|
3 | 3 | from typing import Optional
|
4 | 4 |
|
5 | 5 | from checks import scoring
|
6 |
| -from checks.models import TLSClientInitiatedRenegotiationStatus |
| 6 | +from checks.models import TLSClientInitiatedRenegotiationStatus, KexRSAPKCSStatus, TLSExtendedMasterSecretStatus |
7 | 7 | from checks.scoring import (
|
8 | 8 | ORDERED_STATUSES,
|
9 | 9 | STATUS_ERROR,
|
@@ -1525,6 +1525,84 @@ def result_phase_out(self):
|
1525 | 1525 | self.tech_data = "detail tech data phase-out"
|
1526 | 1526 |
|
1527 | 1527 |
|
| 1528 | +class WebKexRSAPKCSStatus(Subtest): |
| 1529 | + def __init__(self): |
| 1530 | + super().__init__( |
| 1531 | + name="key_exchange_rsa_pkcs", |
| 1532 | + label="detail web tls key-exchange-rsa-pkcs label", |
| 1533 | + explanation="detail web tls key-exchange-rsa-pkcs exp", |
| 1534 | + tech_string="detail web tls key-exchange-rsa-pkcs tech table", |
| 1535 | + worst_status=scoring.TLS_KEX_RSA_PKCS_WORST_STATUS, |
| 1536 | + full_score=scoring.TLS_KEX_RSA_PKCS_GOOD, |
| 1537 | + model_score_field="key_exchange_rsa_pkcs_score", |
| 1538 | + ) |
| 1539 | + |
| 1540 | + def save_result(self, status: KexRSAPKCSStatus): |
| 1541 | + handlers = { |
| 1542 | + KexRSAPKCSStatus.good: self.result_good, |
| 1543 | + KexRSAPKCSStatus.bad: self.result_bad, |
| 1544 | + KexRSAPKCSStatus.unknown: self.result_unknown, |
| 1545 | + } |
| 1546 | + return handlers[status]() |
| 1547 | + |
| 1548 | + def result_good(self): |
| 1549 | + self._status(STATUS_SUCCESS) |
| 1550 | + self.verdict = "detail web tls key-exchange-rsa-pkcs verdict good" |
| 1551 | + self.tech_data = "detail tech data good" |
| 1552 | + |
| 1553 | + def result_bad(self): |
| 1554 | + self._status(STATUS_FAIL) |
| 1555 | + self.verdict = "detail web tls key-exchange-rsa-pkcs verdict bad" |
| 1556 | + self.tech_data = "detail tech data insufficient" |
| 1557 | + |
| 1558 | + def result_unknown(self): |
| 1559 | + self._status(STATUS_INFO) |
| 1560 | + self.verdict = "detail web tls key-exchange-rsa-pkcs verdict other" |
| 1561 | + self.tech_data = "detail tech data not-applicable" |
| 1562 | + |
| 1563 | + |
| 1564 | +class WebTLSExtendedMasterSecret(Subtest): |
| 1565 | + def __init__(self): |
| 1566 | + super().__init__( |
| 1567 | + name="extended_master_secret", |
| 1568 | + label="detail web tls extended-master-secret label", |
| 1569 | + explanation="detail web tls extended-master-secret exp", |
| 1570 | + tech_string="detail web tls extended-master-secret tech table", |
| 1571 | + worst_status=scoring.TLS_EXTENDED_MASTER_SECRET_WORST_STATUS, |
| 1572 | + full_score=scoring.TLS_EXTENDED_MASTER_SECRET_GOOD, |
| 1573 | + model_score_field="extended_master_secret_score", |
| 1574 | + ) |
| 1575 | + |
| 1576 | + def save_result(self, status: TLSExtendedMasterSecretStatus): |
| 1577 | + handlers = { |
| 1578 | + TLSExtendedMasterSecretStatus.supported: self.result_good, |
| 1579 | + TLSExtendedMasterSecretStatus.na_no_tls_1_2: self.result_na_no_tls_1_2, |
| 1580 | + TLSExtendedMasterSecretStatus.not_supported: self.result_bad, |
| 1581 | + TLSExtendedMasterSecretStatus.unknown: self.result_unknown, |
| 1582 | + } |
| 1583 | + return handlers[status]() |
| 1584 | + |
| 1585 | + def result_good(self): |
| 1586 | + self._status(STATUS_SUCCESS) |
| 1587 | + self.verdict = "detail web tls extended-master-secret verdict good" |
| 1588 | + self.tech_data = "detail tech data good" |
| 1589 | + |
| 1590 | + def result_bad(self): |
| 1591 | + self._status(STATUS_FAIL) |
| 1592 | + self.verdict = "detail web tls extended-master-secret verdict bad" |
| 1593 | + self.tech_data = "detail tech data insufficient" |
| 1594 | + |
| 1595 | + def result_unknown(self): |
| 1596 | + self._status(STATUS_INFO) |
| 1597 | + self.verdict = "detail web tls extended-master-secret verdict other" |
| 1598 | + self.tech_data = "detail tech data not-applicable" |
| 1599 | + |
| 1600 | + def result_na_no_tls_1_2(self): |
| 1601 | + self._status(STATUS_NOTICE) |
| 1602 | + self.verdict = "detail web tls extended-master-secret verdict na-no-tls-1-2" |
| 1603 | + self.tech_data = "detail tech data phase-out" |
| 1604 | + |
| 1605 | + |
1528 | 1606 | class MailTlsStarttlsExists(Subtest):
|
1529 | 1607 | def __init__(self):
|
1530 | 1608 | super().__init__(
|
@@ -2115,6 +2193,84 @@ def result_phase_out(self):
|
2115 | 2193 | self.tech_data = "detail tech data phase-out"
|
2116 | 2194 |
|
2117 | 2195 |
|
| 2196 | +class MailKexRSAPKCSStatus(Subtest): |
| 2197 | + def __init__(self): |
| 2198 | + super().__init__( |
| 2199 | + name="key_exchange_rsa_pkcs", |
| 2200 | + label="detail mail tls key-exchange-rsa-pkcs label", |
| 2201 | + explanation="detail mail tls key-exchange-rsa-pkcs exp", |
| 2202 | + tech_string="detail mail tls key-exchange-rsa-pkcs tech table", |
| 2203 | + worst_status=scoring.TLS_KEX_RSA_PKCS_WORST_STATUS, |
| 2204 | + full_score=scoring.TLS_KEX_RSA_PKCS_GOOD, |
| 2205 | + model_score_field="key_exchange_rsa_pkcs_score", |
| 2206 | + ) |
| 2207 | + |
| 2208 | + def save_result(self, status: KexRSAPKCSStatus): |
| 2209 | + handlers = { |
| 2210 | + KexRSAPKCSStatus.good: self.result_good, |
| 2211 | + KexRSAPKCSStatus.bad: self.result_bad, |
| 2212 | + KexRSAPKCSStatus.unknown: self.result_unknown, |
| 2213 | + } |
| 2214 | + return handlers[status]() |
| 2215 | + |
| 2216 | + def result_good(self): |
| 2217 | + self._status(STATUS_SUCCESS) |
| 2218 | + self.verdict = "detail mail tls key-exchange-rsa-pkcs verdict good" |
| 2219 | + self.tech_data = "detail tech data good" |
| 2220 | + |
| 2221 | + def result_bad(self): |
| 2222 | + self._status(STATUS_FAIL) |
| 2223 | + self.verdict = "detail mail tls key-exchange-rsa-pkcs verdict bad" |
| 2224 | + self.tech_data = "detail tech data insufficient" |
| 2225 | + |
| 2226 | + def result_unknown(self): |
| 2227 | + self._status(STATUS_INFO) |
| 2228 | + self.verdict = "detail mail tls key-exchange-rsa-pkcs verdict other" |
| 2229 | + self.tech_data = "detail tech data not-applicable" |
| 2230 | + |
| 2231 | + |
| 2232 | +class MailTLSExtendedMasterSecret(Subtest): |
| 2233 | + def __init__(self): |
| 2234 | + super().__init__( |
| 2235 | + name="extended_master_secret", |
| 2236 | + label="detail mail tls extended-master-secret label", |
| 2237 | + explanation="detail mail tls extended-master-secret exp", |
| 2238 | + tech_string="detail mail tls extended-master-secret tech table", |
| 2239 | + worst_status=scoring.TLS_EXTENDED_MASTER_SECRET_WORST_STATUS, |
| 2240 | + full_score=scoring.TLS_EXTENDED_MASTER_SECRET_GOOD, |
| 2241 | + model_score_field="extended_master_secret_score", |
| 2242 | + ) |
| 2243 | + |
| 2244 | + def save_result(self, status: TLSExtendedMasterSecretStatus): |
| 2245 | + handlers = { |
| 2246 | + TLSExtendedMasterSecretStatus.supported: self.result_good, |
| 2247 | + TLSExtendedMasterSecretStatus.na_no_tls_1_2: self.result_na_no_tls_1_2, |
| 2248 | + TLSExtendedMasterSecretStatus.not_supported: self.result_bad, |
| 2249 | + TLSExtendedMasterSecretStatus.unknown: self.result_unknown, |
| 2250 | + } |
| 2251 | + return handlers[status]() |
| 2252 | + |
| 2253 | + def result_good(self): |
| 2254 | + self._status(STATUS_SUCCESS) |
| 2255 | + self.verdict = "detail mail tls extended-master-secret verdict good" |
| 2256 | + self.tech_data = "detail tech data good" |
| 2257 | + |
| 2258 | + def result_bad(self): |
| 2259 | + self._status(STATUS_FAIL) |
| 2260 | + self.verdict = "detail mail tls extended-master-secret verdict bad" |
| 2261 | + self.tech_data = "detail tech data insufficient" |
| 2262 | + |
| 2263 | + def result_unknown(self): |
| 2264 | + self._status(STATUS_INFO) |
| 2265 | + self.verdict = "detail mail tls extended-master-secret verdict other" |
| 2266 | + self.tech_data = "detail tech data not-applicable" |
| 2267 | + |
| 2268 | + def result_na_no_tls_1_2(self): |
| 2269 | + self._status(STATUS_NOTICE) |
| 2270 | + self.verdict = "detail mail tls extended-master-secret verdict na-no-tls-1-2" |
| 2271 | + self.tech_data = "detail tech data phase-out" |
| 2272 | + |
| 2273 | + |
2118 | 2274 | class MailTlsDaneExists(Subtest):
|
2119 | 2275 | def __init__(self):
|
2120 | 2276 | super().__init__(
|
|
0 commit comments