How to Install and Uninstall tlssled.noarch Package on Fedora 34
Last updated: November 26,2024
1. Install "tlssled.noarch" package
Please follow the guidance below to install tlssled.noarch on Fedora 34
$
sudo dnf update
Copied
$
sudo dnf install
tlssled.noarch
Copied
2. Uninstall "tlssled.noarch" package
Please follow the instructions below to uninstall tlssled.noarch on Fedora 34:
$
sudo dnf remove
tlssled.noarch
Copied
$
sudo dnf autoremove
Copied
3. Information about the tlssled.noarch package on Fedora 34
Last metadata expiration check: 3:03:20 ago on Tue Sep 6 08:10:37 2022.
Available Packages
Name : tlssled
Version : 1.3
Release : 18.fc34
Architecture : noarch
Size : 16 k
Source : tlssled-1.3-18.fc34.src.rpm
Repository : fedora
Summary : An evaluation tool for SSL/TLS (HTTPS) web server implementations
URL : http://www.taddong.com/en/lab.html
License : GPLv3+
Description : TLSSLed is a Linux shell script whose purpose is to evaluate the security of
: a target SSL/TLS (HTTPS) web server implementation. It is based on sslscan, a
: thorough SSL/TLS scanner that is based on the openssl library, and on the
: "openssl s_client" command line tool. The current tests include checking if
: the target supports the SSLv2 protocol, the NULL cipher, weak ciphers based
: on their key length (40 or 56 bits), the availability of strong ciphers
: (like AES), if the digital certificate is MD5 signed, and the current SSL/TLS
: renegotiation capabilities.
Available Packages
Name : tlssled
Version : 1.3
Release : 18.fc34
Architecture : noarch
Size : 16 k
Source : tlssled-1.3-18.fc34.src.rpm
Repository : fedora
Summary : An evaluation tool for SSL/TLS (HTTPS) web server implementations
URL : http://www.taddong.com/en/lab.html
License : GPLv3+
Description : TLSSLed is a Linux shell script whose purpose is to evaluate the security of
: a target SSL/TLS (HTTPS) web server implementation. It is based on sslscan, a
: thorough SSL/TLS scanner that is based on the openssl library, and on the
: "openssl s_client" command line tool. The current tests include checking if
: the target supports the SSLv2 protocol, the NULL cipher, weak ciphers based
: on their key length (40 or 56 bits), the availability of strong ciphers
: (like AES), if the digital certificate is MD5 signed, and the current SSL/TLS
: renegotiation capabilities.