server CA - Class 3
+ (note this isn't a known root!)
+ Note this server can't be verified in SSL2 mode
+ v3:
+ domestic: SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ root: Verisign Class 3 Public Primary CA
+ pass root cert? NO
+ send close alert? YES
+ resumable session? NO
+
+www.thawte.com
+ v2 :
+ export: SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: Thawte Server CA
+ v3:
+ domestic: SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ root: Thawte Server CA
+ pass root cert? NO
+ send close alert? YES
+ resumable session via sslViewer? yes
+ resumable session via URLAccess? no, not attempted
+
+ TLSv1? yes
+
+banking.wellsfargo.com
+ v2 :
+ export: ?
+ domestic: ?
+ root: VeriSign International Server CA - Class 3
+ (note this isn't a known root!)
+ Note this server can't be verified in SSL2 mode
+ v3:
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: Verisign Class 3 Public Primary CA
+ pass root cert? YES
+ send close alert? YES
+ resumable session via sslViewer? yes, but >4 loops required
+ resumable session via URLAccess? YES
+
+gen2.aeacu.com
+ v2 :
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA
+
+ v3:
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA (expires 10/11/01)
+ pass root cert? YES
+ send close alert? NO
+ resumable session via sslViewer? yes
+ resumable session via URLAccess? not attempted
+
+ TLSv1? yes
+
+secure.authorize.net
+ v2 :
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA
+
+ v3:
+ domestic: SSL_RSA_WITH_RC4_128_MD5
+ root: RSA Secure Server CA
+ pass root cert? NO
+ send close alert? NO
+ resumable session via sslViewer? sometimes - server rejects some attempts
+ resumable session via URLAccess? unknown
+
+ TLSv1? yes
+
+mail.wwc.com
+ v2 :
+ domestic: SSL_NULL_WITH_NULL_NULL!
+ root: None! errSSLClosedGraceful!
+
+ v3:
+ domestic: SSL_RSA_WITH_RC4_128_SHA
+ root: Stalker Software, Inc. (Unknown)
+ pass root cert? NO
+ send close alert? YES
+
+www.cynic.org
+ v2 :
+ domestic: SSL_RSA_WITH_RC4_128_MD5!
+ root: Cynics At Large Certificate Authority(Unknown)
+
+ v3:
+ domestic: SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ root: Cynics At Large Certificate Authority(Unknown AND expired)
+ pass root cert? YES
+ send close alert? NO
+ resumable session via sslViewer? yes
+ resumable session via URLAccess? unknown - illegal root cert
+....................................................
+
+Supported CipherSuites
+
+SSL_RSA_WITH_3DES_EDE_CBC_SHA
+ www.amazon.com v3
+ www.proteron.com v3
+ www.starnine.com v3
+
+SSL_RSA_WITH_3DES_EDE_CBC_MD5 (v2 only)
+ www.proteron.com
+
+SSL_RSA_WITH_RC4_128_SHA
+ www.amazon.com v3
+ cdu1.cduniverse.com v3
+
+SSL_RSA_WITH_RC4_128_MD5
+ just about everyone, both v2 and v3
+
+SSL_RSA_WITH_DES_CBC_SHA
+ www.amazon.com v3
+ cdu1.cduniverse.com v3
+
+SSL_RSA_WITH_DES_CBC_MD5
+ www.amazon.com v2
+ cdu1.cduniverse.com v2
+
+SSL_RSA_EXPORT_WITH_RC4_40_MD5
+ just about everyone, both v2 and v3
+
+SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
+ www.amazon.com v3