Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
32 commits
Select commit Hold shift + click to select a range
8360941
Switch TLS to sslyze/nassl based reimplementation
mxsasha May 2, 2023
68f3f8b
Update for new resolver
mxsasha Mar 18, 2025
7ed6d51
Revert back to pip for sslyze branch
mxsasha Mar 24, 2025
caf0946
Ref #1641 - Detect absence of OCSP in OCSP response evaluation
mxsasha Mar 24, 2025
0068575
Clean up DANE/resolver integration
mxsasha Mar 25, 2025
68d522e
Switch to latest pypi nassl/sslyze
mxsasha Jul 22, 2025
08a4e21
Switch TLS to sslyze/nassl based reimplementation
mxsasha May 2, 2023
f3cb6d6
Update for new resolver
mxsasha Mar 18, 2025
dc21f98
Switch to latest pypi nassl/sslyze
mxsasha Jul 22, 2025
ee49321
Partial update to NCSC 2025
mxsasha Jun 9, 2025
7b529b5
FFDHE2024 -> insufficient, others -> phase out
mxsasha Jun 25, 2025
df08eb0
Remove ECDHE/DHE min key size - this is superfluous
mxsasha Jun 25, 2025
f6c6c61
Update SHA2 key exchange check to new requirements (must reject SHA1 …
mxsasha Jul 1, 2025
1e4b6a0
Update cert requirements, including RSA phase out for 2048
mxsasha Jul 1, 2025
ab431c8
API upd
mxsasha Jul 1, 2025
6fe5566
Initial work in RSA-PKCS check
mxsasha Jul 8, 2025
b67c9dd
Update client initiated renegotiation limits, incl DB changes for 3 s…
mxsasha Jul 22, 2025
634c3e0
Fix issues with sigalg check, some sigalgs were not supported
mxsasha Jul 24, 2025
83e0765
Fix cert curve detection
mxsasha Jul 28, 2025
80a2a4e
Add support for EMS
mxsasha Jul 28, 2025
6ae57e5
Cleanup
mxsasha Jul 29, 2025
ca2fc6e
Add sufficient>good separate status for cipher order
mxsasha Aug 4, 2025
cfc01c0
Fix formatting in pubkey
mxsasha Aug 4, 2025
90c4d1b
Add new checks to db/categories/template
mxsasha Aug 12, 2025
e7a40d3
Remove duplicate kex hash func
mxsasha Aug 21, 2025
0fbde9d
Finetune some labels
mxsasha Aug 21, 2025
21544d6
Update ems na_no_tls_1_2 status to success
mxsasha Aug 21, 2025
3873398
TO REVERT: force pushing to the registry (required due to double-PR)
mxsasha Aug 21, 2025
5d339c6
Fix batch tests
mxsasha Aug 22, 2025
e2a7124
Update release notes / openapi.yaml
mxsasha Sep 1, 2025
ea90786
Fix SHA1 KEX hash
mxsasha Nov 11, 2025
58f184e
To be discussed, but KEX hash and PKCS are "onvoldoende" in TLS-guide…
mxsasha Nov 11, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/docker.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ env:
# determine whether this pull request has permissions to push to registry, or artifacts
# should be used to transfer images between jobs. Forked and dependabot builds don't
# have permission to push to registry.
use_registry: ${{ ! (github.event_name == 'pull_request' && (github.event.pull_request.head.repo.full_name != github.repository || startsWith(github.head_ref, 'dependabot/'))) }}
use_registry: true

jobs:
# builds all docker images in parallel
Expand Down
13 changes: 4 additions & 9 deletions .gitmodules
Original file line number Diff line number Diff line change
@@ -1,12 +1,7 @@
[submodule "vendor/unbound"]
path = vendor/unbound
url = https://github.com/internetstandards/unbound.git
[submodule "vendor/nassl"]
path = vendor/nassl
url = https://github.com/internetstandards/nassl.git
[submodule "vendor/openssl-1.0.2e"]
path = vendor/openssl-1.0.2e
url = https://github.com/PeterMosmans/openssl.git
[submodule "vendor/openssl-master"]
path = vendor/openssl-master
url = https://github.com/openssl/openssl.git
[submodule "vendor/nassl6"]
path = vendor/nassl6
url = https://github.com/mxsasha/nassl
branch = sigalg
40 changes: 37 additions & 3 deletions Changelog.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,32 @@

_Compared to the latest 1.10 release._

### Feature changes

- ...
### TLS updates for NCSC 2025 guidelines

All tests were updated to match the
[2025-05 version of the NCSC TLS guidelines](https://www.ncsc.nl/documenten/publicaties/2025/juni/01/ict-beveiligingsrichtlijnen-voor-transport-layer-security-2025-05).
Most significant changes:

- The requirements on TLS versions, TLS authentication, curves, hashes, key exchange algorithms, FFDHE groups,
RSA key lengths, and bulk encryption algorithms were updated to match the new guidelines.
- A test for RSA PKCS#1 v1.5 was added (only PSS padding is sufficient).
- A test for Extended Master Secret (RFC7627) was added.
- Client-initiated renegotiation is now acceptable, if limited to less than 10.
- All checks on certificates apply only to the TODO TODO certificates.

### Other TLS updates

- Certificates that do not have OCSP enabled, which means stapling is not possible,
[are now detected as such](https://github.com/internetstandards/Internet.nl/issues/1641).
Several issues with OCSP stapling reliability were also resolved.
- Issues were fixed where the cipher order failed to detect some bad scenarios,
including some where servers preferred RSA over ECDHE, or CBC over POLY1305.
- CCM_8 ciphers are now detected when enabled on a server.
- OLD ciphers are no longer detected.
- The cipher order test no longer separates between "the server cipher order preference is wrong"
and "the server has no preference".


### Significant internal changes

Expand All @@ -18,7 +41,18 @@ _Compared to the latest 1.10 release._

### API changes

- ...
This release has API version 2.7.0.

The changes noted above are reflected in the API as well, e.g. which ciphers
are considered bad, which are listed in the API output, along with score impacts.
Additionally, the API structure changes are:
- OCSP stapling has a new status `not_in_cert`, for when a certificate does not have OCSP enabled,
therefore stapling is neither required nor possible.
- The cipher order status no longer returns `not_prescribed` or `not_seclevel` for new tests.
The insufficient statuses are now `bad` for preferring phase out over good and/or sufficient;
and `sufficient_above_good` for preferring sufficient over good.
- `extended_master_secret_status` and `kex_rsa_pkcs` were added to the TLS details.
- `client_reneg` in the TLS details was changed from a boolean to a new enum.


## 1.10.6
Expand Down
Loading
Loading