How to Install and Uninstall tlssled.noarch Package on Fedora 38
Last updated: January 12,2025
1. Install "tlssled.noarch" package
Here is a brief guide to show you how to install tlssled.noarch on Fedora 38
$
sudo dnf update
Copied
$
sudo dnf install
tlssled.noarch
Copied
2. Uninstall "tlssled.noarch" package
Here is a brief guide to show you how to uninstall tlssled.noarch on Fedora 38:
$
sudo dnf remove
tlssled.noarch
Copied
$
sudo dnf autoremove
Copied
3. Information about the tlssled.noarch package on Fedora 38
Last metadata expiration check: 1:34:00 ago on Sat Mar 16 22:59:57 2024.
Available Packages
Name : tlssled
Version : 1.3
Release : 22.fc38
Architecture : noarch
Size : 16 k
Source : tlssled-1.3-22.fc38.src.rpm
Repository : fedora
Summary : An evaluation tool for SSL/TLS (HTTPS) web server implementations
URL : http://www.taddong.com/en/lab.html
License : GPLv3+
Description : TLSSLed is a Linux shell script whose purpose is to evaluate the security of
: a target SSL/TLS (HTTPS) web server implementation. It is based on sslscan, a
: thorough SSL/TLS scanner that is based on the openssl library, and on the
: "openssl s_client" command line tool. The current tests include checking if
: the target supports the SSLv2 protocol, the NULL cipher, weak ciphers based
: on their key length (40 or 56 bits), the availability of strong ciphers
: (like AES), if the digital certificate is MD5 signed, and the current SSL/TLS
: renegotiation capabilities.
Available Packages
Name : tlssled
Version : 1.3
Release : 22.fc38
Architecture : noarch
Size : 16 k
Source : tlssled-1.3-22.fc38.src.rpm
Repository : fedora
Summary : An evaluation tool for SSL/TLS (HTTPS) web server implementations
URL : http://www.taddong.com/en/lab.html
License : GPLv3+
Description : TLSSLed is a Linux shell script whose purpose is to evaluate the security of
: a target SSL/TLS (HTTPS) web server implementation. It is based on sslscan, a
: thorough SSL/TLS scanner that is based on the openssl library, and on the
: "openssl s_client" command line tool. The current tests include checking if
: the target supports the SSLv2 protocol, the NULL cipher, weak ciphers based
: on their key length (40 or 56 bits), the availability of strong ciphers
: (like AES), if the digital certificate is MD5 signed, and the current SSL/TLS
: renegotiation capabilities.