You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Changelog.md
+37-3Lines changed: 37 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,9 +4,32 @@
4
4
5
5
_Compared to the latest 1.10 release._
6
6
7
-
### Feature changes
8
7
9
-
- ...
8
+
### TLS updates for NCSC 2025 guidelines
9
+
10
+
All tests were updated to match the
11
+
[2025-05 version of the NCSC TLS guidelines](https://www.ncsc.nl/documenten/publicaties/2025/juni/01/ict-beveiligingsrichtlijnen-voor-transport-layer-security-2025-05).
12
+
Most significant changes:
13
+
14
+
- The requirements on TLS versions, TLS authentication, curves, hashes, key exchange algorithms, FFDHE groups,
15
+
RSA key lengths, and bulk encryption algorithms were updated to match the new guidelines.
16
+
- A test for RSA PKCS#1 v1.5 was added (only PSS padding is sufficient).
17
+
- A test for Extended Master Secret (RFC7627) was added.
18
+
- Client-initiated renegotiation is now acceptable, if limited to less than 10.
19
+
- All checks on certificates apply only to the TODO TODO certificates.
20
+
21
+
### Other TLS updates
22
+
23
+
- Certificates that do not have OCSP enabled, which means stapling is not possible,
24
+
[are now detected as such](https://github.com/internetstandards/Internet.nl/issues/1641).
25
+
Several issues with OCSP stapling reliability were also resolved.
26
+
- Issues were fixed where the cipher order failed to detect some bad scenarios,
27
+
including some where servers preferred RSA over ECDHE, or CBC over POLY1305.
28
+
- CCM_8 ciphers are now detected when enabled on a server.
29
+
- OLD ciphers are no longer detected.
30
+
- The cipher order test no longer separates between "the server cipher order preference is wrong"
31
+
and "the server has no preference".
32
+
10
33
11
34
### Significant internal changes
12
35
@@ -18,7 +41,18 @@ _Compared to the latest 1.10 release._
18
41
19
42
### API changes
20
43
21
-
- ...
44
+
This release has API version 2.7.0.
45
+
46
+
The changes noted above are reflected in the API as well, e.g. which ciphers
47
+
are considered bad, which are listed in the API output, along with score impacts.
48
+
Additionally, the API structure changes are:
49
+
- OCSP stapling has a new status `not_in_cert`, for when a certificate does not have OCSP enabled,
50
+
therefore stapling is neither required nor possible.
51
+
- The cipher order status no longer returns `not_prescribed` or `not_seclevel` for new tests.
52
+
The insufficient statuses are now `bad` for preferring phase out over good and/or sufficient;
53
+
and `sufficient_above_good` for preferring sufficient over good.
54
+
-`extended_master_secret_status` and `kex_rsa_pkcs` were added to the TLS details.
55
+
-`client_reneg` in the TLS details was changed from a boolean to a new enum.
0 commit comments